Pooria Madani

Orcid: 0000-0002-4474-8817

According to our database1, Pooria Madani authored at least 14 papers between 2015 and 2024.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of five.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Noise as a Double-Edged Sword: Reinforcement Learning Exploits Randomized Defenses in Neural Networks.
CoRR, 2024

Fine-Tuning LLMs for Code Mutation: A New Era of Cyber Threats.
CoRR, 2024

2023
Metamorphic Malware Evolution: The Potential and Peril of Large Language Models.
Proceedings of the 5th IEEE International Conference on Trust, 2023

2022
Randomized Moving Target Approach for MAC-Layer Spoofing Detection and Prevention in IoT Systems.
DTRAP, 2022

Effective Segmentation of RSSI Timeseries Produced by Stationary IoT Nodes: Comparative Study.
Proceedings of the Attacks and Defenses for the Internet-of-Things, 2022

2021
RSSI-Based MAC-Layer Spoofing Detection: Deep Learning Approach.
J. Cybersecur. Priv., August, 2021

Unsupervised ML Based Detection of Malicious Web Sessions with Automated Feature Selection: Design and Real-World Validation.
Proceedings of the 18th IEEE Annual Consumer Communications & Networking Conference, 2021

2020
MAC-Layer Spoofing Detection and Prevention in IoT Systems: Randomized Moving Target Approach.
Proceedings of the CPSIOTSEC'20: Proceedings of the 2020 Joint Workshop on CPS&IoT Security and Privacy, 2020

2019
Near-optimal Evasion of Randomized Convex-inducing Classifiers in Adversarial Environments.
Proceedings of the 14th International Conference on Availability, Reliability and Security, 2019

2018
Robustness of deep autoencoder in intrusion detection under adversarial contamination.
Proceedings of the 5th Annual Symposium and Bootcamp on Hot Topics in the Science of Security, 2018

2017
Rethinking the Use of Resource Hints in HTML5: Is Faster Always Better!?
J. Cyber Secur. Mobil., 2017

Resource Hints in HTML5: A New Pandora's Box of Security Nightmares.
Proceedings of the 12th International Conference on Availability, Reliability and Security, Reggio Calabria, Italy, August 29, 2017

2016
Towards sequencing malicious system calls.
Proceedings of the 2016 IEEE Conference on Communications and Network Security, 2016

2015
A Framework for Discovering Bursty Events and Their Relationships from Online News Articles.
Proceedings of the Advances in Artificial Intelligence, 2015


  Loading...