The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Publications of Amir Houmansadr Amir Houman Sadr ( http://dblp.L3S.de/Authors/Amir_Houmansadr )

Publication years (Num. hits)
2005-2012 (22) 2013-2016 (22) 2017-2018 (26) 2019 (6)
Publication types (Num. hits)
article(33) inproceedings(42) proceedings(1)
Venues (Conferences, Journals, ...)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
No Growbag Graphs found.

Results
Found 77 publication records. Showing 76 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
1Nazanin Takbiri, Amir Houmansadr, Dennis L. Goeckel, Hossein Pishro-Nik Matching Anonymized and Obfuscated Time Series to Users' Profiles. Search on Bibsonomy IEEE Trans. Information Theory The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Nazanin Takbiri, Dennis L. Goeckel, Amir Houmansadr, Hossein Pishro-Nik Asymptotic Limits of Privacy in Bayesian Time Series Matching. Search on Bibsonomy CoRR The full citation details ... 2019 DBLP  BibTeX  RDF
1Ramin Soltani, Dennis Goeckel, Don Towsley, Amir Houmansadr Fundamental Limits of Covert Packet Insertion. Search on Bibsonomy CoRR The full citation details ... 2019 DBLP  BibTeX  RDF
1Virat Shejwalkar, Amir Houmansadr Reconciling Utility and Membership Privacy via Knowledge Distillation. Search on Bibsonomy CoRR The full citation details ... 2019 DBLP  BibTeX  RDF
1Milad Nasr, Sadegh Farhang, Amir Houmansadr, Jens Grossklags Enemy At the Gateways: Censorship-Resilient Proxy Distribution Using Game Theory. Search on Bibsonomy NDSS The full citation details ... 2019 DBLP  BibTeX  RDF
1Nazanin Takbiri, Dennis L. Goeckel, Amir Houmansadr, Hossein Pishro-Nik Asymptotic Limits of Privacy in Bayesian Time Series Matching. Search on Bibsonomy CISS The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Ramin Soltani, Dennis Goeckel, Don Towsley, Amir Houmansadr Fundamental Limits of Covert Bit Insertion in Packets. Search on Bibsonomy CoRR The full citation details ... 2018 DBLP  BibTeX  RDF
1Ramin Soltani, Dennis Goeckel, Don Towsley, Amir Houmansadr Fundamental Limits of Invisible Flow Fingerprinting. Search on Bibsonomy CoRR The full citation details ... 2018 DBLP  BibTeX  RDF
1Milad Nasr, Reza Shokri, Amir Houmansadr Comprehensive Privacy Analysis of Deep Learning: Stand-alone and Federated Learning under Passive and Active White-box Inference Attacks. Search on Bibsonomy CoRR The full citation details ... 2018 DBLP  BibTeX  RDF
1Nazanin Takbiri, Ramin Soltani, Dennis L. Goeckel, Amir Houmansadr, Hossein Pishro-Nik Asymptotic Loss in Privacy due to Dependency in Gaussian Traces. Search on Bibsonomy CoRR The full citation details ... 2018 DBLP  BibTeX  RDF
1Nazanin Takbiri, Amir Houmansadr, Dennis L. Goeckel, Hossein Pishro-Nik Privacy against Statistical Matching: Inter-User Correlation. Search on Bibsonomy CoRR The full citation details ... 2018 DBLP  BibTeX  RDF
1Milad Nasr, Alireza Bahramali, Amir Houmansadr DeepCorr: Strong Flow Correlation Attacks on Tor Using Deep Learning. Search on Bibsonomy CoRR The full citation details ... 2018 DBLP  BibTeX  RDF
1Nazanin Takbiri, Amir Houmansadr, Dennis L. Goeckel, Hossein Pishro-Nik Privacy of Dependent Users Against Statistical Matching. Search on Bibsonomy CoRR The full citation details ... 2018 DBLP  BibTeX  RDF
1Milad Nasr, Reza Shokri, Amir Houmansadr Machine Learning with Membership Privacy using Adversarial Regularization. Search on Bibsonomy CoRR The full citation details ... 2018 DBLP  BibTeX  RDF
1Milad Nasr, Alireza Bahramali, Amir Houmansadr DeepCorr: Strong Flow Correlation Attacks on Tor Using Deep Learning. Search on Bibsonomy ACM Conference on Computer and Communications Security The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Milad Nasr, Reza Shokri, Amir Houmansadr Machine Learning with Membership Privacy using Adversarial Regularization. Search on Bibsonomy ACM Conference on Computer and Communications Security The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Nazanin Takbiri, Amir Houmansadr, Dennis L. Goeckel, Hossein Pishro-Nik Privacy Against Statistical Matching: Inter-User Correlation. Search on Bibsonomy ISIT The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Ramin Soltani, Dennis Goeckel, Don Towsley, Amir Houmansadr Fundamental Limits of Covert Bit