Skip to main content

Showing 1–5 of 5 results for author: Mughees, H

.
  1. arXiv:2406.06761  [pdf, other

    cs.CR cs.DB

    Scalable Private Search with Wally

    Authors: Hilal Asi, Fabian Boemer, Nicholas Genise, Muhammad Haris Mughees, Tabitha Ogilvie, Rehan Rishi, Guy N. Rothblum, Kunal Talwar, Karl Tarbe, Ruiyu Zhu, Marco Zuliani

    Abstract: This paper presents Wally, a private search system that supports efficient semantic and keyword search queries against large databases. When sufficient clients are making the queries, Wally performance is significantly better than previous systems. In previous private search systems, for each client query, the server must perform at least one expensive cryptographic operation per database entry. A… ▽ More

    Submitted 12 June, 2024; v1 submitted 10 June, 2024; originally announced June 2024.

  2. arXiv:2109.08189  [pdf, other

    cs.CR

    PrivateFetch: Scalable Catalog Delivery in Privacy-Preserving Advertising

    Authors: Muhammad Haris Mughees, Gonçalo Pestana, Alex Davidson, Benjamin Livshits

    Abstract: In order to preserve the possibility of an Internet that is free at the point of use, attention is turning to new solutions that would allow targeted advertisement delivery based on behavioral information such as user preferences, without compromising user privacy. Recently, explorations in devising such systems either take approaches that rely on semantic guarantees like $k$-anonymity -- which ca… ▽ More

    Submitted 16 September, 2021; originally announced September 2021.

  3. arXiv:1811.10296  [pdf, other

    cs.CR

    Distributed and Secure ML with Self-tallying Multi-party Aggregation

    Authors: Yunhui Long, Tanmay Gangwani, Haris Mughees, Carl Gunter

    Abstract: Privacy preserving multi-party computation has many applications in areas such as medicine and online advertisements. In this work, we propose a framework for distributed, secure machine learning among untrusted individuals. The framework consists of two parts: a two-step training protocol based on homomorphic addition and a zero knowledge proof for data validity. By combining these two techniques… ▽ More

    Submitted 26 November, 2018; originally announced November 2018.

    Comments: NeurIPS 2018 Workshop on PPML

  4. arXiv:1605.08763  [pdf, other

    cs.CY

    Smartphone Fingerprinting Via Motion Sensors: Analyzing Feasibility at Large-Scale and Studying Real Usage Patterns

    Authors: Anupam Das, Nikita Borisov, Edward Chou, Muhammad Haris Mughees

    Abstract: Advertisers are increasingly turning to fingerprinting techniques to track users across the web. As web browsing activity shifts to mobile platforms, traditional browser fingerprinting techniques become less effective; however, device fingerprinting using built-in sensors offers a new avenue for attack. We study the feasibility of using motion sensors to perform device fingerprinting at scale, and… ▽ More

    Submitted 13 June, 2016; v1 submitted 27 May, 2016; originally announced May 2016.

  5. arXiv:1605.05841  [pdf, other

    cs.CR cs.CY

    A First Look at Ad-block Detection: A New Arms Race on the Web

    Authors: Muhammad Haris Mughees, Zhiyun Qian, Zubair Shafiq, Karishma Dash, Pan Hui

    Abstract: The rise of ad-blockers is viewed as an economic threat by online publishers, especially those who primarily rely on ad- vertising to support their services. To address this threat, publishers have started retaliating by employing ad-block detectors, which scout for ad-blocker users and react to them by restricting their content access and pushing them to whitelist the website or disabling ad-bloc… ▽ More

    Submitted 19 May, 2016; originally announced May 2016.

    Comments: 12 pages, 12 figures