


Остановите войну!
for scientists:


default search action
Amir Houmansadr
Amir Houman Sadr
Person information

Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
showing all ?? records
2020 – today
- 2023
- [i40]Ali Naseh, Kalpesh Krishna, Mohit Iyyer, Amir Houmansadr:
On the Risks of Stealing the Decoding Algorithms of Language Models. CoRR abs/2303.04729 (2023) - 2022
- [j16]Steffen Wendzel, Wojciech Mazurczyk, Luca Caviglione, Amir Houmansadr:
Emerging topics in defending networked systems. Future Gener. Comput. Syst. 128: 317-319 (2022) - [j15]Bo Guan
, Nazanin Takbiri
, Dennis Goeckel
, Amir Houmansadr
, Hossein Pishro-Nik:
Superstring-Based Sequence Obfuscation to Thwart Pattern Matching Attacks. IEEE Internet Things J. 9(23): 23348-23365 (2022) - [j14]Xinyu Tang, Milad Nasr, Saeed Mahloujifar, Virat Shejwalkar, Liwei Song, Amir Houmansadr, Prateek Mittal:
Machine Learning with Differentially Private Labels: Mechanisms and Frameworks. Proc. Priv. Enhancing Technol. 2022(4): 332-350 (2022) - [c64]Saeede Enayati, Dennis L. Goeckel, Amir Houmansadr, Hossein Pishro-Nik:
Constrained Obfuscation to Thwart Pattern Matching Attacks. ISIT 2022: 643-648 - [c63]Saeede Enayati, Dennis L. Goeckel, Amir Houmansadr, Hossein Pishro-Nik:
Privacy-Preserving Path-Planning for UAVs. ISNCC 2022: 1-6 - [c62]Momin Ahmad Khan, Virat Shejwalkar, Amir Houmansadr, Fatima M. Anwar:
Security Analysis of SplitFed Learning. SenSys 2022: 987-993 - [c61]Virat Shejwalkar, Amir Houmansadr, Peter Kairouz, Daniel Ramage:
Back to the Drawing Board: A Critical Evaluation of Poisoning Attacks on Production Federated Learning. IEEE Symposium on Security and Privacy 2022: 1354-1371 - [c60]Xinyu Tang, Saeed Mahloujifar, Liwei Song, Virat Shejwalkar, Milad Nasr, Amir Houmansadr, Prateek Mittal:
Mitigating Membership Inference Attacks by Self-Distillation Through a Novel Ensemble Architecture. USENIX Security Symposium 2022: 1433-1450 - [i39]Hamid Mozaffari, Amir Houmansadr:
E2FL: Equal and Equitable Federated Learning. CoRR abs/2205.10454 (2022) - [i38]Virat Shejwalkar, Lingjuan Lyu, Amir Houmansadr:
The Perils of Learning From Unlabeled Data: Backdoor Attacks on Semi-supervised Learning. CoRR abs/2211.00453 (2022) - [i37]Momin Ahmad Khan, Virat Shejwalkar, Amir Houmansadr, Fatima Muhammad Anwar:
Security Analysis of SplitFed Learning. CoRR abs/2212.01716 (2022) - 2021
- [j13]Nazanin Takbiri
, Minting Chen
, Dennis L. Goeckel
, Amir Houmansadr
, Hossein Pishro-Nik
:
Asymptotic Privacy Loss Due to Time Series Matching of Dependent Users. IEEE Commun. Lett. 25(4): 1079-1083 (2021) - [c59]Virat Shejwalkar, Amir Houmansadr:
Membership Privacy for Machine Learning Models Through Knowledge Transfer. AAAI 2021: 9549-9557 - [c58]Fatemeh Rezaei, Amir Houmansadr:
FINN: Fingerprinting Network Flows using Neural Networks. ACSAC 2021: 1011-1024 - [c57]Alireza Bahramali, Milad Nasr, Amir Houmansadr, Dennis Goeckel, Don Towsley:
Robust Adversarial Attacks Against DNN-Based Wireless Communication Systems. CCS 2021: 126-140 - [c56]Virat Shejwalkar, Amir Houmansadr:
Manipulating the Byzantine: Optimizing Model Poisoning Attacks and Defenses for Federated Learning. NDSS 2021 - [c55]Milad Nasr, Alireza Bahramali, Amir Houmansadr:
Defeating DNN-Based Traffic Analysis Systems in Real-Time With Blind Adversarial Perturbations. USENIX Security Symposium 2021: 2705-2722 - [i36]Alireza Bahramali, Milad Nasr, Amir Houmansadr, Dennis Goeckel, Don Towsley:
Robust Adversarial Attacks Against DNN-Based Wireless Communication Systems. CoRR abs/2102.00918 (2021) - [i35]Virat Shejwalkar, Amir Houmansadr, Peter Kairouz, Daniel Ramage:
Back to the Drawing Board: A Critical Evaluation of Poisoning Attacks on Federated Learning. CoRR abs/2108.10241 (2021) - [i34]Bo Guan, Nazanin Takbiri, Dennis Goeckel, Amir Houmansadr, Hossein Pishro-Nik:
Superstring-Based Sequence Obfuscation to Thwart Pattern Matching Attacks. CoRR abs/2108.12336 (2021) - [i33]Hamid Mozaffari, Virat Shejwalkar, Amir Houmansadr:
FSL: Federated Supermask Learning. CoRR abs/2110.04350 (2021) - [i32]Xinyu Tang, Saeed Mahloujifar, Liwei Song, Virat Shejwalkar, Milad Nasr, Amir Houmansadr, Prateek Mittal:
Mitigating Membership Inference Attacks by Self-Distillation Through a Novel Ensemble Architecture. CoRR abs/2110.08324 (2021) - 2020
- [j12]Ramin Soltani
, Dennis Goeckel
, Don Towsley
, Amir Houmansadr
:
Fundamental Limits of Covert Packet Insertion. IEEE Trans. Commun. 68(6): 3401-3414 (2020) - [j11]Ramin Soltani
, Dennis Goeckel
, Don Towsley
, Amir Houmansadr
:
Fundamental Limits of Invisible Flow Fingerprinting. IEEE Trans. Inf. Forensics Secur. 15: 345-360 (2020) - [j10]Nazanin Takbiri
, Amir Houmansadr
, Dennis L. Goeckel
, Hossein Pishro-Nik
:
Privacy of Dependent Users Against Statistical Matching. IEEE Trans. Inf. Theory 66(9): 5842-5865 (2020) - [j9]Nazanin Takbiri
, Virat Shejwalkar
, Amir Houmansadr
, Dennis L. Goeckel
, Hossein Pishro-Nik
:
Leveraging Prior Knowledge Asymmetries in the Design of Location Privacy-Preserving Mechanisms. IEEE Wirel. Commun. Lett. 9(11): 2005-2009 (2020) - [c54]Alice, Bob, Carol, Jan Beznazwy, Amir Houmansadr:
How China Detects and Blocks Shadowsocks. Internet Measurement Conference 2020: 111-124 - [c53]Bo Guan, Nazanin Takbiri, Dennis L. Goeckel, Amir Houmansadr, Hossein Pishro-Nik:
Sequence Obfuscation to Thwart Pattern Matching Attacks. ISIT 2020: 884-889 - [c52]Alireza Bahramali, Amir Houmansadr, Ramin Soltani, Dennis Goeckel, Don Towsley:
Practical Traffic Analysis Attacks on Secure Messaging Applications. NDSS 2020 - [c51]Hamid Mozaffari, Amir Houmansadr:
Heterogeneous Private Information Retrieval. NDSS 2020 - [c50]Milad Nasr, Hadi Zolfaghari, Amir Houmansadr, Amirhossein Ghafari:
MassBrowser: Unblocking the Censored Web for the Masses, by the Masses. NDSS 2020 - [c49]Fatemeh Rezaei, Shahrzad Naseri, Ittay Eyal, Amir Houmansadr:
The Bitcoin Hunter: Detecting Bitcoin Traffic over Encrypted Channels. SecureComm (1) 2020: 152-171 - [c48]anonymous, Arian Akhavan Niaki
, Nguyen Phong Hoang, Phillipa Gill, Amir Houmansadr:
Triplet Censors: Demystifying Great Firewall's DNS Censorship Behavior. FOCI @ USENIX Security Symposium 2020 - [i31]Milad Nasr, Alireza Bahramali, Amir Houmansadr:
Blind Adversarial Network Perturbations. CoRR abs/2002.06495 (2020) - [i30]Alireza Bahramali, Ramin Soltani, Amir Houmansadr, Dennis Goeckel, Don Towsley:
Practical Traffic Analysis Attacks on Secure Messaging Applications. CoRR abs/2005.00508 (2020) - [i29]Nazanin Takbiri, Minting Chen, Dennis L. Goeckel, Amir Houmansadr, Hossein Pishro-Nik:
Asymptotic Privacy Loss due to Time Series Matching of Dependent Users. CoRR abs/2007.06119 (2020) - [i28]Milad Nasr, Reza Shokri, Amir Houmansadr:
Improving Deep Learning with Differential Privacy using Gradient Encoding and Denoising. CoRR abs/2007.11524 (2020)
2010 – 2019
- 2019
- [j8]Nazanin Takbiri
, Amir Houmansadr
, Dennis L. Goeckel
, Hossein Pishro-Nik
:
Matching Anonymized and Obfuscated Time Series to Users' Profiles. IEEE Trans. Inf. Theory 65(2): 724-741 (2019) - [c47]Virat Shejwalkar, Amir Houmansadr, Hossein Pishro-Nik, Dennis Goeckel:
Revisiting utility metrics for location privacy-preserving mechanisms. ACSAC 2019: 313-327 - [c46]Nazanin Takbiri, Dennis L. Goeckel, Amir Houmansadr, Hossein Pishro-Nik:
Asymptotic Limits of Privacy in Bayesian Time Series Matching. CISS 2019: 1-6 - [c45]Hamid Mozaffari, Amir Houmansadr, Arun Venkataramani:
Blocking-Resilient Communications in Information-Centric Networks Using Router Redirection. GLOBECOM Workshops 2019: 1-6 - [c44]Milad Nasr, Sadegh Farhang, Amir Houmansadr, Jens Grossklags:
Enemy At the Gateways: Censorship-Resilient Proxy Distribution Using Game Theory. NDSS 2019 - [c43]Milad Nasr, Reza Shokri
, Amir Houmansadr:
Comprehensive Privacy Analysis of Deep Learning: Passive and Active White-box Inference Attacks against Centralized and Federated Learning. IEEE Symposium on Security and Privacy 2019: 739-753 - [c42]Zimo Chai, Amirhossein Ghafari, Amir Houmansadr:
On the Importance of Encrypted-SNI (ESNI) to Censorship Circumvention. FOCI @ USENIX Security Symposium 2019 - [c41]Nazanin Takbiri, Ramin Soltani
, Dennis L. Goeckel, Amir Houmansadr, Hossein Pishro-Nik:
Asymptotic Loss in Privacy due to Dependency in Gaussian Traces. WCNC 2019: 1-6 - [i27]Nazanin Takbiri, Dennis L. Goeckel, Amir Houmansadr, Hossein Pishro-Nik:
Asymptotic Limits of Privacy in Bayesian Time Series Matching. CoRR abs/1902.06404 (2019) - [i26]Ramin Soltani, Dennis Goeckel, Don Towsley, Amir Houmansadr:
Fundamental Limits of Covert Packet Insertion. CoRR abs/1903.11640 (2019) - [i25]Virat Shejwalkar, Amir Houmansadr:
Reconciling Utility and Membership Privacy via Knowledge Distillation. CoRR abs/1906.06589 (2019) - [i24]Nazanin Takbiri, Virat Shejwalkar, Amir Houmansadr, Dennis L. Goeckel, Hossein Pishro-Nik:
