Volgen
Amir Houmansadr
Titel
Geciteerd door
Geciteerd door
Jaar
Comprehensive privacy analysis of deep learning: Passive and active white-box inference attacks against centralized and federated learning
M Nasr, R Shokri, A Houmansadr
2019 IEEE symposium on security and privacy (SP), 739-753, 2019
990*2019
Machine learning with membership privacy using adversarial regularization
M Nasr, R Shokri, A Houmansadr
Proceedings of the 2018 ACM SIGSAC conference on computer and communications …, 2018
3092018
The parrot is dead: Observing unobservable network communications
A Houmansadr, C Brubaker, V Shmatikov
2013 IEEE Symposium on Security and Privacy, 65-79, 2013
2202013
RAINBOW: A Robust And Invisible Non-Blind Watermark for Network Flows.
A Houmansadr, N Kiyavash, N Borisov
NDSS 2009, 406-422, 2009
1832009
Information hiding in communication networks: fundamentals, mechanisms, applications, and countermeasures
W Mazurczyk, S Wendzel, S Zander, A Houmansadr, K Szczypiorski
John Wiley & Sons, 2016
1622016
Cirripede: Circumvention infrastructure using router redirection with plausible deniability
A Houmansadr, GTK Nguyen, M Caesar, N Borisov
Proceedings of the 18th ACM conference on Computer and communications …, 2011
1612011
Stegobot: a covert social network botnet
S Nagaraja, A Houmansadr, P Piyawongwisal, V Singh, P Agarwal, ...
Information Hiding: 13th International Conference, IH 2011, Prague, Czech …, 2011
1282011
Secloud: A cloud-based comprehensive and lightweight security solution for smartphones
S Zonouz, A Houmansadr, R Berthier, N Borisov, W Sanders
Computers & Security 37, 215-227, 2013
1252013
I want my voice to be heard: IP over Voice-over-IP for unobservable censorship circumvention.
A Houmansadr, TJ Riedl, N Borisov, AC Singer
NDSS, 2013
1252013
A Cloud-based Intrusion Detection and Response System for Mobile Phones
A Houmansadr, SA Zonouz, R Berthier
5th Workshop on Recent Advances in Intrusion-Tolerant Systems, 2011
1252011
SWIRL: A Scalable Watermark to Detect Correlated Network Flows.
A Houmansadr, N Borisov
NDSS, 2011
1192011
Censorspoofer: asymmetric communication using ip spoofing for censorship-resistant web browsing
Q Wang, X Gong, GTK Nguyen, A Houmansadr, N Borisov
Proceedings of the 2012 ACM conference on Computer and communications …, 2012
1152012
DeepCorr: Strong flow correlation attacks on Tor using deep learning
M Nasr, A Bahramali, A Houmansadr
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications …, 2018
1122018
Multi-flow Attacks Against Network Flow Watermarking Schemes.
N Kiyavash, A Houmansadr, N Borisov
USENIX security symposium, 307-320, 2008
1092008
Manipulating the Byzantine: Optimizing Model Poisoning Attacks and Defenses for Federated Learning
V Shejwalkar, A Houmansadr
NDSS, 2021
882021
Cronus: Robust and heterogeneous collaborative learning with black-box knowledge transfer
H Chang, V Shejwalkar, R Shokri, A Houmansadr
arXiv preprint arXiv:1912.11279, 2019
852019
Cloudtransport: Using cloud storage for censorship-resistant networking
C Brubaker, A Houmansadr, V Shmatikov
Privacy Enhancing Technologies: 14th International Symposium, PETS 2014 …, 2014
672014
CoCo: coding-based covert timing channels for network flows
A Houmansadr, N Borisov
Information Hiding: 13th International Conference, IH 2011, Prague, Czech …, 2011
642011
Compressive traffic analysis: A new paradigm for scalable traffic analysis
M Nasr, A Houmansadr, A Mazumdar
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications …, 2017
612017
Graphene: A new protocol for block propagation using set reconciliation
A Pinar Ozisik, G Andresen, G Bissias, A Houmansadr, B Levine
Data Privacy Management, Cryptocurrencies and Blockchain Technology: ESORICS …, 2017
592017
Het systeem kan de bewerking nu niet uitvoeren. Probeer het later opnieuw.
Artikelen 1–20