Haaroon Yousaf
Haaroon Yousaf
Pometry, IC3 (Cornell Tech)
Verified email at - Homepage
Cited by
Cited by
An Empirical Analysis of Anonymity in Zcash
G Kappos, H Yousaf, M Maller, S Meiklejohn
27th USENIX Security Symposium (USENIX Security 18), 463-477, 2018
Tracing Transactions Across Cryptocurrency Ledgers
H Yousaf, G Kappos, S Meiklejohn
28th USENIX Security Symposium (USENIX Security 19), 837-850, 2019
An Empirical Analysis of Privacy in the Lightning Network
G Kappos, H Yousaf, A Piotrowska, S Kanjalkar, S Delgado-Segura, ...
Financial Cryptography and Data Security 2021, 2020
Why is a Ravencoin Like a TokenDesk? An Exploration of Code Diversity in the Cryptocurrency Landscape
P Reibel, H Yousaf, S Meiklejohn
Financial Cryptography and Data Security 2019, 2018
How to Peel a Million: Validating and Expanding Bitcoin Clusters
G Kappos, H Yousaf, R Stütz, S Rollet, B Haslhofer, S Meiklejohn
31st USENIX Security Symposium (USENIX Security 22) 31, 2022
Forsage: Anatomy of a Smart-Contract Pyramid Scheme
T Kell, H Yousaf, S Allen, S Meiklejohn, A Juels
Financial Cryptography and Data Security 2023, 2023
Non-Markovian paths and cycles in NFT trades
H Yousaf, NA Arnold, R Lambiotte, T LaRock, RG Clegg, P Zhong, ...
ComplexDataBlocks: Data Science and Complexity on the Blockchain 2022, 2023
PhD Thesis: Investigating transactions in cryptocurrencies
H Yousaf
arXiv preprint arXiv:2203.14684, 2022
Raphtory: The temporal graph engine for Rust and Python
B Steer, N Arnold, CT Ba, R Lambiotte, H Yousaf, L Jeub, F Murariu, ...
arXiv preprint arXiv:2306.16309, 2023
Incentivising Privacy in Cryptocurrencies
S Azouvi, H Yousaf, A Hicks
arXiv preprint arXiv:1901.02695, 2019
The system can't perform the operation now. Try again later.
Articles 1–10