Follow
Amir Houmansadr
Title
Cited by
Cited by
Year
Comprehensive privacy analysis of deep learning: Passive and active white-box inference attacks against centralized and federated learning
M Nasr, R Shokri, A Houmansadr
2019 IEEE symposium on security and privacy (SP), 739-753, 2019
1948*2019
Machine learning with membership privacy using adversarial regularization
M Nasr, R Shokri, A Houmansadr
Proceedings of the 2018 ACM SIGSAC conference on computer and communications …, 2018
5382018
Manipulating the Byzantine: Optimizing Model Poisoning Attacks and Defenses for Federated Learning
V Shejwalkar, A Houmansadr
NDSS, 2021
4292021
Back to the drawing board: A critical evaluation of poisoning attacks on production federated learning
V Shejwalkar, A Houmansadr, P Kairouz, D Ramage
2022 IEEE Symposium on Security and Privacy (SP), 1354-1371, 2022
2962022
The parrot is dead: Observing unobservable network communications
A Houmansadr, C Brubaker, V Shmatikov
2013 IEEE Symposium on Security and Privacy, 65-79, 2013
2532013
DeepCorr: Strong flow correlation attacks on Tor using deep learning
M Nasr, A Bahramali, A Houmansadr
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications …, 2018
2152018
RAINBOW: A Robust And Invisible Non-Blind Watermark for Network Flows.
A Houmansadr, N Kiyavash, N Borisov
NDSS 2009, 406-422, 2009
2052009
Information hiding in communication networks: fundamentals, mechanisms, applications, and countermeasures
W Mazurczyk, S Wendzel, S Zander, A Houmansadr, K Szczypiorski
John Wiley & Sons, 2016
1992016
Cronus: Robust and heterogeneous collaborative learning with black-box knowledge transfer
H Chang, V Shejwalkar, R Shokri, A Houmansadr
arXiv preprint arXiv:1912.11279, 2019
1892019
Cirripede: Circumvention infrastructure using router redirection with plausible deniability
A Houmansadr, GTK Nguyen, M Caesar, N Borisov
Proceedings of the 18th ACM conference on Computer and communications …, 2011
1752011
I want my voice to be heard: IP over Voice-over-IP for unobservable censorship circumvention.
A Houmansadr, TJ Riedl, N Borisov, AC Singer
NDSS, 2013
1572013
Stegobot: a covert social network botnet
S Nagaraja, A Houmansadr, P Piyawongwisal, V Singh, P Agarwal, ...
Information Hiding: 13th International Conference, IH 2011, Prague, Czech …, 2011
1442011
A Cloud-based Intrusion Detection and Response System for Mobile Phones
A Houmansadr, SA Zonouz, R Berthier
5th Workshop on Recent Advances in Intrusion-Tolerant Systems, 2011
1432011
SWIRL: A Scalable Watermark to Detect Correlated Network Flows.
A Houmansadr, N Borisov
NDSS, 2011
1422011
Censorspoofer: asymmetric communication using ip spoofing for censorship-resistant web browsing
Q Wang, X Gong, GTK Nguyen, A Houmansadr, N Borisov
Proceedings of the 2012 ACM conference on Computer and communications …, 2012
1342012
Secloud: A cloud-based comprehensive and lightweight security solution for smartphones
S Zonouz, A Houmansadr, R Berthier, N Borisov, W Sanders
Computers & Security 37, 215-227, 2013
1322013
Defeating DNN-Based Traffic Analysis Systems in Real-Time With Blind Adversarial Perturbations
M Nasr, A Bahramali, A Houmansadr
30th USENIX Security Symposium (USENIX Security 21), 2021
1262021
Membership Privacy for Machine Learning Models Through Knowledge Transfer
V Shejwalkar, A Houmansadr
35th AAAI Conference on Artificial Intelligence (AAAI), 2021
119*2021
Multi-flow Attacks Against Network Flow Watermarking Schemes.
N Kiyavash, A Houmansadr, N Borisov
USENIX security symposium, 307-320, 2008
1132008
On the importance of encrypted-SNI (ESNI) to censorship circumvention
Z Chai, A Ghafari, A Houmansadr
9th USENIX Workshop on Free and Open Communications on the Internet (FOCI'19), 2019
872019
The system can't perform the operation now. Try again later.
Articles 1–20