Sadegh Farhang

According to our database1, Sadegh Farhang authored at least 17 papers between 2014 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
A Deep Learning Approach for Imbalanced Tabular Data in Advertiser Prospecting: A Case of Direct Mail Prospecting.
CoRR, 2024

2021
CHIMERA: Autonomous Planning and Orchestration for Malware Deception.
Proceedings of the IEEE Conference on Communications and Network Security, 2021

2020
An Empirical Study of Android Security Bulletins in Different Vendors.
Proceedings of the WWW '20: The Web Conference 2020, Taipei, Taiwan, April 20-24, 2020, 2020

Targeted Data-driven Regularization for Out-of-Distribution Generalization.
Proceedings of the KDD '20: The 26th ACM SIGKDD Conference on Knowledge Discovery and Data Mining, 2020

2019
Hey Google, What Exactly Do Your Security Patches Tell Us? A Large-Scale Empirical Study on Android Patched Vulnerabilities.
CoRR, 2019

Enemy At the Gateways: Censorship-Resilient Proxy Distribution Using Game Theory.
Proceedings of the 26th Annual Network and Distributed System Security Symposium, 2019

2018
VaultIME: Regaining User Control for Password Managers through Auto-correction.
EAI Endorsed Trans. Security Safety, 2018

An Economic Study of the Effect of Android Platform Fragmentation on Security Updates.
Proceedings of the Financial Cryptography and Data Security, 2018

Take It or Leave It: A Survey Study on Operating System Upgrade Practices.
Proceedings of the 34th Annual Computer Security Applications Conference, 2018

2017
Enemy At the Gateways: A Game Theoretic Approach to Proxy Distribution.
CoRR, 2017

When to Invest in Security? Empirical Evidence and a Game-Theoretic Approach for Time-Based Security.
CoRR, 2017

On the Economics of Ransomware.
Proceedings of the Decision and Game Theory for Security - 8th International Conference, 2017

2016
FlipLeakage: A Game-Theoretic Approach to Protect Against Stealthy Attackers in the Presence of Information Leakage.
Proceedings of the Decision and Game Theory for Security - 7th International Conference, 2016

2015
Physical layer location privacy issue in wireless small cell networks.
Proceedings of the 8th ACM Conference on Security & Privacy in Wireless and Mobile Networks, 2015

Flip the Cloud: Cyber-Physical Signaling Games in the Presence of Advanced Persistent Threats.
Proceedings of the Decision and Game Theory for Security - 6th International Conference, 2015

PHY-layer location privacy-preserving access point selection mechanism in next-generation wireless networks.
Proceedings of the 2015 IEEE Conference on Communications and Network Security, 2015

2014
A Dynamic Bayesian Security Game Framework for Strategic Defense Mechanism Design.
Proceedings of the Decision and Game Theory for Security - 5th International Conference, 2014


  Loading...