Insertion in Packets. Search on Bibsonomy Allerton The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Hosein Mohammadi Makrani, Setareh Rafatirad, Amir Houmansadr, Houman Homayoun Main-Memory Requirements of Big Data Applications on Commodity Server Platform. Search on Bibsonomy CCGrid The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Hossein Sayadi, Sai Manoj P. D., Amir Houmansadr, Setareh Rafatirad, Houman Homayoun Comprehensive assessment of run-time hardware-supported malware detection using general and ensemble learning. Search on Bibsonomy CF The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Fatemeh Rezaei, Amir Houmansadr TagIt: Tagging Network Flows using Blind Fingerprints. Search on Bibsonomy PoPETs The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Amir Houmansadr, Wenxuan Zhou, Matthew Caesar, Nikita Borisov SWEET: Serving the Web by Exploiting Email Tunnels. Search on Bibsonomy IEEE/ACM Trans. Netw. The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Ramin Soltani, Dennis Goeckel, Don Towsley, Amir Houmansadr Towards Provably Invisible Network Flow Fingerprints. Search on Bibsonomy CoRR The full citation details ... 2017 DBLP  BibTeX  RDF
1Nazanin Takbiri, Amir Houmansadr, Dennis L. Goeckel, Hossein Pishro-Nik Matching Anonymized and Obfuscated Time Series to Users' Profiles. Search on Bibsonomy CoRR The full citation details ... 2017 DBLP  BibTeX  RDF
1Milad Nasr, Sadegh Farhang, Amir Houmansadr, Jens Grossklags Enemy At the Gateways: A Game Theoretic Approach to Proxy Distribution. Search on Bibsonomy CoRR The full citation details ... 2017 DBLP  BibTeX  RDF
1Zarrin Montazeri, Amir Houmansadr, Hossein Pishro-Nik Achieving Perfect Location Privacy in Wireless Devices Using Anonymization. Search on Bibsonomy IEEE Trans. Information Forensics and Security The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Milad Nasr, Hadi Zolfaghari, Amir Houmansadr The Waterfall of Liberty: Decoy Routing Circumvention that Resists Routing Attacks. Search on Bibsonomy ACM Conference on Computer and Communications Security The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Milad Nasr, Amir Houmansadr, Arya Mazumdar Compressive Traffic Analysis: A New Paradigm for Scalable Traffic Analysis. Search on Bibsonomy ACM Conference on Computer and Communications Security The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Nazanin Takbiri, Amir Houmansadr, Dennis L. Goeckel, Hossein Pishro-Nik Limits of location privacy under anonymization and obfuscation. Search on Bibsonomy ISIT The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Ramin Soltani, Dennis Goeckel, Don Towsley, Amir Houmansadr Towards provably invisible network flow fingerprints. Search on Bibsonomy ACSSC The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1A. Pinar Ozisik, Gavin Andresen, George Bissias, Amir Houmansadr, Brian Neil Levine Graphene: A New Protocol for Block Propagation Using Set Reconciliation. Search on Bibsonomy DPM/CBT@ESORICS The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Nazanin Takbiri, Amir Houmansadr, Dennis L. Goeckel, Hossein Pishro-Nik Fundamental limits of location privacy using anonymization. Search on Bibsonomy CISS The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Richard McPherson, Amir Houmansadr, Vitaly Shmatikov CovertCast: Using Live Streaming to Evade Internet Censorship. Search on Bibsonomy PoPETs The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Zarrin Montazeri, Amir Houmansadr, Hossein Pishro-Nik Achieving Perfect Location Privacy in Wireless Devices Using Anonymization. Search on Bibsonomy CoRR The full citation details ... 2016 DBLP  BibTeX  RDF
1Ramin Soltani, Dennis Goeckel, Don Towsley, Amir Houmansadr Covert Communications on Renewal Packet Channels. Search on Bibsonomy CoRR The full citation details ... 2016 DBLP  BibTeX  RDF
1Ramin Soltani, Dennis Goeckel, Don Towsley, Amir Houmansadr Covert Communications on Poisson Packet Channels. Search on Bibsonomy CoRR The full citation details ... 2016 DBLP  BibTeX  RDF
1George Bissias, Brian Neil Levine, A. Pinar Ozisik, Gavin Andresen, Amir Houmansadr An Analysis of Attacks on Blockchain Consensus. Search on Bibsonomy CoRR The full citation details ... 2016 DBLP  BibTeX  RDF
