Imperial College London

DrHamedHaddadi

Faculty of EngineeringDyson School of Design Engineering

Reader in Human-Centred Systems
 
 
 
//

Contact

 

+44 (0)20 7594 2584h.haddadi Website

 
 
//

Location

 

Dyson BuildingSouth Kensington Campus

//

Summary

 

Publications

Publication Type
Year
to

98 results found

Malekzadeh M, Clegg RG, Cavallaro A, Haddadi Het al., 2018, Protecting sensory data against sensitive inferences, Workshop on Privacy by Design in Distributed Systems 2018

There is growing concern about how personal data are used when users grant applications direct access to the sensors in their mobile devices. For example,time-series data generated by motion sensors reflect directly users' activitiesand indirectly their personalities. It is therefore important to designprivacy-preserving data analysis methods that can run on mobile devices. Inthis paper, we propose a feature learning architecture that can be deployed indistributed environments to provide flexible and negotiable privacy-preservingdata transmission. It should be flexible because the internal architecture ofeach component can be independently changed according to users or serviceproviders needs. It is negotiable because expected privacy and utility can benegotiated based on the requirements of the data subject and underlyingapplication. For the specific use-case of activity recognition, we conductedexperiments on two real-world datasets of smartphone's motion sensors, one ofthem is collected by the authors and will be publicly available by this paperfor the first time. Results indicate the proposed framework establishes a goodtrade-off between application's utility and data subjects' privacy. We showthat it maintains the usefulness of the transformed data for activityrecognition (with around an average loss of three percentage points) whilealmost eliminating the possibility of gender classification (from more than90\% to around 50\%, the target random guess). These results also haveimplication for moving from the current binary setting of granting permissionto mobile apps or not, toward a situation where users can grant eachapplication permission over a limited range of inferences according to theprovided services.

Conference paper

Yadav P, Moore J, Li Q, Mortier R, Brown A, Crabtree A, Greenhalgh C, McAuley D, Amar Y, Shamsabadi AS, Haddadi Het al., 2018, Providing Occupancy as a Service with Databox, 1st ACM International Workshop on Smart Cities and Fog Computing (CitiFog), Publisher: ASSOC COMPUTING MACHINERY, Pages: 29-34

Conference paper

Shamsabadi AS, Haddadi H, Cavallaro A, 2018, DISTRIBUTED ONE-CLASS LEARNING, Publisher: IEEE

Working paper

Katevas K, Tokarchuk L, Haddadi H, Clegg RG, Irfan Met al., 2017, Detecting Group Formations using iBeacon Technology, 15th ACM Annual International Conference on Mobile Systems, Applications, and Services (MobiSys), Publisher: ASSOC COMPUTING MACHINERY, Pages: 190-190

Conference paper

Hansel K, Haddadi H, Alomainy A, 2017, AWSense - A Framework for Collecting Sensing Data from the Apple Watch, 15th ACM Annual International Conference on Mobile Systems, Applications, and Services (MobiSys), Publisher: ASSOC COMPUTING MACHINERY, Pages: 188-188

Conference paper

Perera C, Wakenshaw SYL, Baarslag T, Haddadi H, Bandara AK, Mortier R, Crabtree A, Ng ICL, McAuley D, Crowcroft Jet al., 2017, Valorising the IoT Databox: creating value for everyone, TRANSACTIONS ON EMERGING TELECOMMUNICATIONS TECHNOLOGIES, Vol: 28, ISSN: 2161-3915

Journal article

Crabtree A, Lodge T, Colley J, Greenhalgh C, Mortier R, Haddadi Het al., 2016, Enabling the new economic actor: data protection, the digital economy, and the Databox, Personal and Ubiquitous Computing, Vol: 20, Pages: 947-957, ISSN: 0949-2054

This paper offers a sociological perspective on data protection regulation and its relevance to design. From this perspective, proposed regulation in Europe and the USA seeks to create a new economic actor—the consumer as personal data trader—through new legal frameworks that shift the locus of agency and control in data processing towards the individual consumer or “data subject”. The sociological perspective on proposed data regulation recognises the reflexive relationship between law and the social order, and the commensurate needs to balance the demand for compliance with the design of computational tools that enable this new economic actor. We present the Databox model as a means of providing data protection and allowing the individual to exploit personal data to become an active player in the emerging data economy.

