default search action
Muhammad Ikram 0001
Person information
- affiliation: Macquarie University, Data61, CSIRO, NSW, Australia
- affiliation: University of Michigan, Ann Arbor, MI, USA
- affiliation (2010-2013): Technische Universität Darmstadt, Peer-to-Peer Networks Group, Germany
- affiliation (2008-2010): Ajou University, Department of Computer Engineering, Suwon, Korea
Other persons with the same name
- Muhammad Ikram — disambiguation page
- Muhammad Ikram 0002 — University of Queensland, Electromagnetic Innovations (EMAGin) Group, Brisbane, QLD, Australia (and 2 more)
- Muhammad Ikram 0003 — University of Engineering and Technology, Department of Computer Systems Engineering, Peshawar, Pakistan
Other persons with a similar name
- Muhammad Ikram Ashraf (aka: Ikram Ashraf)
- Muhammad Ikram Hafiz
- Muhammad Haris Ikram
- Muhammad Jawad Ikram
- Muhammad Touseef Ikram
- Muhammad Z. Ikram
- Muhammad Ikram Ullah Lali
- Muhammad Ikram Qadri
- Muhammad Dinul Ikram Mohd Radzi
- Muhammad Ikram Mohd Rashid (aka: Muhammad Ikram bin Mohd Rashid)
- show all similar names
SPARQL queries
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2025
- [j13]Muhammad Sajjad Akbar, Zawar Hussain, Muhammad Ikram, Quan Z. Sheng, Subhas Chandra Mukhopadhyay:
On challenges of sixth-generation (6G) wireless networks: A comprehensive survey of requirements, applications, and security issues. J. Netw. Comput. Appl. 233: 104040 (2025) - 2024
- [j12]Muhammad Salman, Muhammad Ikram, Mohamed Ali Kâafar:
Investigating Evasive Techniques in SMS Spam Filtering: A Comparative Analysis of Machine Learning Models. IEEE Access 12: 24306-24324 (2024) - [j11]Houssem Jmal, Firas Ben Hmida, Nardine Basta, Muhammad Ikram, Mohamad Ali Kâafar, Andy Walker:
SPGNN-API: A Transferable Graph Neural Network for Attack Paths Identification and Autonomous Mitigation. IEEE Trans. Inf. Forensics Secur. 19: 1601-1613 (2024) - [j10]Hassan Jameel Asghar, Benjamin Zi Hao Zhao, Muhammad Ikram, Giang Linh Duc Nguyen, Dali Kaafar, Sean Lamont, Daniel Coscia:
Use of cryptography in malware obfuscation. J. Comput. Virol. Hacking Tech. 20(1): 135-152 (2024) - [c31]Mohammad Majid Akhtar, Rahat Masood, Muhammad Ikram, Salil S. Kanhere:
SoK: False Information, Bots and Malicious Campaigns: Demystifying Elements of Social Media Manipulations. AsiaCCS 2024 - [i31]Hina Qayyum, Muhammad Ikram, Benjamin Zi Hao Zhao, Ian D. Wood, Nicolas Kourtellis, Mohamed Ali Kâafar:
Exploring the Distinctive Tweeting Patterns of Toxic Twitter Users. CoRR abs/2401.14141 (2024) - [i30]Hina Qayyum, Muhammad Ikram, Benjamin Zi Hao Zhao, Ian D. Wood, Nicolas Kourtellis, Mohamed Ali Kâafar:
On mission Twitter Profiles: A Study of Selective Toxic Behavior. CoRR abs/2401.14252 (2024) - [i29]Mohammad Majid Akhtar, Navid Shadman Bhuiyan, Rahat Masood, Muhammad Ikram, Salil S. Kanhere:
BotSSCL: Social Bot Detection with Self-Supervised Contrastive Learning. CoRR abs/2402.03740 (2024) - [i28]Benjamin Zi Hao Zhao, Muhammad Ikram, Mohamed Ali Kâafar:
GPTs Window Shopping: An analysis of the Landscape of Custom ChatGPT Models. CoRR abs/2405.10547 (2024) - [i27]Hina Qayyum, Muhammad Ikram, Benjamin Zi Hao Zhao, Ian D. Wood, Mohamad Ali Kâafar, Nicolas Kourtellis:
SenTopX: Benchmark for User Sentiment on Various Topics. CoRR abs/2406.02801 (2024) - [i26]Muhammad Salman, Benjamin Zi Hao Zhao, Hassan Jameel Asghar, Muhammad Ikram, Sidharth Kaushik, Mohamed Ali Kâafar:
On the Robustness of Malware Detectors to Adversarial Samples. CoRR abs/2408.02310 (2024) - 2023
- [j9]Bibhas Sharma, Ishan Karunanayake, Rahat Masood, Muhammad Ikram:
Don't Be a Victim During a Pandemic! Analysing Security and Privacy Threats in Twitter During COVID-19. IEEE Access 11: 29769-29789 (2023) - [c30]I Wayan Budi Sentana, Muhammad Ikram, Mohamed Ali Kâafar:
An Empirical Analysis of Security and Privacy Risks in Android Cryptocurrency Wallet Apps. ACNS 2023: 699-725 - [c29]Hina Qayyum, Muhammad Ikram, Benjamin Zi Hao Zhao, Ian D. Wood, Nicolas Kourtellis, Mohamed Ali Kâafar:
Exploring the Distinctive Tweeting Patterns of Toxic Twitter Users. IEEE Big Data 2023: 3624-3633 - [c28]Hina Qayyum, Muhammad Ikram, Benjamin Zi Hao Zhao, Ian D. Wood, Nicolas Kourtellis, Mohamed Ali Kâafar:
On mission Twitter Profiles: A Study of Selective Toxic Behavior. IEEE Big Data 2023: 3634-3643 - [c27]Mohammad Majid Akhtar, Ishan Karunanayake, Bibhas Sharma, Rahat Masood, Muhammad Ikram, Salil S. Kanhere:
Towards Automatic Annotation and Detection of Fake News. LCN 2023: 1-9 - [c26]Hina Qayyum, Benjamin Zi Hao Zhao, Ian D. Wood, Muhammad Ikram, Nicolas Kourtellis, Mohamed Ali Kâafar:
A longitudinal study of the top 1% toxic Twitter profiles. WebSci 2023: 292-303 - [i25]Hina Qayyum, Benjamin Zi Hao Zhao, Ian D. Wood, Muhammad Ikram, Mohamed Ali Kâafar, Nicolas Kourtellis:
A longitudinal study of the top 1% toxic Twitter profiles. CoRR abs/2303.14603 (2023) - [i24]Houssem Jmal, Firas Ben Hmida, Nardine Basta, Muhammad Ikram, Mohamed Ali Kâafar, Andy Walker:
SPGNN-API: A Transferable Graph Neural Network for Attack Paths Identification and Autonomous Mitigation. CoRR abs/2305.19487 (2023) - [i23]Mohammad Majid Akhtar, Rahat Masood, Muhammad Ikram, Salil S. Kanhere:
False Information, Bots and Malicious Campaigns: Demystifying Elements of Social Media Manipulations. CoRR abs/2308.12497 (2023) - 2022
- [c25]Nardine Basta, Muhammad Ikram, Mohamed Ali Kâafar, Andy Walker:
Towards a Zero-Trust Micro-segmentation Network Security Strategy: An Evaluation Framework. NOMS 2022: 1-7 - [c24]Hina Qayyum, Muhammad Salman, I Wayan Budi Sentana, Giang Linh Duc Nguyen, Muhammad Ikram, Gareth Tyson, Mohamed Ali Kâafar:
A First Look at Android Apps' Third-Party Resources Loading. NSS 2022: 193-213 - [c23]Nazar Waheed, Muhammad Ikram, Saad Sajid Hashmi, Xiangjian He, Priyadarsi Nanda:
An Empirical Assessment of Security and Privacy Risks of Web-Based Chatbots. WISE 2022: 325-339 - [i22]Hina Qayyum, Benjamin Zi Hao Zhao, Ian D. Wood, Muhammad Ikram, Mohamed Ali Kâafar, Nicolas Kourtellis:
A deep dive into the consistently toxic 1% of Twitter. CoRR abs/2202.07853 (2022) - [i21]Bibhas Sharma, Ishan Karunanayake, Rahat Masood, Muhammad Ikram:
Analysing Security and Privacy Threats in the Lockdown Periods of COVID-19 Pandemic: Twitter Dataset Case Study. CoRR abs/2202.10543 (2022) - [i20]Muhammad Ikram, Rahat Masood, Gareth Tyson, Mohamed Ali Kâafar, Roya Ensafi:
A Study of Third-party Resources Loading on Web. CoRR abs/2203.03077 (2022) - [i19]Nardine Basta, Ming Ding, Muhammad Ikram, Mohamed Ali Kâafar:
5G-Enabled Pseudonymity for Cooperative Intelligent Transportation System. CoRR abs/2203.10673 (2022) - [i18]Nazar Waheed, Muhammad Ikram, Saad Sajid Hashmi, Xiangjian He, Priyadarsi Nanda:
