Purely automated attacks on passpoints-style graphical passwords PC Van Oorschot, A Salehi-Abari, J Thorpe IEEE Transactions on Information Forensics and Security 5 (3), 393-405, 2010 | 177 | 2010 |
On purely automated attacks and click-based graphical passwords A Salehi-Abari, J Thorpe, PC Van Oorschot 2008 Annual Computer Security Applications Conference (ACSAC), 111-120, 2008 | 99 | 2008 |
Preference-oriented social networks: Group recommendation and inference A Salehi-Abari, C Boutilier Proceedings of the 9th ACM Conference on Recommender Systems, 35-42, 2015 | 81 | 2015 |
Usability and security evaluation of GeoPass: a geographic location-password scheme J Thorpe, B MacRae, A Salehi-Abari Proceedings of the Ninth symposium on usable privacy and security, 1-14, 2013 | 73 | 2013 |
Empathetic social choice on social networks. A Salehi-Abari, C Boutilier AAMAS, 693-700, 2014 | 59 | 2014 |
Towards Con-Resistant Trust Models for Distributed Agent Systems. A Salehi-Abari, T White IJCAI 9, 272-277, 2009 | 46 | 2009 |
The presentation effect on graphical passwords J Thorpe, M Al-Badawi, B MacRae, A Salehi-Abari proceedings of the SIGCHI conference on human factors in computing systems …, 2014 | 41 | 2014 |
Systems, methods, and computer program products for providing video-passwords for user authentication JK Thorpe, A Salehi-Abari, RE Burden US Patent 8,966,614, 2015 | 31 | 2015 |
Variational autoencoders for top-k recommendation with implicit feedback B Askari, J Szlichta, A Salehi-Abari Proceedings of the 44th international ACM SIGIR conference on research and …, 2021 | 30 | 2021 |
Empathetic decision making in social networks A Salehi-Abari, C Boutilier, K Larson Artificial intelligence 275, 174-203, 2019 | 28 | 2019 |
DART: A distributed analysis of reputation and trust framework A Salehi‐Abari, T White Computational Intelligence 28 (4), 642-682, 2012 | 27 | 2012 |
An exploration of geographic authentication schemes B MacRae, A Salehi-Abari, J Thorpe IEEE Transactions on Information Forensics and Security 11 (9), 1997-2012, 2016 | 22 | 2016 |
Do password managers nudge secure (random) passwords? S Zibaei, DR Malapaya, B Mercier, A Salehi-Abari, J Thorpe Eighteenth Symposium on Usable Privacy and Security (SOUPS 2022), 581-597, 2022 | 21 | 2022 |
Trust models and con-man agents: From mathematical to empirical analysis A Salehi-Abari, T White Proceedings of the AAAI Conference on Artificial Intelligence 24 (1), 842-847, 2010 | 21 | 2010 |
DeepGroup: Group recommendation with implicit feedback S Sajjadi Ghaemmaghami, A Salehi-Abari Proceedings of the 30th ACM International Conference on Information …, 2021 | 17 | 2021 |
Media monitoring using social networks T White, W Chu, A Salehi-Abari 2010 IEEE Second International Conference on Social Computing, 661-668, 2010 | 15 | 2010 |
Geographical security questions for fallback authentication A Addas, A Salehi-Abari, J Thorpe 2019 17th international conference on privacy, security and trust (PST), 1-6, 2019 | 14 | 2019 |
Enhanced generalized ant programming (EGAP) A Salehi-Abari, T White Proceedings of the 10th annual conference on Genetic and evolutionary …, 2008 | 14 | 2008 |
Sampling enclosing subgraphs for link prediction P Louis, SA Jacob, A Salehi-Abari Proceedings of the 31st ACM International Conference on Information …, 2022 | 13 | 2022 |
A study on priming methods for graphical passwords Z Parish, A Salehi-Abari, J Thorpe Journal of Information Security and Applications 62, 102913, 2021 | 9 | 2021 |