Journal article

Naderi PT, Malazi HT, Ghassemian M, Haddadi Het al., 2016, Quality of Claim Metrics in Social Sensing Systems: A case study on IranDeal, 6th International Conference on Computer and Knowledge Engineering (ICCKE), Publisher: IEEE, Pages: 129-135

Conference paper

Fard MA, Haddadi H, Targhi AT, 2016, Fruits and Vegetables Calorie Counter Using Convolutional Neural Networks, 6th International Conference on Digital Health (DH), Publisher: ASSOC COMPUTING MACHINERY, Pages: 121-122

Conference paper

Rich J, Haddadi H, Hospedales TM, 2016, Towards Bottom-Up Analysis of Social Food, 6th International Conference on Digital Health (DH), Publisher: ASSOC COMPUTING MACHINERY, Pages: 111-120

Conference paper

Tyson G, Perta VC, Haddadi H, Seto MCet al., 2016, A First Look at User Activity on Tinder, 8th IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM), Publisher: IEEE, Pages: 461-466

Conference paper

Cunha TO, Weber I, Haddadi H, Pappa GLet al., 2016, The Effect of Social Feedback in a Reddit Weight Loss Community, 6th International Conference on Digital Health (DH), Publisher: ASSOC COMPUTING MACHINERY, Pages: 99-103

Conference paper

Katevas K, Haddadi H, Tokarchuk L, Clegg RGet al., 2016, Detecting Group Formations using iBeacon Technology, ACM International Joint Conference on Pervasive and Ubiquitous Computing (UbiComp) / 20th ACM International Symposium on Wearable Computers (ISWC), Publisher: ASSOC COMPUTING MACHINERY, Pages: 742-752

Conference paper

Katevas K, Haddadi H, Tokarchuk L, 2016, SensingKit: Evaluating the Sensor Power Consumption in iOS devices, 12th International Conference on Intelligent Environments (IE), Publisher: IEEE, Pages: 222-225, ISSN: 2469-8792

Conference paper

Amar Y, Haddadi H, Mortier R, 2016, Privacy-Aware Infrastructure for Managing Personal Data Personal Data Arbitering within the Databox Framework, ACM Conference on Special Interest Group on Data Communication (SIGCOMM), Publisher: ASSOC COMPUTING MACHINERY, Pages: 571-572

Conference paper

Hansel K, Alomainy A, Haddadi H, 2016, Large Scale Mood and Stress Self-Assessments on a Smartwatch, ACM International Joint Conference on Pervasive and Ubiquitous Computing (UbiComp) / 20th ACM International Symposium on Wearable Computers (ISWC), Publisher: ASSOC COMPUTING MACHINERY, Pages: 1180-1184

Conference paper

Haddadi H, Perta V, 2015, A Glance through the VPN Looking Glass: IPv6 Leakage and DNS Hijacking in Commercial VPN clients, The 15th Privacy Enhancing Technologies Symposium (PETS 2015), Publisher: De Gruyter, Pages: 77-91, ISSN: 2299-0984

Commercial Virtual Private Network (VPN) services have become a popular and convenient technology for users seeking privacy and anonymity. They have been applied to a wide range of use cases, with commercial providers often making bold claims regarding their ability to fulfil each of these needs, e.g., censorship circumvention, anonymity and protection from monitoring and tracking. However, as of yet, the claims made by these providers have not received a sufficiently detailed scrutiny. This paper thus investigates the claims of privacy and anonymity in commercial VPN services. We analyse 14 of the most popular ones, inspecting their internals and their infrastructures. Despite being a known issue, our experimental study reveals that the majority of VPN services suffer from IPv6 traffic leakage. The work is extended by developing more sophisticated DNS hijacking attacks that allow all traffic to be transparently captured.We conclude discussing a range of best practices and countermeasures that can address these vulnerabilities

Conference paper

Amar Y, Haddadi H, Mortier R, 2015, An Information-Theoretic Approach to Time-Series Data Privacy, Workshop on Privacy by Design in Distributed Systems (P2DS), Publisher: ASSOC COMPUTING MACHINERY