1Milad Nasr, Amir Houmansadr GAME OF DECOYS: Optimal Decoy Routing Through Game Theory. Search on Bibsonomy ACM Conference on Computer and Communications Security The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Hadi Zolfaghari, Amir Houmansadr Practical Censorship Evasion Leveraging Content Delivery Networks. Search on Bibsonomy ACM Conference on Computer and Communications Security The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Amir Houmansadr, Prateek Mittal (eds.) 6th USENIX Workshop on Free and Open Communications on the Internet, FOCI '16, Austin, TX, USA, August 8, 2016. Search on Bibsonomy FOCI The full citation details ... 2016 DBLP  BibTeX  RDF
1Ramin Soltani, Dennis Goeckel, Don Towsley, Amir Houmansadr Covert communications on renewal packet channels. Search on Bibsonomy Allerton The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Zarrin Montazeri, Amir Houmansadr, Hossein Pishro-Nik Achieving perfect location privacy in Markov models using anonymization. Search on Bibsonomy ISITA The full citation details ... 2016 DBLP  BibTeX  RDF
1Zarrin Montazeri, Amir Houmansadr, Hossein Pishro-Nik Defining perfect location privacy using anonymization. Search on Bibsonomy CISS The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1John Holowczak, Amir Houmansadr CacheBrowser: Bypassing Chinese Censorship without Proxies Using Cached Content. Search on Bibsonomy ACM Conference on Computer and Communications Security The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Ramin Soltani, Dennis Goeckel, Don Towsley, Amir Houmansadr Covert communications on Poisson packet channels. Search on Bibsonomy Allerton The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Ali Zand, Amir Houmansadr, Giovanni Vigna, Richard A. Kemmerer, Christopher Kruegel Know Your Achilles' Heel: Automatic Detection of Network Critical Services. Search on Bibsonomy ACSAC The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Amir Houmansadr, Negar Kiyavash, Nikita Borisov Non-Blind Watermarking of Network Flows. Search on Bibsonomy IEEE/ACM Trans. Netw. The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Amir Houmansadr, Edmund L. Wong, Vitaly Shmatikov No Direction Home: The True Cost of Routing Around Decoys. Search on Bibsonomy NDSS The full citation details ... 2014 DBLP  BibTeX  RDF
1Chad Brubaker, Amir Houmansadr, Vitaly Shmatikov CloudTransport: Using Cloud Storage for Censorship-Resistant Networking. Search on Bibsonomy Privacy Enhancing Technologies The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Saman A. Zonouz, Amir Houmansadr, Robin Berthier, Nikita Borisov, William H. Sanders Secloud: A cloud-based comprehensive and lightweight security solution for smartphones. Search on Bibsonomy Computers & Security The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Amir Houmansadr, Nikita Borisov BotMosaic: Collaborative network watermark for the detection of IRC-based botnets. Search on Bibsonomy Journal of Systems and Software The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Amir Houmansadr, Thomas J. Riedl, Nikita Borisov, Andrew C. Singer I want my voice to be heard: IP over Voice-over-IP for unobservable censorship circumvention. Search on Bibsonomy NDSS The full citation details ... 2013 DBLP  BibTeX  RDF
1Amir Houmansadr, Nikita Borisov The Need for Flow Fingerprints to Link Correlated Network Flows. Search on Bibsonomy Privacy Enhancing Technologies The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Amir Houmansadr, Chad Brubaker, Vitaly Shmatikov The Parrot Is Dead: Observing Unobservable Network Communications. Search on Bibsonomy IEEE Symposium on Security and Privacy The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Amir Houmansadr, Wenxuan Zhou, Matthew Caesar, Nikita Borisov SWEET: Serving the Web by Exploiting Email Tunnels Search on Bibsonomy CoRR The full citation details ... 2012 DBLP  BibTeX  RDF
1Amir Houmansadr, Negar Kiyavash, Nikita Borisov Non-blind watermarking of network flows Search on Bibsonomy CoRR The full citation details ... 2012 DBLP  BibTeX  RDF
1Amir Houmansadr, Thomas J. Riedl, Nikita Borisov, Andrew C. Singer IP over Voice-over-IP for censorship circumvention Search on Bibsonomy CoRR The full citation details ... 2012 DBLP  BibTeX  RDF
