Hossein Fereidooni
Orcid: 0000-0002-3559-0296
According to our database1,
Hossein Fereidooni
authored at least 24 papers
between 2014 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
CoRR, 2024
Proceedings of the 33rd USENIX Security Symposium, 2024
Proceedings of the 31st Annual Network and Distributed System Security Symposium, 2024
FreqFed: A Frequency Analysis-Based Approach for Mitigating Poisoning Attacks in Federated Learning.
Proceedings of the 31st Annual Network and Distributed System Security Symposium, 2024
Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security, 2024
2023
Proceedings of the 32nd USENIX Security Symposium, 2023
Proceedings of the 44th IEEE Symposium on Security and Privacy, 2023
Smarter Contracts: Detecting Vulnerabilities in Smart Contracts with Deep Transfer Learning.
Proceedings of the 30th Annual Network and Distributed System Security Symposium, 2023
AuthentiSense: A Scalable Behavioral Biometrics Authentication Scheme using Few-Shot Learning for Mobile Platforms.
Proceedings of the 30th Annual Network and Distributed System Security Symposium, 2023
Proceedings of the Annual Computer Security Applications Conference, 2023
2022
Proceedings of the 31st USENIX Security Symposium, 2022
Proceedings of the 29th Annual Network and Distributed System Security Symposium, 2022
2021
IACR Cryptol. ePrint Arch., 2021
ESCORT: Ethereum Smart COntRacTs Vulnerability Detection using Deep Neural Network and Transfer Learning.
CoRR, 2021
2020
Proceedings of the WiSec '20: 13th ACM Conference on Security and Privacy in Wireless and Mobile Networks, 2020
Proceedings of the 57th ACM/IEEE Design Automation Conference, 2020
2019
Proceedings of the 39th IEEE International Conference on Distributed Computing Systems, 2019
2017
Proceedings of the Research in Attacks, Intrusions, and Defenses, 2017
Proceedings of the Second IEEE/ACM International Conference on Connected Health: Applications, 2017
2016
Android Code Protection via Obfuscation Techniques: Past, Present and Future Directions.
CoRR, 2016
Proceedings of the 8th IFIP International Conference on New Technologies, 2016
2014
Proceedings of the Decision and Game Theory for Security - 5th International Conference, 2014