Leveraging Prior Knowledge Asymmetries in the Design of Location Privacy-Preserving Mechanisms. CoRR abs/1912.02209 (2019) - [i23]Hongyan Chang, Virat Shejwalkar, Reza Shokri, Amir Houmansadr:
Cronus: Robust and Heterogeneous Collaborative Learning with Black-Box Knowledge Transfer. CoRR abs/1912.11279 (2019) - 2018
- [c40]Ramin Soltani
, Dennis Goeckel, Don Towsley, Amir Houmansadr:
Fundamental Limits of Covert Bit Insertion in Packets. Allerton 2018: 1065-1072 - [c39]Hosein Mohammadi Makrani, Setareh Rafatirad, Amir Houmansadr, Houman Homayoun:
Main-Memory Requirements of Big Data Applications on Commodity Server Platform. CCGrid 2018: 653-660 - [c38]Milad Nasr, Reza Shokri
, Amir Houmansadr:
Machine Learning with Membership Privacy using Adversarial Regularization. CCS 2018: 634-646 - [c37]Milad Nasr, Alireza Bahramali, Amir Houmansadr:
DeepCorr: Strong Flow Correlation Attacks on Tor Using Deep Learning. CCS 2018: 1962-1976 - [c36]Hossein Sayadi, Sai Manoj P. D.
, Amir Houmansadr, Setareh Rafatirad, Houman Homayoun:
Comprehensive assessment of run-time hardware-supported malware detection using general and ensemble learning. CF 2018: 212-215 - [c35]Nazanin Takbiri, Amir Houmansadr, Dennis L. Goeckel, Hossein Pishro-Nik:
Privacy Against Statistical Matching: Inter-User Correlation. ISIT 2018: 1036-1040 - [i22]Nazanin Takbiri, Amir Houmansadr, Dennis L. Goeckel, Hossein Pishro-Nik:
Privacy against Statistical Matching: Inter-User Correlation. CoRR abs/1805.01296 (2018) - [i21]Nazanin Takbiri, Amir Houmansadr, Dennis L. Goeckel, Hossein Pishro-Nik:
Privacy of Dependent Users Against Statistical Matching. CoRR abs/1806.11108 (2018) - [i20]Milad Nasr, Reza Shokri, Amir Houmansadr:
Machine Learning with Membership Privacy using Adversarial Regularization. CoRR abs/1807.05852 (2018) - [i19]Milad Nasr, Alireza Bahramali, Amir Houmansadr:
DeepCorr: Strong Flow Correlation Attacks on Tor Using Deep Learning. CoRR abs/1808.07285 (2018) - [i18]Ramin Soltani, Dennis Goeckel, Don Towsley, Amir Houmansadr:
Fundamental Limits of Invisible Flow Fingerprinting. CoRR abs/1809.08514 (2018) - [i17]Nazanin Takbiri, Ramin Soltani, Dennis L. Goeckel, Amir Houmansadr, Hossein Pishro-Nik:
Asymptotic Loss in Privacy due to Dependency in Gaussian Traces. CoRR abs/1809.10289 (2018) - [i16]Ramin Soltani, Dennis Goeckel, Don Towsley, Amir Houmansadr:
Fundamental Limits of Covert Bit Insertion in Packets. CoRR abs/1810.03510 (2018) - [i15]Milad Nasr, Reza Shokri, Amir Houmansadr:
Comprehensive Privacy Analysis of Deep Learning: Stand-alone and Federated Learning under Passive and Active White-box Inference Attacks. CoRR abs/1812.00910 (2018) - 2017
- [j7]Fatemeh Rezaei, Amir Houmansadr:
TagIt: Tagging Network Flows using Blind Fingerprints. Proc. Priv. Enhancing Technol. 2017(4): 290-307 (2017) - [j6]Zarrin Montazeri
, Amir Houmansadr, Hossein Pishro-Nik:
Achieving Perfect Location Privacy in Wireless Devices Using Anonymization. IEEE Trans. Inf. Forensics Secur. 12(11): 2683-2698 (2017) - [j5]Amir Houmansadr
, Wenxuan Zhou, Matthew Caesar, Nikita Borisov:
SWEET: Serving the Web by Exploiting Email Tunnels. IEEE/ACM Trans. Netw. 25(3): 1517-1527 (2017) - [c34]Ramin Soltani
, Dennis Goeckel, Don Towsley, Amir Houmansadr:
Towards provably invisible network flow fingerprints. ACSSC 2017: 258-262 - [c33]Milad Nasr, Hadi Zolfaghari, Amir Houmansadr:
The Waterfall of Liberty: Decoy Routing Circumvention that Resists Routing Attacks. CCS 2017: 2037-2052 - [c32]Milad Nasr, Amir Houmansadr, Arya Mazumdar:
Compressive Traffic Analysis: A New Paradigm for Scalable Traffic Analysis. CCS 2017: 2053-2069 - [c31]Nazanin Takbiri, Amir Houmansadr, Dennis L. Goeckel, Hossein Pishro-Nik:
Fundamental limits of location privacy using anonymization. CISS 2017: 1-6 - [c30]A. Pinar Ozisik, Gavin Andresen, George Bissias, Amir Houmansadr, Brian Neil Levine:
Graphene: A New Protocol for Block Propagation Using Set Reconciliation. DPM/CBT@ESORICS 2017: 420-428 - [c29]Nazanin Takbiri, Amir Houmansadr, Dennis L. Goeckel, Hossein Pishro-Nik:
Limits of location privacy under anonymization and obfuscation. ISIT 2017: 764-768 - [i14]Milad Nasr, Sadegh Farhang, Amir Houmansadr, Jens Grossklags:
Enemy At the Gateways: A Game Theoretic Approach to Proxy Distribution. CoRR abs/1709.04030 (2017) - [i13]Nazanin Takbiri, Amir Houmansadr, Dennis L. Goeckel, Hossein Pishro-Nik:
Matching Anonymized and Obfuscated Time Series to Users' Profiles. CoRR abs/1710.00197 (2017) - [i12]Ramin Soltani, Dennis Goeckel, Don Towsley, Amir Houmansadr:
Towards Provably Invisible Network Flow Fingerprints. CoRR abs/1711.10079 (2017) - 2016
- [j4]Richard McPherson, Amir Houmansadr, Vitaly Shmatikov:
CovertCast: Using Live Streaming to Evade Internet Censorship. Proc. Priv. Enhancing Technol. 2016(3): 212-225 (2016) - [c28]Ramin Soltani
, Dennis Goeckel, Don Towsley, Amir Houmansadr:
Covert communications on renewal packet channels. Allerton 2016: 548-555 - [c27]Hadi Zolfaghari, Amir Houmansadr:
Practical Censorship Evasion Leveraging Content Delivery Networks. CCS 2016: 1715-1726 - [c26]Milad Nasr, Amir Houmansadr:
GAME OF DECOYS: Optimal Decoy Routing Through Game Theory. CCS 2016: 1727-1738 - [c25]Zarrin Montazeri, Amir Houmansadr, Hossein Pishro-Nik:
Defining perfect location privacy using anonymization. CISS 2016: 204-209 - [c24]Zarrin Montazeri, Amir Houmansadr, Hossein Pishro-Nik:
Achieving perfect location privacy in Markov models using anonymization. ISITA 2016: 355-359 - [e1]Amir Houmansadr, Prateek Mittal:
6th USENIX Workshop on Free and Open Communications on the Internet, FOCI '16, Austin, TX, USA, August 8, 2016. USENIX Association 2016 [contents] - [i11]Ramin Soltani, Dennis Goeckel, Don Towsley, Amir Houmansadr:
Covert Communications on Renewal Packet Channels. CoRR abs/1610.00368 (2016) - [i10]Ramin Soltani, Dennis Goeckel, Don Towsley, Amir Houmansadr:
Covert Communications on Poisson Packet Channels. CoRR abs/1610.00381 (2016) - [i9]Zarrin Montazeri, Amir Houmansadr, Hossein Pishro-Nik:
Achieving Perfect Location Privacy in Wireless Devices Using Anonymization. CoRR abs/1610.05210 (2016) - [i8]George Bissias, Brian Neil Levine, A. Pinar Ozisik, Gavin Andresen, Amir Houmansadr:
An Analysis of Attacks on Blockchain Consensus. CoRR abs/1610.07985 (2016) - 2015
- [c23]Ali Zand, Amir Houmansadr, Giovanni Vigna, Richard A. Kemmerer, Christopher Kruegel:
Know Your Achilles' Heel: Automatic Detection of Network Critical Services. ACSAC 2015: 41-50 - [c22]Ramin Soltani
, Dennis Goeckel, Don Towsley, Amir Houmansadr:
Covert communications on Poisson packet channels. Allerton 2015: 1046-1052 - [c21]John Holowczak, Amir Houmansadr:
CacheBrowser: Bypassing Chinese Censorship without Proxies Using Cached Content. CCS 2015: 70-83 - 2014
- [j3]Amir Houmansadr, Negar Kiyavash, Nikita Borisov:
Non-Blind Watermarking of Network Flows. IEEE/ACM Trans. Netw. 22(4): 1232-1244 (2014) - [c20]Amir Houmansadr, Edmund L. Wong, Vitaly Shmatikov:
No Direction Home: The True Cost of Routing Around Decoys. NDSS 2014 - [c19]Chad Brubaker, Amir Houmansadr, Vitaly Shmatikov:
CloudTransport: Using Cloud Storage for Censorship-Resistant Networking. Privacy Enhancing Technologies 2014: 1-20 - 2013
- [j2]Saman A. Zonouz, Amir Houmansadr, Robin Berthier, Nikita Borisov, William H. Sanders:
Secloud: A cloud-based comprehensive and lightweight security solution for smartphones. Comput. Secur. 37: 215-227 (2013) - [j1]Amir Houmansadr, Nikita Borisov:
BotMosaic: Collaborative network watermark for the detection of IRC-based botnets. J. Syst. Softw. 86(3): 707-715 (2013) - [c18]Amir Houmansadr, Thomas J. Riedl, Nikita Borisov, Andrew C. Singer:
I want my voice to be heard: IP over Voice-over-IP for unobservable censorship circumvention. NDSS 2013 - [c17]Amir Houmansadr, Nikita Borisov:
The Need for Flow Fingerprints to Link Correlated Network Flows. Privacy Enhancing Technologies 2013: 205-224 - [c16]Amir Houmansadr, Chad Brubaker, Vitaly Shmatikov:
The Parrot Is Dead: Observing Unobservable Network Communications. IEEE Symposium on Security and Privacy 2013: 65-79 - 2012
- [c15]Qiyan Wang, Xun Gong, Giang T. K. Nguyen, Amir Houmansadr, Nikita Borisov:
CensorSpoofer: asymmetric communication using IP spoofing for censorship-resistant web browsing. CCS 2012: 121-132 - [c14]Saman A. Zonouz, Amir Houmansadr, Parisa Haghani:
EliMet: Security metric elicitation in power grid critical infrastructures by observing system administrators' responsive behavior. DSN 2012: 1-12 - [i7]Negar Kiyavash, Amir Houmansadr, Nikita Borisov:
Multi-Flow Attacks Against Network Flow Watermarks: Analysis and Countermeasures. CoRR abs/1203.1390 (2012) - [i6]Amir Houmansadr, Nikita Borisov:
BotMosaic: Collaborative Network Watermark for Botnet Detection. CoRR abs/1203.1568 (2012) - [i5]Qiyan Wang, Xun Gong, Giang T. K. Nguyen, Amir Houmansadr, Nikita Borisov:
CensorSpoofer: Asymmetric Communication with IP Spoofing for Censorship-Resistant Web Browsing. CoRR abs/1203.1673 (2012) - [i4]Amir Houmansadr, Negar Kiyavash, Nikita Borisov:
Non-blind watermarking of network flows. CoRR abs/1203.2273 (2012) - [i3]Amir Houmansadr, Thomas J. Riedl, Nikita Borisov, Andrew C. Singer:
IP over Voice-over-IP for censorship circumvention. CoRR abs/1207.2683 (2012) - [i2]Amir Houmansadr, Wenxuan Zhou, Matthew Caesar, Nikita Borisov:
SWEET: Serving the Web by Exploiting Email Tunnels. CoRR abs/1211.3191 (2012) - 2011
- [c13]Casey Cipriano, Ali Zand, Amir Houmansadr, Christopher Kruegel, Giovanni Vigna:
Nexat: a history-based approach to predict attacker actions. ACSAC 2011: 383-392 - [c12]Amir Houmansadr, Giang T. K. Nguyen, Matthew Caesar, Nikita Borisov:
Cirripede: circumvention infrastructure using router redirection with plausible deniability. CCS 2011: 187-200 - [c11]Amir Houmansadr, Saman A. Zonouz, Robin Berthier:
A cloud-based intrusion detection and response system for mobile phones. DSN Workshops 2011: 31-32 - [c10]Amir Houmansadr, Nikita Borisov:
Towards improving network flow watermarks using the repeat-accumulate codes. ICASSP 2011: 1852-1855 - [c9]Shishir Nagaraja, Amir Houmansadr, Pratch Piyawongwisal
, Vijit Singh, Pragya Agarwal, Nikita Borisov:
Stegobot: A Covert Social Network Botnet. Information Hiding 2011: 299-313 - [c8]Amir Houmansadr, Nikita Borisov:
CoCo: Coding-Based Covert Timing Channels for Network Flows. Information Hiding 2011: 314-328 - [c7]Amir Houmansadr, Nikita Borisov:
SWIRL: A Scalable Watermark to Detect Correlated Network Flows. NDSS 2011 - [i1]Shishir Nagaraja, Amir Houmansadr, Pratch Piyawongwisal, Vijit Singh, Pragya Agarwal, Nikita Borisov:
Stegobot: construction of an unobservable communication network leveraging social behavior. CoRR abs/1107.2031 (2011)
2000 – 2009
- 2009
- [c6]Amir Houmansadr, Negar Kiyavash, Nikita Borisov:
Multi-flow attack resistant watermarks for network flows. ICASSP 2009: 1497-1500 - [c5]Amir Houmansadr, Negar Kiyavash, Nikita Borisov:
RAINBOW: A Robust And Invisible Non-Blind Watermark for Network Flows. NDSS 2009 - 2008
- [c4]Negar Kiyavash, Amir Houmansadr, Nikita Borisov:
Multi-flow Attacks Against Network Flow Watermarking Schemes. USENIX Security Symposium 2008: 307-320 - 2006
- [c3]Amir Houman Sadr, Shahrokh Ghaemmaghami:
A Collusion-Resistant Video Watermarking Scheme. Information Hiding 2006: 343-354 - [c2]Amir Houmansadr, Hamed Pirsiavash, Shahrokh Ghaemmaghami:
Robust Content-Based Video Watermarking Exploiting Motion Entropy Masking Effect. SIGMAP 2006: 252-259 - 2005
- [c1]Amir Houman Sadr, Shahrokh Ghaemmaghami:
Robustness Enhancement of Content-Based Watermarks Using Entropy Masking Effect. IWDW 2005: 444-458