Conference and Workshop Publications
Helping Users Automatically Find and Manage Sensitive, Expendable Files in Cloud Storage
Mohammad Taha Khan, Christopher Tran, Shubham Singh, Dimitri Vasilkov, Chris Kanich, Blase Ur, Elena Zheleva.
Proceedings of the USENIX Security Symposium, Vancouver, B.C., Canada, August 2021.
Blind In/On-Path Attacks and Applications to VPNs
William J. Tolley, Beau Kujath, Mohammad Taha Khan, Narseo Vallina-Rodriguez, Jedidiah R. Crandall.
Proceedings of the USENIX Security Symposium, Vancouver, B.C., Canada, August 2021.
Early Research Scholars Program at UIC
Renata A. Revelo, Joseph Hummel, Mohammad Taha Khan.
Proceedings American Society for Engineering Education (ASEE) Annual Conference, July 2020.
Mainack Mondal, Günce Su Yılmaz, Noah Hirsch, Mohammad Taha Khan, Michael Tang, Christopher Tran, Chris Kanich, Blase Ur, Elena Zheleva.
Proceedings of the ACM Conference on Computer and Communications Security (CCS). London, UK, November 2019.
An Empirical Analysis of the Commercial VPN Ecosystem
Mohammad Taha Khan, Joe DeBlasio, Geoffrey M. Voelker, Alex C. Snoeren, Chris Kanich, Narseo Rodriguez.
Proceedings of the ACM Internet Measurement Conference (IMC). Boston, MA, November 2018.
Making Retrospective Data Management Usable
Noah Hirsch, Chris Kanich, Mohammad Taha Khan, Xuefeng Liu, Mainack Mondal, Michael Tang, Christopher Tran, Blase Ur, William Wang, Günce Su Yilmaz, Elena Zheleva.
Proceedings of the Symposium On Usable Privacy and Security (SOUPS). Baltimore, MD, August 2018.
Integrating Ethics in Cybersecurity Education
Mohammad Taha Khan, Chris Kanich, Cynthia Taylor.
In Proceedings of the New Approaches to Cybersecurity Education (NACE 18), New Orleans, LA, June 2018.
Forgotten But Not Gone: Identifying the Need for Longitudinal Data Management in Cloud Storage
Mohammad Taha Khan, Maria Hyun, Chris Kanich, Blase Ur.
Proceedings of the ACM SIGCHI Conference on Human Factors in Computing Systems (CHI). Montreal, QC, Canada, April 2018.
Old is Still Gold: A Comparison of Cyber and Regular Fraud in the United States
Mohammad Taha Khan, Chris Kanich.
Proceedings of the Workshop on Technology and Consumer Protection (ConPro). San Jose, CA, May 2017.
Sneak-Peek: High Speed Covert Channels in Data-Center Networks
Rashid Tahir, Mohammad Taha Khan, Xun Gong, Adnan Ahmed, AmirEmad Ghassami, Hasanat Kazmi, Matthew Caesar, Fareed Zaffar, Negar Kiyavash.
High Fidelity, High Risk, High Reward: Using High-Fidelity Networking Data in Ethically Sound Research
Mohammad Taha Khan, Chris Kanich.
Proceedings of the ACM SIGCOMM Workshop on Ethics in Networked Systems (NSEthics). London, UK, August 2015.
A Classification Based Framework to Predict Viral Threads
Hashim Sharif, Saad Ismail, Shehroze Farooqi, Mohammad Taha Khan, Muhammad Ali Gulzar, Hasnain Lakhani, Fareed Zaffar, Ahmed Abbasi.
Every Second Counts: Quantifying the Negative Externalities of Cybercrime via Typosquatting
Mohammad Taha Khan, Xiang Huo, Zhou Li, Chris Kanich.
Proceedings of the IEEE Symposium on Security and Privacy (S&P / “Oakland”). San Jose, CA, May 2015.
Efficient Relaying Strategy Selection and Signal Combining using Error Estimation Codes
Mohammad Taha Khan, Talha Anwar, Muhammad Kumail Haider, Momin Uppal.
Proceedings of the IEEE Wireless Communications and Networking Conference (WCNC). Istanbul, Turkey, April 2014.
Technical Reports
Enabling Retrospective Management of Data in the Cloud
Mohammad Taha Khan.
PhD Thesis, University of Illinois, Chicago, 2020.
Packets Lost in the Wild: An Analysis of Empirical Approaches to Measure Internet Censorship
Mohammad Taha Khan.
PhD Qualifier Report, April 2017.