An Empirical Assessment of Security and Privacy Risks of Web based-Chatbots. CoRR abs/2205.08252 (2022) - [i17]Mohd Majid Akhtar, Bibhas Sharma, Ishan Karunanayake, Rahat Masood, Muhammad Ikram, Salil S. Kanhere:
Machine Learning-based Automatic Annotation and Detection of COVID-19 Fake News. CoRR abs/2209.03162 (2022) - [i16]Muhammad Salman, Muhammad Ikram, Mohamed Ali Kâafar:
An Empirical Analysis of SMS Scam Detection Systems. CoRR abs/2210.10451 (2022) - [i15]Hassan Jameel Asghar, Benjamin Zi Hao Zhao, Muhammad Ikram, Giang L. D. Nguyen, Dali Kaafar, Sean Lamont, Daniel Coscia:
SoK: Use of Cryptography in Malware Obfuscation. CoRR abs/2212.04008 (2022) - [i14]Hassan Jameel Asghar, Benjamin Zi Hao Zhao, Muhammad Ikram, Giang Linh Duc Nguyen, Dali Kaafar, Sean Lamont, Daniel Coscia:
SoK: Use of Cryptography in Malware Obfuscation. IACR Cryptol. ePrint Arch. 2022: 1699 (2022) - 2021
- [j8]Nazar Waheed, Xiangjian He, Muhammad Ikram, Muhammad Usman, Saad Sajid Hashmi, Muhammad Usman:
Security and Privacy in IoT Using Machine Learning and Blockchain: Threats and Countermeasures. ACM Comput. Surv. 53(6): 122:1-122:37 (2021) - [j7]Gioacchino Tangari, Muhammad Ikram, I Wayan Budi Sentana, Kiran Ijaz, Mohamed Ali Kâafar, Shlomo Berkovsky:
Analyzing security issues of android mobile health and medical applications. J. Am. Medical Informatics Assoc. 28(10): 2074-2084 (2021) - [c22]Saad Sajid Hashmi, Nazar Waheed, Gioacchino Tangari, Muhammad Ikram, Stephen Smith:
Longitudinal Compliance Analysis of Android Applications with Privacy Policies. MobiQuitous 2021: 280-305 - [c21]I Wayan Budi Sentana, Muhammad Ikram, Mohamed Ali Kâafar, Shlomo Berkovsky:
Empirical Security and Privacy Analysis of Mobile Symptom Checking Apps on Google Play. SECRYPT 2021: 665-673 - [c20]I Wayan Budi Sentana, Muhammad Ikram, Mohamed Ali Kâafar:
BlockJack: Towards Improved Prevention of IP Prefix Hijacking Attacks in Inter-domain Routing via Blockchain. SECRYPT 2021: 674-679 - [i13]Saad Sajid Hashmi, Nazar Waheed, Gioacchino Tangari, Muhammad Ikram, Stephen Smith:
Longitudinal Compliance Analysis of AndroidApplications with Privacy Policies. CoRR abs/2106.10035 (2021) - [i12]I Wayan Budi Sentana, Muhammad Ikram, Mohamed Ali Kâafar:
BlockJack: Towards Improved Prevention of IP Prefix Hijacking Attacks in Inter-Domain Routing Via Blockchain. CoRR abs/2107.07063 (2021) - [i11]I Wayan Budi Sentana, Muhammad Ikram, Mohamed Ali Kâafar, Shlomo Berkovsky:
Empirical Security and Privacy Analysis of Mobile Symptom Checking Applications on Google Play. CoRR abs/2107.13754 (2021) - [i10]Nardine Basta, Muhammad Ikram, Mohamed Ali Kâafar, Andy Walker:
Towards a Zero-Trust Micro-segmentation Network Security Strategy: An Evaluation Framework. CoRR abs/2111.10967 (2021) - 2020
- [j6]Muhammad Ikram, Rahat Masood, Gareth Tyson, Mohamed Ali Kâafar, Noha Loizon, Roya Ensafi:
Measuring and Analysing the Chain of Implicit Trust: A Study of Third-party Resources Loading. ACM Trans. Priv. Secur. 23(2): 8:1-8:27 (2020) - [c19]I Wayan Budi Sentana, Muhammad Ikram, Mohamed Ali Kâafar:
BlockJack: Blocking IP Prefix Hijacker in Inter-Domain Routing. StudentWorkshop@CoNEXT 2020: 1-2 - [c18]Reethika Ramesh, Ram Sundara Raman, Matthew Bernhard, Victor Ongkowijaya, Leonid Evdokimov, Anne Edmundson, Steven Sprecher, Muhammad Ikram, Roya Ensafi:
Decentralized Control: A Case Study of Russia. NDSS 2020 - [c17]Zhushou Tang, Ke Tang, Minhui Xue, Yuan Tian, Sen Chen, Muhammad Ikram, Tielei Wang, Haojin Zhu:
iOS, Your OS, Everybody's OS: Vetting and Analyzing Network Services of iOS Applications. USENIX Security Symposium 2020: 2415-2432
2010 – 2019
- 2019
- [j5]Jingxiu Su, Zhenyu Li, Stéphane Grumbach, Muhammad Ikram, Kavé Salamatian, Gaogang Xie:
A Cartography of Web Tracking using DNS Records. Comput. Commun. 134: 83-95 (2019) - [c16]Benjamin Zi Hao Zhao, Muhammad Ikram, Hassan Jameel Asghar, Mohamed Ali Kâafar, Abdelberi Chaabane, Kanchana Thilakarathna:
A Decade of Mal-Activity Reporting: A Retrospective Analysis of Internet Malicious Activity Blacklists. AsiaCCS 2019: 193-205 - [c15]Muhammad Ikram, Pierrick Beaume, Mohamed Ali Kâafar:
DaDiDroid: An Obfuscation Resilient Tool for Detecting Android Malware via Weighted Directed Call Graph Modelling. ICETE (2) 2019: 211-219 - [c14]Saad Sajid Hashmi, Muhammad Ikram, Mohamed Ali Kâafar:
A Longitudinal Analysis of Online Ad-Blocking Blacklists. LCN Symposium 2019: 158-165 - [c13]Saad Sajid Hashmi, Muhammad Ikram, Stephen Smith:
On optimization of ad-blocking lists for mobile devices. MobiQuitous 2019: 220-227 - [c12]Muhammad Ikram, Rahat Masood, Gareth Tyson, Mohamed Ali Kâafar, Noha Loizon, Roya Ensafi:
The Chain of Implicit Trust: An Analysis of the Web Third-party Resources Loading. WWW 2019: 2851-2857 - [i9]Muhammad Ikram, Rahat Masood, Gareth Tyson, Mohamed Ali Kâafar, Noha Loizon, Roya Ensafi:
The Chain of Implicit Trust: An Analysis of the Web Third-party Resources Loading. CoRR abs/1901.07699 (2019) - [i8]Benjamin Zi Hao Zhao, Muhammad Ikram, Hassan Jameel Asghar, Mohamed Ali Kâafar, Abdelberi Chaabane, Kanchana Thilakarathna:
A Decade of Mal-Activity Reporting: A Retrospective Analysis of Internet Malicious Activity Blacklists. CoRR abs/1904.10629 (2019) - [i7]Muhammad Ikram, Pierrick Beaume, Mohamed Ali Kâafar:
DaDiDroid: An Obfuscation Resilient Tool for Detecting Android Malware via Weighted Directed Call Graph Modelling. CoRR abs/1905.09136 (2019) - [i6]Saad Sajid Hashmi, Muhammad Ikram, Mohamed Ali Kâafar:
A Longitudinal Analysis of Online Ad-Blocking Blacklists. CoRR abs/1906.00166 (2019) - 2018
- [b1]Muhammad Ikram:
Analysis and design of secure and privacy preserving systems. University of New South Wales, Sydney, Australia, 2018 - [c11]Jingxiu Su, Zhenyu Li, Stéphane Grumbach, Muhammad Ikram, Kavé Salamatian, Gaogang Xie:
Web Tracking Cartography with DNS Records. IPCCC 2018: 1-8 - [c10]Rahat Masood, Dinusha Vatsalan, Muhammad Ikram, Mohamed Ali Kâafar:
Incognito: A Method for Obfuscating Web Data. WWW 2018: 267-276 - 2017
- [j4]Muhammad Ikram, Hassan Jameel Asghar, Mohamed Ali Kâafar, Anirban Mahanti, Balachander Krishnamurthy:
Towards Seamless Tracking-Free Web: Improved Detection of Trackers via One-class Learning. Proc. Priv. Enhancing Technol. 2017(1): 79-99 (2017) - [j3]Muhammad Ikram, Lucky Onwuzurike, Shehroze Farooqi, Emiliano De Cristofaro, Arik Friedman, Guillaume Jourjon, Mohamed Ali Kâafar, M. Zubair Shafiq:
Measuring, Characterizing, and Detecting Facebook Like Farms. ACM Trans. Priv. Secur. 20(4): 13:1-13:28 (2017) - [c9]Shehroze Farooqi, Guillaume Jourjon, Muhammad Ikram, Mohamed Ali Kâafar, Emiliano De Cristofaro, Muhammad Zubair Shafiq, Arik Friedman, Fareed Zaffar:
Characterizing key stakeholders in an online black-hat marketplace. eCrime 2017: 17-27 - [c8]Muhammad Ikram, Mohamed Ali Kâafar:
A first look at mobile Ad-Blocking apps. NCA 2017: 343-350 - [i5]Muhammad Ikram, Lucky Onwuzurike, Shehroze Farooqi, Emiliano De Cristofaro, Arik Friedman, Guillaume Jourjon, Mohamed Ali Kâafar, M. Zubair Shafiq:
Measuring, Characterizing, and Detecting Facebook Like Farms. CoRR abs/1707.00190 (2017) - [i4]Muhammad Ikram, Mohamed Ali Kâafar:
A First Look at Ad Blocking Apps on Google Play. CoRR abs/1709.02901 (2017) - 2016
- [c7]Muhammad Ikram, Narseo Vallina-Rodriguez, Suranga Seneviratne, Mohamed Ali Kâafar, Vern Paxson:
An Analysis of the Privacy and Security Risks of Android VPN Permission-enabled Apps. Internet Measurement Conference 2016: 349-364 - [i3]Muhammad Ikram, Hassan Jameel Asghar, Mohamed Ali Kâafar, Balachander Krishnamurthy, Anirban Mahanti:
Towards Seamless Tracking-Free Web: Improved Detection of Trackers via One-class Learning. CoRR abs/1603.06289 (2016) - 2015
- [i2]Shehroze Farooqi, Muhammad Ikram, Gohar Irfan, Emiliano De Cristofaro, Arik Friedman, Guillaume Jourjon, Mohamed Ali Kâafar, Muhammad Zubair Shafiq, Fareed Zaffar:
Characterizing Seller-Driven Black-Hat Marketplaces. CoRR abs/1505.01637 (2015) - [i1]Muhammad Ikram, Lucky Onwuzurike, Emiliano De Cristofaro, Arik Friedman, Guillaume Jourjon, Mohamed Ali Kâafar, M. Zubair Shafiq:
Spying on Spammers: Tracking Like Farm Accounts on Facebook. CoRR abs/1506.00506 (2015) - 2014
- [j2]Seng-Kyoun Jo, Muhammad Ikram, Ilgu Jung, Won Ryu, Jinsul Kim:
Power Efficient Clustering for Wireless Multimedia Sensor Network. Int. J. Distributed Sens. Networks 10 (2014) - [c6]Muhammad Ikram, Hassan Asghar, Mohamed Ali Kâafar, Anirban Mahanti:
On the Intrusiveness of JavaScript on the Web. CoNEXT Student Workshop 2014: 31-33 - 2013
- [p1]Kamill Panitzek, Muhammad Ikram, Michael Stein:
Service Overlays. Benchmarking Peer-to-Peer Systems 2013: 113-140 - 2012
- [j1]Kamill Panitzek, Muhammad Ikram, Max Mühlhäuser, Thorsten Strufe:
Smooth Resilient Service Provision in Large Heterogeneous Networks. Prax. Inf.verarb. Kommun. 35(3): 167-173 (2012)
2000 – 2009
- 2009
- [c5]Yihun Alemu, Jong-bin Koh, Muhammad Ikram, Dong-Kyoo Kim:
Image Retrieval in Multimedia Databases: A Survey. IIH-MSP 2009: 681-689 - [c4]Muhammad Ikram, Aminul Haque Chowdhury, Bilal Zafar, Hyon-Soo Cha, Ki-Hyung Kim, Seung-Wha Yoo, Dong-Kyoo Kim:
A simple lightweight authentic bootstrapping protocol for IPv6-based low rate wireless personal area networks (6LoWPANs). IWCMC 2009: 937-941 - [c3]Aminul Haque Chowdhury, Muhammad Ikram, Hyon-Soo Cha, Hassen Redwan, S. M. Saif Shams, Ki-Hyung Kim, Seung-Wha Yoo:
Route-over vs mesh-under routing in 6LoWPAN. IWCMC 2009: 1208-1212 - 2008
- [c2]Aminul Haque Chowdhury, Muhammad Ikram, Ki-Hyung Kim:
Secure and Survivable Group Communication over MANET Using CRTDH Based on a Virtual Subnet Model. APSCC 2008: 638-643 - [c1]Muhammad Ikram, Aminul Haque Chowdhury, Hassen Redwan, Jong-bin Koh, Ki-Hyung Kim, Dong-Kyoo Kim:
A Lightweight Mutual Authentication Scheme for Mobile Radio Frequency IDentification (mRFID) Systems. IPCCC 2008: 289-296
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-10 20:45 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint