Follow
Amir Houmansadr
Title
Cited by
Cited by
Year
Comprehensive privacy analysis of deep learning: Passive and active white-box inference attacks against centralized and federated learning
M Nasr, R Shokri, A Houmansadr
2019 IEEE symposium on security and privacy (SP), 739-753, 2019
1597*2019
Machine learning with membership privacy using adversarial regularization
M Nasr, R Shokri, A Houmansadr
Proceedings of the 2018 ACM SIGSAC conference on computer and communications …, 2018
4522018
Manipulating the Byzantine: Optimizing Model Poisoning Attacks and Defenses for Federated Learning
V Shejwalkar, A Houmansadr
NDSS, 2021
2792021
The parrot is dead: Observing unobservable network communications
A Houmansadr, C Brubaker, V Shmatikov
2013 IEEE Symposium on Security and Privacy, 65-79, 2013
2442013
Back to the drawing board: A critical evaluation of poisoning attacks on production federated learning
V Shejwalkar, A Houmansadr, P Kairouz, D Ramage
2022 IEEE Symposium on Security and Privacy (SP), 1354-1371, 2022
2012022
RAINBOW: A Robust And Invisible Non-Blind Watermark for Network Flows.
A Houmansadr, N Kiyavash, N Borisov
NDSS 2009, 406-422, 2009
1992009
Information hiding in communication networks: fundamentals, mechanisms, applications, and countermeasures
W Mazurczyk, S Wendzel, S Zander, A Houmansadr, K Szczypiorski
John Wiley & Sons, 2016
1862016
DeepCorr: Strong flow correlation attacks on Tor using deep learning
M Nasr, A Bahramali, A Houmansadr
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications …, 2018
1722018
Cirripede: Circumvention infrastructure using router redirection with plausible deniability
A Houmansadr, GTK Nguyen, M Caesar, N Borisov
Proceedings of the 18th ACM conference on Computer and communications …, 2011
1672011
Cronus: Robust and heterogeneous collaborative learning with black-box knowledge transfer
H Chang, V Shejwalkar, R Shokri, A Houmansadr
arXiv preprint arXiv:1912.11279, 2019
1572019
I want my voice to be heard: IP over Voice-over-IP for unobservable censorship circumvention.
A Houmansadr, TJ Riedl, N Borisov, AC Singer
NDSS, 2013
1472013
A Cloud-based Intrusion Detection and Response System for Mobile Phones
A Houmansadr, SA Zonouz, R Berthier
5th Workshop on Recent Advances in Intrusion-Tolerant Systems, 2011
1402011
Stegobot: a covert social network botnet
S Nagaraja, A Houmansadr, P Piyawongwisal, V Singh, P Agarwal, ...
Information Hiding: 13th International Conference, IH 2011, Prague, Czech …, 2011
1372011
Secloud: A cloud-based comprehensive and lightweight security solution for smartphones
S Zonouz, A Houmansadr, R Berthier, N Borisov, W Sanders
Computers & Security 37, 215-227, 2013
1362013
SWIRL: A Scalable Watermark to Detect Correlated Network Flows.
A Houmansadr, N Borisov
NDSS, 2011
1362011
Censorspoofer: asymmetric communication using ip spoofing for censorship-resistant web browsing
Q Wang, X Gong, GTK Nguyen, A Houmansadr, N Borisov
Proceedings of the 2012 ACM conference on Computer and communications …, 2012
1302012
Multi-flow Attacks Against Network Flow Watermarking Schemes.
N Kiyavash, A Houmansadr, N Borisov
USENIX security symposium, 307-320, 2008
1112008
Membership Privacy for Machine Learning Models Through Knowledge Transfer
V Shejwalkar, A Houmansadr
35th AAAI Conference on Artificial Intelligence (AAAI), 2021
98*2021
Defeating DNN-Based Traffic Analysis Systems in Real-Time With Blind Adversarial Perturbations
M Nasr, A Bahramali, A Houmansadr
30th USENIX Security Symposium (USENIX Security 21), 2021
94*2021
Cloudtransport: Using cloud storage for censorship-resistant networking
C Brubaker, A Houmansadr, V Shmatikov
Privacy Enhancing Technologies: 14th International Symposium, PETS 2014 …, 2014
812014
The system can't perform the operation now. Try again later.
Articles 1–20