Amir Houmansadr
Orcid: 0000-0002-7553-6657Affiliations:
- University of Massachusetts Amherst, MA, USA
According to our database1,
Amir Houmansadr
authored at least 123 papers
between 2005 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2024
ProxyGPT: Enabling Anonymous Queries in AI Chatbots with (Un)Trustworthy Browser Proxies.
CoRR, 2024
MeanSparse: Post-Training Robustness Enhancement Through Mean-Centered Feature Sparsification.
CoRR, 2024
CoRR, 2024
Proceedings of the Companion Proceedings of the ACM on Web Conference 2024, 2024
Proceedings of the 33rd USENIX Security Symposium, 2024
Proceedings of the Computer Security - ESORICS 2024, 2024
Proceedings of the 2024 Conference on Empirical Methods in Natural Language Processing, 2024
Proceedings of the 58th Annual Conference on Information Sciences and Systems, 2024
2023
I Still Know What You Did Last Summer: Inferring Sensitive User Activities on Messaging Applications Through Traffic Analysis.
IEEE Trans. Dependable Secur. Comput., 2023
IEEE Internet Things J., 2023
CoRR, 2023
Memory Triggers: Unveiling Memorization in Text-To-Image Generative Models through Word-Level Duplication.
CoRR, 2023
RAIFLE: Reconstruction Attacks on Interaction-based Federated Learning with Active Data Manipulation.
CoRR, 2023
Proceedings of the 32nd USENIX Security Symposium, 2023
Every Vote Counts: Ranking-Based Training of Federated Learning to Resist Poisoning Attacks.
Proceedings of the 32nd USENIX Security Symposium, 2023
Proceedings of the 2023 IEEE Security and Privacy Workshops (SPW), 2023
Proceedings of the International Conference on Machine Learning, 2023
The Perils of Learning From Unlabeled Data: Backdoor Attacks on Semi-supervised Learning.
Proceedings of the IEEE/CVF International Conference on Computer Vision, 2023
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, 2023
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, 2023
Proceedings of the 2023 ACM Asia Conference on Computer and Communications Security, 2023
2022
Proc. Priv. Enhancing Technol., 2022
IEEE Internet Things J., 2022
Mitigating Membership Inference Attacks by Self-Distillation Through a Novel Ensemble Architecture.
Proceedings of the 31st USENIX Security Symposium, 2022
Back to the Drawing Board: A Critical Evaluation of Poisoning Attacks on Production Federated Learning.
Proceedings of the 43rd IEEE Symposium on Security and Privacy, 2022
Proceedings of the 20th ACM Conference on Embedded Networked Sensor Systems, 2022
Proceedings of the International Symposium on Networks, Computers and Communications, 2022
Proceedings of the IEEE International Symposium on Information Theory, 2022
2021
IEEE Commun. Lett., 2021
Back to the Drawing Board: A Critical Evaluation of Poisoning Attacks on Federated Learning.
CoRR, 2021
Defeating DNN-Based Traffic Analysis Systems in Real-Time With Blind Adversarial Perturbations.
Proceedings of the 30th USENIX Security Symposium, 2021
Manipulating the Byzantine: Optimizing Model Poisoning Attacks and Defenses for Federated Learning.
Proceedings of the 28th Annual Network and Distributed System Security Symposium, 2021
Proceedings of the CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security, Virtual Event, Republic of Korea, November 15, 2021
Proceedings of the ACSAC '21: Annual Computer Security Applications Conference, Virtual Event, USA, December 6, 2021
Proceedings of the Thirty-Fifth AAAI Conference on Artificial Intelligence, 2021
2020
Leveraging Prior Knowledge Asymmetries in the Design of Location Privacy-Preserving Mechanisms.
IEEE Wirel. Commun. Lett., 2020
IEEE Trans. Inf. Theory, 2020
IEEE Trans. Inf. Forensics Secur., 2020
Improving Deep Learning with Differential Privacy using Gradient Encoding and Denoising.
CoRR, 2020
Proceedings of the 10th USENIX Workshop on Free and Open Communications on the Internet, 2020
Proceedings of the Security and Privacy in Communication Networks, 2020
Proceedings of the 27th Annual Network and Distributed System Security Symposium, 2020
Proceedings of the 27th Annual Network and Distributed System Security Symposium, 2020
Proceedings of the 27th Annual Network and Distributed System Security Symposium, 2020
Proceedings of the IEEE International Symposium on Information Theory, 2020
Proceedings of the IMC '20: ACM Internet Measurement Conference, 2020
2019
IEEE Trans. Inf. Theory, 2019
Cronus: Robust and Heterogeneous Collaborative Learning with Black-Box Knowledge Transfer.
