Stop the war!
Остановите войну!
for scientists:
default search action
Amir Houmansadr
Amir Houman Sadr
Person information
- affiliation: University of Massachusetts Amherst, MA, USA
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
showing all ?? records
2020 – today
- 2024
- [c75]Bo Guan, Shuangqing Wei, Amir Houmansadr, Hossein Pishro-Nik, Dennis Goeckel:
Optimal Obfuscation to Protect Client Privacy in Federated Learning. CISS 2024: 1-6 - [c74]Diwen Xue, Michalis Kallitsis, Amir Houmansadr, Roya Ensafi:
Fingerprinting Obfuscated Proxy Traffic with Encapsulated TLS Handshakes. USENIX Security Symposium 2024 - [c73]Katherine Avery, Amir Houmansadr, David D. Jensen:
The Effect of Alter Ego Accounts on A/B Tests in Social Networks. WWW (Companion Volume) 2024: 565-568 - [i53]Hyejun Jeong, Shiqing Ma, Amir Houmansadr:
SoK: Challenges and Opportunities in Federated Unlearning. CoRR abs/2403.02437 (2024) - [i52]Hamid Mozaffari, Sunav Choudhary, Amir Houmansadr:
Fake or Compromised? Making Sense of Malicious Clients in Federated Learning. CoRR abs/2403.06319 (2024) - [i51]Ali Naseh, Katherine Thai, Mohit Iyyer, Amir Houmansadr:
Iteratively Prompting Multimodal LLMs to Reproduce Natural and AI-Generated Images. CoRR abs/2404.13784 (2024) - [i50]Yuefeng Peng, Jaechul Roh, Subhransu Maji, Amir Houmansadr:
OSLO: One-Shot Label-Only Membership Inference Attacks. CoRR abs/2405.16978 (2024) - [i49]Sajjad Amini, Mohammadreza Teymoorianfard, Shiqing Ma, Amir Houmansadr:
MeanSparse: Post-Training Robustness Enhancement Through Mean-Centered Feature Sparsification. CoRR abs/2406.05927 (2024) - [i48]Yapei Chang, Kalpesh Krishna, Amir Houmansadr, John Wieting, Mohit Iyyer:
PostMark: A Robust Blackbox Watermark for Large Language Models. CoRR abs/2406.14517 (2024) - [i47]Ali Naseh, Jaechul Roh, Eugene Bagdasaryan, Amir Houmansadr:
Injecting Bias in Text-To-Image Models via Composite-Trigger Backdoors. CoRR abs/2406.15213 (2024) - [i46]Dzung Pham, Jade Sheffey, Chau Minh Pham, Amir Houmansadr:
ProxyGPT: Enabling Anonymous Queries in AI Chatbots with (Un)Trustworthy Browser Proxies. CoRR abs/2407.08792 (2024) - 2023
- [j18]Saeede Enayati, Dennis Goeckel, Amir Houmansadr, Hossein Pishro-Nik:
Location Privacy Protection for UAVs in Package Delivery and IoT Data Collection. IEEE Internet Things J. 10(23): 20586-20601 (2023) - [j17]Ardavan Bozorgi, Alireza Bahramali, Fatemeh Rezaei, Amirhossein Ghafari, Amir Houmansadr, Ramin Soltani, Dennis Goeckel, Don Towsley:
I Still Know What You Did Last Summer: Inferring Sensitive User Activities on Messaging Applications Through Traffic Analysis. IEEE Trans. Dependable Secur. Comput. 20(5): 4135-4153 (2023) - [c72]Ali Zohaib, Jade Sheffey, Amir Houmansadr:
Investigating Traffic Analysis Attacks on Apple iCloud Private Relay. AsiaCCS 2023: 773-784 - [c71]Alireza Bahramali, Ardavan Bozorgi, Amir Houmansadr:
Realistic Website Fingerprinting By Augmenting Network Traces. CCS 2023: 1035-1049 - [c70]Ali Naseh, Kalpesh Krishna, Mohit Iyyer, Amir Houmansadr:
Stealing the Decoding Algorithms of Language Models. CCS 2023: 1835-1849 - [c69]Virat Shejwalkar, Lingjuan Lyu, Amir Houmansadr:
The Perils of Learning From Unlabeled Data: Backdoor Attacks on Semi-supervised Learning. ICCV 2023: 4707-4717 - [c68]Milad Nasr, Saeed Mahloujifar, Xinyu Tang, Prateek Mittal, Amir Houmansadr:
Effectively Using Public Data in Privacy Preserving Machine Learning. ICML 2023: 25718-25732 - [c67]Momin Ahmad Khan, Virat Shejwalkar, Amir Houmansadr, Fatima M. Anwar:
On the Pitfalls of Security Evaluation of Robust Federated Learning. SP (Workshops) 2023: 57-68 - [c66]Hamid Mozaffari, Virat Shejwalkar, Amir Houmansadr:
Every Vote Counts: Ranking-Based Training of Federated Learning to Resist Poisoning Attacks. USENIX Security Symposium 2023: 1721-1738 - [c65]Mingshi Wu, Jackson Sippe, Danesh Sivakumar, Jack Burg, Peter Anderson, Xiaokang Wang, Kevin Bock, Amir Houmansadr, Dave Levin, Eric Wustrow:
How the Great Firewall of China Detects and Blocks Fully Encrypted Traffic. USENIX Security Symposium 2023: 2653-2670 - [i45]Ali Naseh, Kalpesh Krishna, Mohit Iyyer, Amir Houmansadr:
On the Risks of Stealing the Decoding Algorithms of Language Models. CoRR abs/2303.04729 (2023) - [i44]Alireza Bahramali, Ardavan Bozorgi, Amir Houmansadr:
Realistic Website Fingerprinting By Augmenting Network Trace. CoRR abs/2309.10147 (2023) - [i43]Dzung Pham, Shreyas Kulkarni, Amir Houmansadr:
RAIFLE: Reconstruction Attacks on Interaction-based Federated Learning with Active Data Manipulation. CoRR abs/2310.19163 (2023) - [i42]Ali Naseh, Jaechul Roh, Amir Houmansadr:
Memory Triggers: Unveiling Memorization in Text-To-Image Generative Models through Word-Level Duplication. CoRR abs/2312.03692 (2023) - [i41]Yuefeng Peng, Ali Naseh, Amir Houmansadr:
Diffence: Fencing Membership Privacy With Diffusion Models. CoRR abs/2312.04692 (2023) - [i40]Ali Naseh, Jaechul Roh, Amir Houmansadr:
Understanding (Un)Intended Memorization in Text-to-Image Generative Models. CoRR abs/2312.07550 (2023) - 2022
- [j16]Steffen Wendzel, Wojciech Mazurczyk, Luca Caviglione, Amir Houmansadr:
Emerging topics in defending networked systems. Future Gener. Comput. Syst. 128: 317-319 (2022) - [j15]Bo Guan, Nazanin Takbiri, Dennis Goeckel, Amir Houmansadr, Hossein Pishro-Nik:
Superstring-Based Sequence Obfuscation to Thwart Pattern Matching Attacks. IEEE Internet Things J. 9(23): 23348-23365 (2022) - [j14]Xinyu Tang, Milad Nasr, Saeed Mahloujifar, Virat Shejwalkar, Liwei Song, Amir Houmansadr, Prateek Mittal:
Machine Learning with Differentially Private Labels: Mechanisms and Frameworks. Proc. Priv. Enhancing Technol. 2022(4): 332-350 (2022) - [c64]Saeede Enayati, Dennis L. Goeckel, Amir Houmansadr, Hossein Pishro-Nik:
Constrained Obfuscation to Thwart Pattern Matching Attacks. ISIT 2022: 643-648 - [c63]Saeede Enayati, Dennis L. Goeckel, Amir Houmansadr, Hossein Pishro-Nik:
Privacy-Preserving Path-Planning for UAVs. ISNCC 2022: 1-6 - [c62]Momin Ahmad Khan, Virat Shejwalkar, Amir Houmansadr, Fatima M. Anwar:
Security Analysis of SplitFed Learning. SenSys 2022: 987-993 - [c61]Virat Shejwalkar, Amir Houmansadr, Peter Kairouz, Daniel Ramage:
Back to the Drawing Board: A Critical Evaluation of Poisoning Attacks on Production Federated Learning. SP 2022: 1354-1371 - [c60]Xinyu Tang, Saeed Mahloujifar, Liwei Song, Virat Shejwalkar, Milad Nasr, Amir Houmansadr, Prateek Mittal:
Mitigating Membership Inference Attacks by Self-Distillation Through a Novel Ensemble Architecture. USENIX Security Symposium 2022: 1433-1450 - [i39]Hamid Mozaffari, Amir Houmansadr:
E2FL: Equal and Equitable Federated Learning. CoRR abs/2205.10454 (2022) - [i38]Virat Shejwalkar, Lingjuan Lyu, Amir Houmansadr:
The Perils of Learning From Unlabeled Data: Backdoor Attacks on Semi-supervised Learning. CoRR abs/2211.00453 (2022) - [i37]Momin Ahmad Khan, Virat Shejwalkar, Amir Houmansadr, Fatima M. Anwar:
Security Analysis of SplitFed Learning. CoRR abs/2212.01716 (2022) - 2021
- [j13]Nazanin Takbiri, Minting Chen, Dennis L. Goeckel, Amir Houmansadr, Hossein Pishro-Nik:
Asymptotic Privacy Loss Due to Time Series Matching of Dependent Users. IEEE Commun. Lett. 25(4): 1079-1083 (2021) - [c59]Virat Shejwalkar, Amir Houmansadr:
Membership Privacy for Machine Learning Models Through Knowledge Transfer. AAAI 2021: 9549-9557 - [c58]Fatemeh Rezaei, Amir Houmansadr:
FINN: Fingerprinting Network Flows using Neural Networks. ACSAC 2021: 1011-1024 - [c57]Alireza Bahramali, Milad Nasr, Amir Houmansadr, Dennis Goeckel, Don Towsley:
Robust Adversarial Attacks Against DNN-Based Wireless Communication Systems. CCS 2021: 126-140 - [c56]Virat Shejwalkar, Amir Houmansadr:
Manipulating the Byzantine: Optimizing Model Poisoning Attacks and Defenses for Federated Learning. NDSS 2021 - [c55]Milad Nasr, Alireza Bahramali, Amir Houmansadr:
Defeating DNN-Based Traffic Analysis Systems in Real-Time With Blind Adversarial Perturbations. USENIX Security Symposium 2021: 2705-2722 - [i36]Alireza Bahramali, Milad Nasr, Amir Houmansadr, Dennis Goeckel, Don Towsley:
Robust Adversarial Attacks Against DNN-Based Wireless Communication Systems. CoRR abs/2102.00918 (2021) - [i35]Virat Shejwalkar, Amir Houmansadr, Peter Kairouz, Daniel Ramage:
Back to the Drawing Board: A Critical Evaluation of Poisoning Attacks on Federated Learning. CoRR abs/2108.10241 (2021) - [i34]Bo Guan, Nazanin Takbiri, Dennis Goeckel, Amir Houmansadr, Hossein Pishro-Nik:
Superstring-Based Sequence Obfuscation to Thwart Pattern Matching Attacks. CoRR abs/2108.12336 (2021) - [i33]Hamid Mozaffari, Virat Shejwalkar, Amir Houmansadr:
FSL: Federated Supermask Learning. CoRR abs/2110.04350 (2021) - [i32]Xinyu Tang, Saeed Mahloujifar, Liwei Song, Virat Shejwalkar, Milad Nasr, Amir Houmansadr, Prateek Mittal:
Mitigating Membership Inference Attacks by Self-Distillation Through a Novel Ensemble Architecture. CoRR abs/2110.08324 (2021) - 2020
- [j12]Ramin Soltani, Dennis Goeckel, Don Towsley, Amir Houmansadr:
Fundamental Limits of Covert Packet Insertion. IEEE Trans. Commun. 68(6): 3401-3414 (2020) - [j11]Ramin Soltani, Dennis Goeckel, Don Towsley, Amir Houmansadr:
Fundamental Limits of Invisible Flow Fingerprinting. IEEE Trans. Inf. Forensics Secur. 15: 345-360 (2020) - [j10]Nazanin Takbiri, Amir Houmansadr, Dennis L. Goeckel, Hossein Pishro-Nik:
Privacy of Dependent Users Against Statistical Matching. IEEE Trans. Inf. Theory 66(9): 5842-5865 (2020) - [j9]Nazanin Takbiri, Virat Shejwalkar, Amir Houmansadr, Dennis L. Goeckel, Hossein Pishro-Nik:
Leveraging Prior Knowledge Asymmetries in the Design of Location Privacy-Preserving Mechanisms. IEEE Wirel. Commun. Lett. 9(11): 2005-2009 (2020) - [c54]Alice, Bob, Carol, Jan Beznazwy, Amir Houmansadr:
How China Detects and Blocks Shadowsocks. Internet Measurement Conference 2020: 111-124 - [c53]Bo Guan, Nazanin Takbiri, Dennis L. Goeckel, Amir Houmansadr, Hossein Pishro-Nik:
Sequence Obfuscation to Thwart Pattern Matching Attacks. ISIT 2020: 884-889 - [c52]Alireza Bahramali, Amir Houmansadr, Ramin Soltani, Dennis Goeckel, Don Towsley:
Practical Traffic Analysis Attacks on Secure Messaging Applications. NDSS 2020 - [c51]Hamid Mozaffari, Amir Houmansadr:
Heterogeneous Private Information Retrieval. NDSS 2020 - [c50]Milad Nasr, Hadi Zolfaghari, Amir Houmansadr, Amirhossein Ghafari:
MassBrowser: Unblocking the Censored Web for the Masses, by the Masses. NDSS 2020 - [c49]Fatemeh Rezaei, Shahrzad Naseri, Ittay Eyal, Amir Houmansadr:
The Bitcoin Hunter: Detecting Bitcoin Traffic over Encrypted Channels. SecureComm (1) 2020: 152-171 - [c48]anonymous, Arian Akhavan Niaki, Nguyen Phong Hoang, Phillipa Gill, Amir Houmansadr:
Triplet Censors: Demystifying Great Firewall's DNS Censorship Behavior. FOCI @ USENIX Security Symposium 2020 - [i31]Milad Nasr, Alireza Bahramali, Amir Houmansadr:
Blind Adversarial Network Perturbations. CoRR abs/2002.06495 (2020) - [i30]Alireza Bahramali, Ramin Soltani, Amir Houmansadr, Dennis Goeckel, Don Towsley:
Practical Traffic Analysis Attacks on Secure Messaging Applications. CoRR abs/2005.00508 (2020) - [i29]Nazanin Takbiri, Minting Chen, Dennis L. Goeckel, Amir Houmansadr, Hossein Pishro-Nik:
Asymptotic Privacy Loss due to Time Series Matching of Dependent Users. CoRR abs/2007.06119 (2020) - [i28]Milad Nasr, Reza Shokri, Amir Houmansadr:
Improving Deep Learning with Differential Privacy using Gradient Encoding and Denoising. CoRR abs/2007.11524 (2020)
2010 – 2019
- 2019
- [j8]Nazanin Takbiri, Amir Houmansadr, Dennis L. Goeckel, Hossein Pishro-Nik:
Matching Anonymized and Obfuscated Time Series to Users' Profiles. IEEE Trans. Inf. Theory 65(2): 724-741 (2019) - [c47]Virat Shejwalkar, Amir Houmansadr, Hossein Pishro-Nik, Dennis Goeckel:
Revisiting utility metrics for location privacy-preserving mechanisms. ACSAC 2019: 313-327 - [c46]Nazanin Takbiri, Dennis L. Goeckel, Amir Houmansadr, Hossein Pishro-Nik:
Asymptotic Limits of Privacy in Bayesian Time Series Matching. CISS 2019: 1-6 - [c45]Hamid Mozaffari, Amir Houmansadr, Arun Venkataramani:
Blocking-Resilient Communications in Information-Centric Networks Using Router Redirection. GLOBECOM Workshops 2019: 1-6 - [c44]Milad Nasr, Sadegh Farhang, Amir Houmansadr, Jens Grossklags:
Enemy At the Gateways: Censorship-Resilient Proxy Distribution Using Game Theory. NDSS 2019 - [c43]Milad Nasr, Reza Shokri, Amir Houmansadr:
Comprehensive Privacy Analysis of Deep Learning: Passive and Active White-box Inference Attacks against Centralized and Federated Learning. IEEE Symposium on Security and Privacy 2019: 739-753 - [c42]Zimo Chai, Amirhossein Ghafari, Amir Houmansadr:
On the Importance of Encrypted-SNI (ESNI) to Censorship Circumvention. FOCI @ USENIX Security Symposium 2019 - [c41]Nazanin Takbiri, Ramin Soltani, Dennis L. Goeckel, Amir Houmansadr, Hossein Pishro-Nik:
Asymptotic Loss in Privacy due to Dependency in Gaussian Traces. WCNC 2019: 1-6 - [i27]Nazanin Takbiri, Dennis L. Goeckel, Amir Houmansadr, Hossein Pishro-Nik:
Asymptotic Limits of Privacy in Bayesian Time Series Matching. CoRR abs/1902.06404 (2019) - [i26]Ramin Soltani, Dennis Goeckel, Don Towsley, Amir Houmansadr:
Fundamental Limits of Covert Packet Insertion. CoRR abs/1903.11640 (2019) - [i25]Virat Shejwalkar, Amir Houmansadr:
Reconciling Utility and Membership Privacy via Knowledge Distillation. CoRR abs/1906.06589 (2019) - [i24]Nazanin Takbiri, Virat Shejwalkar, Amir Houmansadr, Dennis L. Goeckel, Hossein Pishro-Nik:
Leveraging Prior Knowledge Asymmetries in the Design of Location Privacy-Preserving Mechanisms. CoRR abs/1912.02209 (2019) - [i23]Hongyan Chang, Virat Shejwalkar, Reza Shokri, Amir Houmansadr:
Cronus: Robust and Heterogeneous Collaborative Learning with Black-Box Knowledge Transfer. CoRR abs/1912.11279 (2019) - 2018
- [c40]Ramin Soltani, Dennis Goeckel, Don Towsley, Amir Houmansadr:
Fundamental Limits of Covert Bit Insertion in Packets. Allerton 2018: 1065-1072 - [c39]Hosein Mohammadi Makrani, Setareh Rafatirad, Amir Houmansadr, Houman Homayoun:
Main-Memory Requirements of Big Data Applications on Commodity Server Platform. CCGrid 2018: 653-660 - [c38]Milad Nasr, Reza Shokri, Amir Houmansadr:
Machine Learning with Membership Privacy using Adversarial Regularization. CCS 2018: 634-646 - [c37]Milad Nasr, Alireza Bahramali, Amir Houmansadr:
DeepCorr: Strong Flow Correlation Attacks on Tor Using Deep Learning. CCS 2018: 1962-1976 - [c36]Hossein Sayadi, Sai Manoj P. D., Amir Houmansadr, Setareh Rafatirad, Houman Homayoun:
Comprehensive assessment of run-time hardware-supported malware detection using general and ensemble learning. CF 2018: 212-215 - [c35]Nazanin Takbiri, Amir Houmansadr, Dennis L. Goeckel, Hossein Pishro-Nik:
Privacy Against Statistical Matching: Inter-User Correlation. ISIT 2018: 1036-1040 - [i22]Nazanin Takbiri, Amir Houmansadr, Dennis L. Goeckel, Hossein Pishro-Nik:
Privacy against Statistical Matching: Inter-User Correlation. CoRR abs/1805.01296 (2018) - [i21]Nazanin Takbiri, Amir Houmansadr, Dennis L. Goeckel, Hossein Pishro-Nik:
Privacy of Dependent Users Against Statistical Matching. CoRR abs/1806.11108 (2018) - [i20]Milad Nasr, Reza Shokri, Amir Houmansadr:
Machine Learning with Membership Privacy using Adversarial Regularization. CoRR abs/1807.05852 (2018) - [i19]Milad Nasr, Alireza Bahramali, Amir Houmansadr:
DeepCorr: Strong Flow Correlation Attacks on Tor Using Deep Learning. CoRR abs/1808.07285 (2018) - [i18]Ramin Soltani, Dennis Goeckel, Don Towsley, Amir Houmansadr:
Fundamental Limits of Invisible Flow Fingerprinting. CoRR abs/1809.08514 (2018) - [i17]Nazanin Takbiri, Ramin Soltani, Dennis L. Goeckel, Amir Houmansadr, Hossein Pishro-Nik:
Asymptotic Loss in Privacy due to Dependency in Gaussian Traces. CoRR abs/1809.10289 (2018) - [i16]Ramin Soltani, Dennis Goeckel, Don Towsley, Amir Houmansadr:
Fundamental Limits of Covert Bit Insertion in Packets. CoRR abs/1810.03510 (2018) - [i15]Milad Nasr, Reza Shokri, Amir Houmansadr:
Comprehensive Privacy Analysis of Deep Learning: Stand-alone and Federated Learning under Passive and Active White-box Inference Attacks. CoRR abs/1812.00910 (2018) - 2017
- [j7]Fatemeh Rezaei, Amir Houmansadr:
TagIt: Tagging Network Flows using Blind Fingerprints. Proc. Priv. Enhancing Technol. 2017(4): 290-307 (2017) - [j6]Zarrin Montazeri, Amir Houmansadr, Hossein Pishro-Nik:
Achieving Perfect Location Privacy in Wireless Devices Using Anonymization. IEEE Trans. Inf. Forensics Secur. 12(11): 2683-2698 (2017) - [j5]Amir Houmansadr, Wenxuan Zhou, Matthew Caesar, Nikita Borisov:
SWEET: Serving the Web by Exploiting Email Tunnels. IEEE/ACM Trans. Netw. 25(3): 1517-1527 (2017) - [c34]Ramin Soltani, Dennis Goeckel, Don Towsley, Amir Houmansadr:
Towards provably invisible network flow fingerprints. ACSSC 2017: 258-262 - [c33]Milad Nasr, Hadi Zolfaghari, Amir Houmansadr:
The Waterfall of Liberty: Decoy Routing Circumvention that Resists Routing Attacks. CCS 2017: 2037-2052 - [c32]Milad Nasr, Amir Houmansadr, Arya Mazumdar:
Compressive Traffic Analysis: A New Paradigm for Scalable Traffic Analysis. CCS 2017: 2053-2069 - [c31]Nazanin Takbiri, Amir Houmansadr, Dennis L. Goeckel, Hossein Pishro-Nik:
Fundamental limits of location privacy using anonymization. CISS 2017: 1-6 - [c30]A. Pinar Ozisik, Gavin Andresen, George Bissias, Amir Houmansadr, Brian Neil Levine:
Graphene: A New Protocol for Block Propagation Using Set Reconciliation. DPM/CBT@ESORICS 2017: 420-428 - [c29]Nazanin Takbiri, Amir Houmansadr, Dennis L. Goeckel, Hossein Pishro-Nik:
Limits of location privacy under anonymization and obfuscation. ISIT 2017: 764-768 - [i14]Milad Nasr, Sadegh Farhang, Amir Houmansadr, Jens Grossklags:
Enemy At the Gateways: A Game Theoretic Approach to Proxy Distribution. CoRR abs/1709.04030 (2017) - [i13]Nazanin Takbiri, Amir Houmansadr, Dennis L. Goeckel, Hossein Pishro-Nik:
Matching Anonymized and Obfuscated Time Series to Users' Profiles. CoRR abs/1710.00197 (2017) - [i12]Ramin Soltani, Dennis Goeckel, Don Towsley, Amir Houmansadr:
Towards Provably Invisible Network Flow Fingerprints. CoRR abs/1711.10079 (2017) - 2016
- [j4]Richard McPherson, Amir Houmansadr, Vitaly Shmatikov:
