Taking proof-based verified computation a few steps closer to practicality (extended version) S Setty, V Vu, N Panpalia, B Braun, M Ali, A Blumberg, M Walfish Cryptology ePrint Archive, 2013 | 218* | 2013 |
Parallel collaborative filtering for streaming data M Ali, CC Johnson, AK Tang University of Texas Austin, Tech. Rep, 5-7, 2011 | 23 | 2011 |
HAC-T and fast search for similarity in security J Oliver, M Ali, J Hagen 2020 International Conference on Omni-layer Intelligent Systems (COINS), 1-7, 2020 | 14 | 2020 |
Scalable malware clustering using multi-stage tree parallelization M Ali, J Hagen, J Oliver 2020 IEEE International Conference on Intelligence and Security Informatics …, 2020 | 7 | 2020 |
Two-phase nonrepudiation protocols M Ali, R Reaz, M Gouda Proceedings of the 7th International Conference on Computing Communication …, 2016 | 5 | 2016 |
The implication problem of computing policies R Reaz, M Ali, MG Gouda, MJH Heule, ES Elmallah Symposium on Self-Stabilizing Systems, 109-123, 2015 | 5 | 2015 |
Nonrepudiation protocols without a trusted party M Ali, R Reaz, MG Gouda International Conference on Networked Systems, 1-15, 2016 | 3 | 2016 |
Nonrepudiation protocols in cloud systems M Ali, M Gouda Proceedings of the 7th International Conference on Computing Communication …, 2016 | 2 | 2016 |
An Evaluation of Malware Triage Similarity Hashes. H Liu, J Hagen, M Ali, J Oliver ICEIS (1), 431-435, 2023 | 1 | 2023 |
A second generation of nonrepudiation protocols M Ali | | 2017 |
Fast Clustering of High Dimensional Data Clustering the Malware Bazaar Dataset J Oliver, M Ali, H Liu, J Hagen | | |