1Amir Houmansadr, Nikita Borisov BotMosaic: Collaborative Network Watermark for Botnet Detection Search on Bibsonomy CoRR The full citation details ... 2012 DBLP  BibTeX  RDF
1Qiyan Wang, Xun Gong, Giang T. K. Nguyen, Amir Houmansadr, Nikita Borisov CensorSpoofer: Asymmetric Communication with IP Spoofing for Censorship-Resistant Web Browsing Search on Bibsonomy CoRR The full citation details ... 2012 DBLP  BibTeX  RDF
1Negar Kiyavash, Amir Houmansadr, Nikita Borisov Multi-Flow Attacks Against Network Flow Watermarks: Analysis and Countermeasures Search on Bibsonomy CoRR The full citation details ... 2012 DBLP  BibTeX  RDF
1Saman A. Zonouz, Amir Houmansadr, Parisa Haghani EliMet: Security metric elicitation in power grid critical infrastructures by observing system administrators' responsive behavior. Search on Bibsonomy DSN The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Qiyan Wang, Xun Gong, Giang T. K. Nguyen, Amir Houmansadr, Nikita Borisov CensorSpoofer: asymmetric communication using IP spoofing for censorship-resistant web browsing. Search on Bibsonomy ACM Conference on Computer and Communications Security The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Shishir Nagaraja, Amir Houmansadr, Pratch Piyawongwisal, Vijit Singh, Pragya Agarwal, Nikita Borisov Stegobot: construction of an unobservable communication network leveraging social behavior Search on Bibsonomy CoRR The full citation details ... 2011 DBLP  BibTeX  RDF
1Amir Houmansadr, Saman A. Zonouz, Robin Berthier A cloud-based intrusion detection and response system for mobile phones. Search on Bibsonomy DSN Workshops The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Amir Houmansadr, Giang T. K. Nguyen, Matthew Caesar, Nikita Borisov Cirripede: circumvention infrastructure using router redirection with plausible deniability. Search on Bibsonomy ACM Conference on Computer and Communications Security The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Amir Houmansadr, Nikita Borisov Towards improving network flow watermarks using the repeat-accumulate codes. Search on Bibsonomy ICASSP The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Amir Houmansadr, Nikita Borisov SWIRL: A Scalable Watermark to Detect Correlated Network Flows. Search on Bibsonomy NDSS The full citation details ... 2011 DBLP  BibTeX  RDF
1Shishir Nagaraja, Amir Houmansadr, Pratch Piyawongwisal, Vijit Singh, Pragya Agarwal, Nikita Borisov Stegobot: A Covert Social Network Botnet. Search on Bibsonomy Information Hiding The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Amir Houmansadr, Nikita Borisov CoCo: Coding-Based Covert Timing Channels for Network Flows. Search on Bibsonomy Information Hiding The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Casey Cipriano, Ali Zand, Amir Houmansadr, Christopher Kruegel, Giovanni Vigna Nexat: a history-based approach to predict attacker actions. Search on Bibsonomy ACSAC The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Amir Houmansadr, Negar Kiyavash, Nikita Borisov Multi-flow attack resistant watermarks for network flows. Search on Bibsonomy ICASSP The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Amir Houmansadr, Negar Kiyavash, Nikita Borisov RAINBOW: A Robust And Invisible Non-Blind Watermark for Network Flows. (PDF / PS) Search on Bibsonomy NDSS The full citation details ... 2009 DBLP  BibTeX  RDF
1Negar Kiyavash, Amir Houmansadr, Nikita Borisov Multi-flow Attacks Against Network Flow Watermarking Schemes. Search on Bibsonomy USENIX Security Symposium The full citation details ... 2008 DBLP  BibTeX  RDF
1Amir Houman Sadr, Shahrokh Ghaemmaghami A Collusion-Resistant Video Watermarking Scheme. Search on Bibsonomy Information Hiding The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
1Amir Houmansadr, Hamed Pirsiavash, Shahrokh Ghaemmaghami Robust Content-Based Video Watermarking Exploiting Motion Entropy Masking Effect. Search on Bibsonomy SIGMAP The full citation details ... 2006 DBLP  BibTeX  RDF
1Amir Houman Sadr, Shahrokh Ghaemmaghami Robustness Enhancement of Content-Based Watermarks Using Entropy Masking Effect. Search on Bibsonomy IWDW The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
Displaying result #1 - #76 of 76 (100 per page; Change: )
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license