Mehrdad Aliasgari

Orcid: 0000-0002-9019-6857

According to our database1, Mehrdad Aliasgari authored at least 25 papers between 2010 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Machine Learning in Chaos-Based Encryption: Theory, Implementations, and Applications.
IEEE Access, 2023

Attacks on Continuous Chaos Communication and Remedies for Resource Limited Devices.
Proceedings of the 24th International Symposium on Quality Electronic Design, 2023

Mitigating Autonomous Vehicle GPS Spoofing Attacks through Scene Text Observations.
Proceedings of the 56th Hawaii International Conference on System Sciences, 2023

2022
Towards AI-Enabled Hardware Security: Challenges and Opportunities.
Proceedings of the 28th IEEE International Symposium on On-Line Testing and Robust System Design, 2022

Global Attack and Remedy on IC-Specific Logic Encryption.
Proceedings of the IEEE International Symposium on Hardware Oriented Security and Trust, 2022

Towards an Efficient Client Selection System for Federated Learning.
Proceedings of the Cloud Computing - CLOUD 2022, 2022

2021
Deep Encoder-Decoder Neural Networks for Retinal Blood Vessels Dense Prediction.
Int. J. Comput. Intell. Syst., 2021

Computing the Optimal Longest Queue Length in Torus Networks.
Proceedings of the Theory and Practice of Natural Computing, 2021

A Comprehensive Analysis of Chaos-Based Secure Systems.
Proceedings of the Silicon Valley Cybersecurity Conference - Second Conference, 2021

When Machine Learning Meets Hardware Cybersecurity: Delving into Accurate Zero-Day Malware Detection.
Proceedings of the 22nd International Symposium on Quality Electronic Design, 2021

Adaptive-HMD: Accurate and Cost-Efficient Machine Learning-Driven Malware Detection using Microarchitectural Events.
Proceedings of the 27th IEEE International Symposium on On-Line Testing and Robust System Design, 2021

2020
Recent Advancements in Microarchitectural Security: Review of Machine Learning Countermeasures.
Proceedings of the 63rd IEEE International Midwest Symposium on Circuits and Systems, 2020

Improving Fitness Levels of Individuals with Autism Spectrum Disorder: A Preliminary Evaluation of Real-Time Interactive Heart Rate Visualization to Motivate Engagement in Physical Activity.
Proceedings of the Computers Helping People with Special Needs, 2020

2018
Secure Mobile Automation of Ecological Momentary Assessments (EMA) For Structured Querying.
EAI Endorsed Trans. Ambient Syst., 2018

2017
Secure computation of hidden Markov models and secure floating-point arithmetic in the malicious model.
Int. J. Inf. Sec., 2017

Secure Fingerprint Alignment and Matching Protocols.
CoRR, 2017

2016
Optimal Queue Length in Torus Networks with Traffic Signals.
CoRR, 2016

2013
Analysis of Reusability of Secure Sketches and Fuzzy Extractors.
IEEE Trans. Inf. Forensics Secur., 2013

Secure Computation of Hidden Markov Models.
Proceedings of the SECRYPT 2013, 2013

Data-oblivious graph algorithms for secure computation and outsourcing.
Proceedings of the 8th ACM Symposium on Information, Computer and Communications Security, 2013

2012
On the (Non-)Reusability of Fuzzy Sketches and Extractors and Security Improvements in the Computational Setting.
IACR Cryptol. ePrint Arch., 2012

Secure Computation on Floating Point Numbers.
IACR Cryptol. ePrint Arch., 2012

2011
Secure Outsourced Computation of Iris Matching.
IACR Cryptol. ePrint Arch., 2011

On the (Non-)reusability of Fuzzy Sketches and Extractors and Security in the Computational Setting.
Proceedings of the SECRYPT 2011 - Proceedings of the International Conference on Security and Cryptography, Seville, Spain, 18, 2011

2010
Secure Outsourcing of DNA Searching via Finite Automata.
Proceedings of the Data and Applications Security and Privacy XXIV, 2010


  Loading...