CovertCast: Using Live Streaming to Evade Internet Censorship. Proc. Priv. Enhancing Technol. 2016(3): 212-225 (2016) - [c28]Ramin Soltani, Dennis Goeckel, Don Towsley, Amir Houmansadr:
Covert communications on renewal packet channels. Allerton 2016: 548-555 - [c27]Hadi Zolfaghari, Amir Houmansadr:
Practical Censorship Evasion Leveraging Content Delivery Networks. CCS 2016: 1715-1726 - [c26]Milad Nasr, Amir Houmansadr:
GAME OF DECOYS: Optimal Decoy Routing Through Game Theory. CCS 2016: 1727-1738 - [c25]Zarrin Montazeri, Amir Houmansadr, Hossein Pishro-Nik:
Defining perfect location privacy using anonymization. CISS 2016: 204-209 - [c24]Zarrin Montazeri, Amir Houmansadr, Hossein Pishro-Nik:
Achieving perfect location privacy in Markov models using anonymization. ISITA 2016: 355-359 - [e1]Amir Houmansadr, Prateek Mittal:
6th USENIX Workshop on Free and Open Communications on the Internet, FOCI '16, Austin, TX, USA, August 8, 2016. USENIX Association 2016 [contents] - [i11]Ramin Soltani, Dennis Goeckel, Don Towsley, Amir Houmansadr:
Covert Communications on Renewal Packet Channels. CoRR abs/1610.00368 (2016) - [i10]Ramin Soltani, Dennis Goeckel, Don Towsley, Amir Houmansadr:
Covert Communications on Poisson Packet Channels. CoRR abs/1610.00381 (2016) - [i9]Zarrin Montazeri, Amir Houmansadr, Hossein Pishro-Nik:
Achieving Perfect Location Privacy in Wireless Devices Using Anonymization. CoRR abs/1610.05210 (2016) - [i8]George Bissias, Brian Neil Levine, A. Pinar Ozisik, Gavin Andresen, Amir Houmansadr:
An Analysis of Attacks on Blockchain Consensus. CoRR abs/1610.07985 (2016) - 2015
- [c23]Ali Zand, Amir Houmansadr, Giovanni Vigna, Richard A. Kemmerer, Christopher Kruegel:
Know Your Achilles' Heel: Automatic Detection of Network Critical Services. ACSAC 2015: 41-50 - [c22]Ramin Soltani, Dennis Goeckel, Don Towsley, Amir Houmansadr:
Covert communications on Poisson packet channels. Allerton 2015: 1046-1052 - [c21]John Holowczak, Amir Houmansadr:
CacheBrowser: Bypassing Chinese Censorship without Proxies Using Cached Content. CCS 2015: 70-83 - 2014
- [j3]Amir Houmansadr, Negar Kiyavash, Nikita Borisov:
Non-Blind Watermarking of Network Flows. IEEE/ACM Trans. Netw. 22(4): 1232-1244 (2014) - [c20]Amir Houmansadr, Edmund L. Wong, Vitaly Shmatikov:
No Direction Home: The True Cost of Routing Around Decoys. NDSS 2014 - [c19]Chad Brubaker, Amir Houmansadr, Vitaly Shmatikov:
CloudTransport: Using Cloud Storage for Censorship-Resistant Networking. Privacy Enhancing Technologies 2014: 1-20 - 2013
- [j2]Saman A. Zonouz, Amir Houmansadr, Robin Berthier, Nikita Borisov, William H. Sanders:
Secloud: A cloud-based comprehensive and lightweight security solution for smartphones. Comput. Secur. 37: 215-227 (2013) - [j1]Amir Houmansadr, Nikita Borisov:
BotMosaic: Collaborative network watermark for the detection of IRC-based botnets. J. Syst. Softw. 86(3): 707-715 (2013) - [c18]Amir Houmansadr, Thomas J. Riedl, Nikita Borisov, Andrew C. Singer:
I want my voice to be heard: IP over Voice-over-IP for unobservable censorship circumvention. NDSS 2013 - [c17]