Efficient iterative deepening for bounded exhaustive generation of complex structures |
Affan Rauf, Muhammad Nawaz, Junaid Haroon Siddiqui
|
Proceedings of the 40th International Conference on Software Engineering: Companion Proceedings |
Internet Security and Privacy Lab, LUMS |
A* |
Measuring and Mitigating OAuth Access Token Abuse by Collusion Networks |
Muhammad Faraz Tariq , Abdul Qayyum Khan , Muhammad Abid, Ghulam Mustafa |
Communications of the ACM, ACM
|
Internet Security and Privacy Lab, LUMS |
IF- 4.55 |
Data-Driven Robust Fault Detection and Isolation of Three-Phase Induction Motor |
Muhammad Faraz Tariq ; Abdul Qayyum Khan ; Muhammad Abid ; Ghulam Mustafa |
IEEE Transactions on Industrial Electronics/
IEEE
|
Critical Infrastructure Protection & Malware Analysis, PIEAS |
IF- 8.7 |
Cellular Networks under Signalling Attacks
Sol2js: Translating Solidity Contracts into Javascript for Hyperledger Fabric
|
MA Zafar, F Sher, MU Janjua, S Baset
|
SERIAL'18: Proceedings of the 2nd Workshop on Scalable and Resilient Infrastructures for Distributed Ledgers
|
Blockchain Security Lab, ITU Lahore |
Not Ranked |
TRIMMER: application specialization for code debloating
|
Hashim Sharif, Muhammad Abubakar, Ashish Gehani, Fareed Zaffar
|
Proceedings of the 33rd ACM/IEEE International Conference on Automated Software Engineering
|
Internet Security and Privacy Lab, LUMS |
A |
Exploring Server-Side Blocking of Regions
|
Sadia Afroz, Michael Carl Tschantz, Shaarif Sajid, Shoaib Asif Qazi, Mobin Javed, Vern Paxson
|
Usenix Security Symposium
|
Internet Security and Privacy Lab, LUMS |
A* |