Amir Rahmati
Orcid: 0000-0001-7361-1898
According to our database1,
Amir Rahmati
authored at least 47 papers
between 2012 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
Trans. Mach. Learn. Res., 2024
Taking off the Rose-Tinted Glasses: A Critical Look at Adversarial ML Through the Lens of Evasion Attacks.
CoRR, 2024
Proceedings of the 33rd USENIX Security Symposium, 2024
Proceedings of the 31st Annual Network and Distributed System Security Symposium, 2024
Zero-One Attack: Degrading Closed-Loop Neural Network Control Systems using State-Time Perturbations.
Proceedings of the 15th ACM/IEEE International Conference on Cyber-Physical Systems, 2024
Proceedings of the 27th ACM International Conference on Hybrid Systems: Computation and Control, 2024
Proceedings of the 2024 Workshop on Cybersecurity in Healthcare, 2024
2023
Proceedings of the ACM Web Conference 2023, 2023
Proceedings of the 32nd USENIX Security Symposium, 2023
2022
Proceedings of the 31st USENIX Security Symposium, 2022
Proceedings of the 43rd IEEE Security and Privacy, 2022
Proceedings of the Advances in Neural Information Processing Systems 35: Annual Conference on Neural Information Processing Systems 2022, 2022
2021
Proceedings of the 42nd IEEE Symposium on Security and Privacy, 2021
2020
An Intent-Based Automation Framework for Securing Dynamic Consumer IoT Infrastructures.
Proceedings of the WWW '20: The Web Conference 2020, Taipei, Taiwan, April 20-24, 2020, 2020
Proceedings of the WWW '20: The Web Conference 2020, Taipei, Taiwan, April 20-24, 2020, 2020
2019
Decentralized Cooperative Communication-less Multi-Agent Task Assignment with Monte-Carlo Tree Search.
CoRR, 2019
CoRR, 2019
VISCR: Intuitive & Conflict-free Automation for Securing the Dynamic Consumer IoT Infrastructures.
CoRR, 2019
Protecting Visual Information in Augmented Reality from Malicious Application Developers.
Proceedings of the 5th ACM Workshop on Wearable Systems and Applications, 2019
2018
Proceedings of the 12th USENIX Workshop on Offensive Technologies, 2018
ATtention Spanned: Comprehensive Vulnerability Analysis of AT Commands Within the Android Ecosystem.
Proceedings of the 27th USENIX Security Symposium, 2018
Proceedings of the 2018 IEEE Cybersecurity Development, SecDev 2018, Cambridge, MA, USA, 2018
Proceedings of the 25th Annual Network and Distributed System Security Symposium, 2018
Proceedings of the 2018 IEEE Conference on Computer Vision and Pattern Recognition, 2018
2017
PhD thesis, 2017
IEEE Secur. Priv., 2017
Internet of Things Security Research: A Rehash of Old Ideas or New Intellectual Challenges?
IEEE Secur. Priv., 2017
CoRR, 2017
Decoupled-IFTTT: Constraining Privilege in Trigger-Action Platforms for the Internet of Things.
CoRR, 2017
Proceedings of the 24th Annual Network and Distributed System Security Symposium, 2017
Proceedings of the 15th Annual International Conference on Mobile Systems, 2017
2016
ACM Trans. Embed. Comput. Syst., 2016
Proceedings of the 25th USENIX Security Symposium, 2016
Applying the Opacified Computation Model to Enforce Information Flow Policies in IoT Applications.
Proceedings of the IEEE Cybersecurity Development, 2016
Proceedings of the 15th ACM Workshop on Hot Topics in Networks, 2016
2015
IEEE Trans. Comput. Aided Des. Integr. Circuits Syst., 2015
Proceedings of the 42nd Annual International Symposium on Computer Architecture, 2015
Proceedings of the 5th Annual ACM CCS Workshop on Security and Privacy in Smartphones and Mobile Devices, 2015
2013
WattsUpDoc: Power Side Channels to Nonintrusively Discover Untargeted Malware on Embedded Medical Devices.
Proceedings of the 2013 USENIX Workshop on Health Information Technologies, 2013
2012
TARDIS: Time and Remanence Decay in SRAM to Implement Secure Protocols on Embedded Devices without Clocks.
Proceedings of the 21th USENIX Security Symposium, Bellevue, WA, USA, August 8-10, 2012, 2012
DRV-Fingerprinting: Using Data Retention Voltage of SRAM Cells for Chip Identification.
Proceedings of the Radio Frequency Identification. Security and Privacy Issues, 2012