Hojjat Aghakhani

According to our database1, Hojjat Aghakhani authored at least 14 papers between 2016 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
TrojanPuzzle: Covertly Poisoning Code-Suggestion Models.
Proceedings of the IEEE Symposium on Security and Privacy, 2024

2023
Machine Learning and Security in Adversarial Settings
PhD thesis, 2023

Venomave: Targeted Poisoning Against Speech Recognition.
Proceedings of the 2023 IEEE Conference on Secure and Trustworthy Machine Learning, 2023

2022
DEEPCASE: Semi-Supervised Contextual Analysis of Security Events.
Proceedings of the 43rd IEEE Symposium on Security and Privacy, 2022

2021
One Size Does Not Fit All: A Longitudinal Analysis of Brazilian Financial Malware.
ACM Trans. Priv. Secur., 2021

Bullseye Polytope: A Scalable Clean-Label Poisoning Attack with Improved Transferability.
Proceedings of the IEEE European Symposium on Security and Privacy, 2021

Bran: Reduce Vulnerability Search Space in Large Open Source Repositories by Learning Bug Symptoms.
Proceedings of the ASIA CCS '21: ACM Asia Conference on Computer and Communications Security, 2021

2020
VENOMAVE: Clean-Label Poisoning Against Speech Recognition.
CoRR, 2020

When Malware is Packin' Heat; Limits of Machine Learning Classifiers Based on Static Analysis Features.
Proceedings of the 27th Annual Network and Distributed System Security Symposium, 2020

2019
Lightning Talk - Think Outside the Dataset: Finding Fraudulent Reviews using Cross-Dataset Analysis.
Proceedings of the Companion of The 2019 World Wide Web Conference, 2019

Think Outside the Dataset: Finding Fraudulent Reviews using Cross-Dataset Analysis.
Proceedings of the World Wide Web Conference, 2019

Neurlux: dynamic malware analysis without feature engineering.
Proceedings of the 35th Annual Computer Security Applications Conference, 2019

2018
Detecting Deceptive Reviews Using Generative Adversarial Networks.
Proceedings of the 2018 IEEE Security and Privacy Workshops, 2018

2016
Integrating evolutionary game theory into an agent-based model of ductal carcinoma in situ: Role of gap junctions in cancer progression.
Comput. Methods Programs Biomed., 2016


  Loading...