Conference paper

Haddadi H, Ofli F, Mejova Y, Weber I, Srivastava Jet al., 2015, 360 degrees Quantified Self, International Conference on Healthcare Informatics (ICHI), Publisher: IEEE, Pages: 587-592

Conference paper

Mejova Y, Haddadi H, Abbar S, Ghahghaei A, Weber Iet al., 2015, Dietary Habits of an Expat Nation: Case of Qatar, International Conference on Healthcare Informatics (ICHI), Publisher: IEEE, Pages: 57-62

Conference paper

Falahrastegar M, Haddadi H, Uhlig S, Mortier Ret al., 2014, The Rise of Panopticons: Examining Region-Specific Third-Party Web Tracking, 6th International Workshop on Traffic Monitoring and Analysis (TMA), Publisher: SPRINGER-VERLAG BERLIN, Pages: 104-114, ISSN: 0302-9743

Conference paper

Katevas K, Haddadi H, Tokarchuk L, 2014, SensingKit - A Multi-Platform Mobile Sensing Framework for Large-Scale Experiments, 20th ACM Annual International Conference on Mobile Computing and Networking (MobiCom), Publisher: ASSOC COMPUTING MACHINERY, Pages: 375-377

Conference paper

Liu H, Hu Z, Haddadi H, Tian Het al., 2013, Hidden link prediction based on node centrality and weak ties, EPL, Vol: 101, ISSN: 0295-5075

Journal article

Hobbs-Chell H, King AJ, Sharratt H, Haddadi H, Rudiger SR, Hailes S, Morton AJ, Wilson AMet al., 2012, Data-loggers carried on a harness do not adversely affect sheep locomotion, RESEARCH IN VETERINARY SCIENCE, Vol: 93, Pages: 549-552, ISSN: 0034-5288

Journal article

King AJ, Wilson AM, Wilshin SD, Lowe J, Haddadi H, Hailes S, Morton AJet al., 2012, Selfish-herd behaviour of sheep under threat, CURRENT BIOLOGY, Vol: 22, Pages: R561-R562, ISSN: 0960-9822

Journal article

Cha M, Benevenuto F, Haddadi H, Gummadi Ket al., 2012, The World of Connections and Information Flow in Twitter, IEEE TRANSACTIONS ON SYSTEMS MAN AND CYBERNETICS PART A-SYSTEMS AND HUMANS, Vol: 42, Pages: 991-998, ISSN: 1083-4427

Journal article

Haddadi H, Mortier R, Hand S, Brown I, Yoneki E, Crowcroft J, McAuley Det al., 2012, Privacy Analytics, ACM SIGCOMM COMPUTER COMMUNICATION REVIEW, Vol: 42, Pages: 94-98, ISSN: 0146-4833

Journal article

Vallina-Rodriguez N, Scellato S, Haddadi H, Forsell C, Crowcroft J, Mascolo Cet al., 2012, Los Twindignados: The Rise of the Indignados Movement on Twitter, ASE/IEEE International Conference on Privacy, Security, Risk and Trust / ASE/IEEE International Confernece on Social Computing (SocialCom/PASSAT), Publisher: IEEE, Pages: 496-501

Conference paper

Fay D, Haddadi H, Uhlig S, Kilmartin L, Moore AW, Kunegis J, Iliofotou Met al., 2011, Discriminating graphs through spectral projections, COMPUTER NETWORKS, Vol: 55, Pages: 3458-3468, ISSN: 1389-1286

Journal article

Haddadi H, King AJ, Wills AP, Fay D, Lowe J, Morton AJ, Hailes S, Wilson AMet al., 2011, Determining association networks in social animals: choosing spatial-temporal criteria and sampling rates, BEHAVIORAL ECOLOGY AND SOCIOBIOLOGY, Vol: 65, Pages: 1659-1668, ISSN: 0340-5443

Journal article

This data is extracted from the Web of Science and reproduced under a licence from Thomson Reuters. You may not copy or re-distribute this data in whole or in part without the written consent of the Science business of Thomson Reuters.

Request URL: http://wlsprd.imperial.ac.uk:80/respub/WEB-INF/jsp/search-html.jsp Request URI: /respub/WEB-INF/jsp/search-html.jsp Query String: id=00964123&limit=30&person=true&page=2&respub-action=search.html