CoRR, 2019
Proceedings of the 2019 IEEE Wireless Communications and Networking Conference, 2019
Proceedings of the 9th USENIX Workshop on Free and Open Communications on the Internet, 2019
Comprehensive Privacy Analysis of Deep Learning: Passive and Active White-box Inference Attacks against Centralized and Federated Learning.
Proceedings of the 2019 IEEE Symposium on Security and Privacy, 2019
Proceedings of the 26th Annual Network and Distributed System Security Symposium, 2019
Blocking-Resilient Communications in Information-Centric Networks Using Router Redirection.
Proceedings of the 2019 IEEE Globecom Workshops, Waikoloa, HI, USA, December 9-13, 2019, 2019
Proceedings of the 53rd Annual Conference on Information Sciences and Systems, 2019
Proceedings of the 35th Annual Computer Security Applications Conference, 2019
2018
Comprehensive Privacy Analysis of Deep Learning: Stand-alone and Federated Learning under Passive and Active White-box Inference Attacks.
CoRR, 2018
Proceedings of the 2018 IEEE International Symposium on Information Theory, 2018
Comprehensive assessment of run-time hardware-supported malware detection using general and ensemble learning.
Proceedings of the 15th ACM International Conference on Computing Frontiers, 2018
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018
Proceedings of the 18th IEEE/ACM International Symposium on Cluster, 2018
Proceedings of the 56th Annual Allerton Conference on Communication, 2018
2017
IEEE Trans. Inf. Forensics Secur., 2017
Proc. Priv. Enhancing Technol., 2017
Proceedings of the 2017 IEEE International Symposium on Information Theory, 2017
Proceedings of the Data Privacy Management, Cryptocurrencies and Blockchain Technology, 2017
Proceedings of the 51st Annual Conference on Information Sciences and Systems, 2017
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, 2017
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, 2017
Proceedings of the 51st Asilomar Conference on Signals, Systems, and Computers, 2017
2016
Proc. Priv. Enhancing Technol., 2016
Proceedings of the 2016 International Symposium on Information Theory and Its Applications, 2016
Proceedings of the 2016 Annual Conference on Information Science and Systems, 2016
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016
Proceedings of the 54th Annual Allerton Conference on Communication, 2016
2015
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015
Proceedings of the 53rd Annual Allerton Conference on Communication, 2015
Proceedings of the 31st Annual Computer Security Applications Conference, 2015
2014
Proceedings of the Privacy Enhancing Technologies - 14th International Symposium, 2014
Proceedings of the 21st Annual Network and Distributed System Security Symposium, 2014
2013
J. Syst. Softw., 2013
Secloud: A cloud-based comprehensive and lightweight security solution for smartphones.
Comput. Secur., 2013
Proceedings of the 2013 IEEE Symposium on Security and Privacy, 2013
Proceedings of the Privacy Enhancing Technologies - 13th International Symposium, 2013
I want my voice to be heard: IP over Voice-over-IP for unobservable censorship circumvention.
Proceedings of the 20th Annual Network and Distributed System Security Symposium, 2013
2012
PhD thesis, 2012
CensorSpoofer: Asymmetric Communication with IP Spoofing for Censorship-Resistant Web Browsing
CoRR, 2012
CoRR, 2012
EliMet: Security metric elicitation in power grid critical infrastructures by observing system administrators' responsive behavior.
Proceedings of the IEEE/IFIP International Conference on Dependable Systems and Networks, 2012
CensorSpoofer: asymmetric communication using IP spoofing for censorship-resistant web browsing.
Proceedings of the ACM Conference on Computer and Communications Security, 2012
2011
Stegobot: construction of an unobservable communication network leveraging social behavior
CoRR, 2011
Proceedings of the Network and Distributed System Security Symposium, 2011
Proceedings of the Information Hiding - 13th International Conference, 2011
Proceedings of the Information Hiding - 13th International Conference, 2011
Proceedings of the IEEE International Conference on Acoustics, 2011
Proceedings of the IEEE/IFIP International Conference on Dependable Systems and Networks Workshops (DSN-W 2011), 2011
Cirripede: circumvention infrastructure using router redirection with plausible deniability.
Proceedings of the 18th ACM Conference on Computer and Communications Security, 2011
Proceedings of the Twenty-Seventh Annual Computer Security Applications Conference, 2011
2009
Proceedings of the Network and Distributed System Security Symposium, 2009
Proceedings of the IEEE International Conference on Acoustics, 2009
2008
Proceedings of the 17th USENIX Security Symposium, 2008
2006
Robust Content-Based Video Watermarking Exploiting Motion Entropy Masking Effect.
Proceedings of the SIGMAP 2006, 2006
Proceedings of the Information Hiding, 8th International Workshop, 2006
2005
Proceedings of the Digital Watermarking, 4th International Workshop, 2005