Mohsen Imani
Mohsen Imani
Anomali Inc.
Verified email at mavs.uta.edu
Title
Cited by
Cited by
Year
Toward an efficient website fingerprinting defense
M Juarez, M Imani, M Perry, C Diaz, M Wright
European Symposium on Research in Computer Security, 27-46, 2016
842016
Deep fingerprinting: Undermining website fingerprinting defenses with deep learning
P Sirinam, M Imani, M Juarez, M Wright
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications …, 2018
612018
Security enhanced routing protocol for ad hoc networks
M Imani, M Taheri, M Naderi
J Converg I (1) 3542, 2010
362010
Guard sets in tor using as relationships
M Imani, A Barton, M Wright
Proceedings on Privacy Enhancing Technologies 2018 (1), 145-165, 2018
7*2018
Refinement of AODV routing algorithm for wireless mesh networks (WMNs)
M Imani, B Hassanabadi, M Naderi
2011 19th Iranian Conference on Electrical Engineering, 1-6, 2011
62011
Vulnerabilities in network layer at wireless mesh networks (WMNs)
M Imani, M Taheri, ME Rajabi, M Naderi
2010 International Conference on Educational and Network Technology, 487-492, 2010
62010
Adversarial traces for website fingerprinting defense
M Imani, MS Rahman, M Wright
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications …, 2018
42018
Towards predicting efficient and anonymous Tor circuits
A Barton, M Imani, M Wright, J Ming
27th {USENIX} Security Symposium ({USENIX} Security 18), 429-444, 2018
42018
Mockingbird: Defending Against Deep-Learning-Based Website Fingerprinting Attacks with Adversarial Traces
M Imani, MS Rahman, N Matthews, M Wright
32019
Modified relay selection and circuit selection for faster Tor
M Imani, M Amirabadi, M Wright
IET Communications 13 (17), 2723-2734, 2019
22019
A secure method on a routing protocol for ad hoc networks
M Imani, M Taheri, ME Rajabi, M Naderi
2010 International Conference on Educational and Network Technology, 482-486, 2010
22010
A Novel Approach to Combine Misuse Detection and Anomaly Detection Using POMDP in Mobile Ad-Hoc Networks
ME Rajabi, M Imani, M Taheri, M Naderi
International Journal of Information and Electronics Engineering 5 (4), 245, 2015
12015
Improving Performance and Security in Anonymity Systems
M Imani
2018
The Evaluation of Circuit Selection Methods on Tor
M Imani, M Amirabadi, M Wright
arXiv preprint arXiv:1706.06457, 2017
2017
A Secure Routing Method on Wireless Mesh Sensor Networks (WMSNs)
M Imani, HR Tavakoli, ME Rajabi, M Naderi
International Journal of Information and Electronics Engineering 5 (4), 236, 2015
2015
Secure Lightweight Routing Protocol with Confidentiality Redundancy in Wireless Ad Hoc Networks (SLRCR)
M Taheri, M Imani, MM Hajikolaei, M Naderi
International Journal of Information and Electronics Engineering 5 (4), 254, 2015
2015
Vulnerabilities in network layer at wireless mesh networks (WMNs)
M Imani, M Taheri, ME Rajabi, M Naderi
2010 International Conference on Educational and Network Technology, 0
Poster: Experimental Evaluation of Website Fingerprinting using Deep Learning
P Sirinam, M Imani, M Wright
Poster: PredicTor: Predicting Fast Circuits For A Faster User Experience in Tor
A Barton, M Imani, M Wright, J Ming
Poster: Guard Sets in Tor Using AS Relationships
M Imani, A Barton, M Wright
The system can't perform the operation now. Try again later.
Articles 1–20