Follow
Amir Houmansadr
Title
Cited by
Cited by
Year
Comprehensive privacy analysis of deep learning: Passive and active white-box inference attacks against centralized and federated learning
M Nasr, R Shokri, A Houmansadr
2019 IEEE symposium on security and privacy (SP), 739-753, 2019
903*2019
Machine learning with membership privacy using adversarial regularization
M Nasr, R Shokri, A Houmansadr
Proceedings of the 2018 ACM SIGSAC conference on computer and communications …, 2018
2912018
The parrot is dead: Observing unobservable network communications
A Houmansadr, C Brubaker, V Shmatikov
2013 IEEE Symposium on Security and Privacy, 65-79, 2013
2202013
RAINBOW: A Robust And Invisible Non-Blind Watermark for Network Flows.
A Houmansadr, N Kiyavash, N Borisov
NDSS 2009, 406-422, 2009
1862009
Cirripede: Circumvention infrastructure using router redirection with plausible deniability
A Houmansadr, GTK Nguyen, M Caesar, N Borisov
Proceedings of the 18th ACM conference on Computer and communications …, 2011
1612011
Information hiding in communication networks: fundamentals, mechanisms, applications, and countermeasures
W Mazurczyk, S Wendzel, S Zander, A Houmansadr, K Szczypiorski
John Wiley & Sons, 2016
1562016
Stegobot: a covert social network botnet
S Nagaraja, A Houmansadr, P Piyawongwisal, V Singh, P Agarwal, ...
International Workshop on Information Hiding, 299-313, 2011
1292011
A Cloud-based Intrusion Detection and Response System for Mobile Phones
A Houmansadr, SA Zonouz, R Berthier
5th Workshop on Recent Advances in Intrusion-Tolerant Systems, 2011
1252011
Secloud: A cloud-based comprehensive and lightweight security solution for smartphones
S Zonouz, A Houmansadr, R Berthier, N Borisov, W Sanders
Computers & Security 37, 215-227, 2013
1242013
I want my voice to be heard: IP over Voice-over-IP for unobservable censorship circumvention.
A Houmansadr, TJ Riedl, N Borisov, AC Singer
NDSS, 2013
1212013
SWIRL: A Scalable Watermark to Detect Correlated Network Flows.
A Houmansadr, N Borisov
NDSS, 2011
1182011
Censorspoofer: asymmetric communication using ip spoofing for censorship-resistant web browsing
Q Wang, X Gong, GTK Nguyen, A Houmansadr, N Borisov
Proceedings of the 2012 ACM conference on Computer and communications …, 2012
1132012
DeepCorr: Strong flow correlation attacks on Tor using deep learning
M Nasr, A Bahramali, A Houmansadr
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications …, 2018
1082018
Multi-flow Attacks Against Network Flow Watermarking Schemes.
N Kiyavash, A Houmansadr, N Borisov
USENIX security symposium, 307-320, 2008
1062008
Cronus: Robust and heterogeneous collaborative learning with black-box knowledge transfer
H Chang, V Shejwalkar, R Shokri, A Houmansadr
arXiv preprint arXiv:1912.11279, 2019
802019
Cloudtransport: Using cloud storage for censorship-resistant networking
C Brubaker, A Houmansadr, V Shmatikov
International Symposium on Privacy Enhancing Technologies Symposium, 1-20, 2014
652014
Manipulating the Byzantine: Optimizing Model Poisoning Attacks and Defenses for Federated Learning
V Shejwalkar, A Houmansadr
NDSS, 2021
642021
CoCo: coding-based covert timing channels for network flows
A Houmansadr, N Borisov
International Workshop on Information Hiding, 314-328, 2011
632011
Compressive traffic analysis: A new paradigm for scalable traffic analysis
M Nasr, A Houmansadr, A Mazumdar
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications …, 2017
622017
Graphene: A new protocol for block propagation using set reconciliation
A Pinar Ozisik, G Andresen, G Bissias, A Houmansadr, B Levine
Data Privacy Management, Cryptocurrencies and Blockchain Technology, 420-428, 2017
582017
The system can't perform the operation now. Try again later.
Articles 1–20