default search action
Amir Houmansadr
Person information
- affiliation: University of Massachusetts Amherst, MA, USA
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c77]Bo Guan, Shuangqing Wei, Amir Houmansadr, Hossein Pishro-Nik, Dennis Goeckel:
Optimal Obfuscation to Protect Client Privacy in Federated Learning. CISS 2024: 1-6 - [c76]Yapei Chang, Kalpesh Krishna, Amir Houmansadr, John Wieting, Mohit Iyyer:
PostMark: A Robust Blackbox Watermark for Large Language Models. EMNLP 2024: 8969-8987 - [c75]Hamid Mozaffari, Sunav Choudhary, Amir Houmansadr:
Fake or Compromised? Making Sense of Malicious Clients in Federated Learning. ESORICS (1) 2024: 187-207 - [c74]Diwen Xue, Michalis Kallitsis, Amir Houmansadr, Roya Ensafi:
Fingerprinting Obfuscated Proxy Traffic with Encapsulated TLS Handshakes. USENIX Security Symposium 2024 - [c73]Katherine Avery, Amir Houmansadr, David D. Jensen:
The Effect of Alter Ego Accounts on A/B Tests in Social Networks. WWW (Companion Volume) 2024: 565-568 - [i53]Hyejun Jeong, Shiqing Ma, Amir Houmansadr:
SoK: Challenges and Opportunities in Federated Unlearning. CoRR abs/2403.02437 (2024) - [i52]Hamid Mozaffari, Sunav Choudhary, Amir Houmansadr:
Fake or Compromised? Making Sense of Malicious Clients in Federated Learning. CoRR abs/2403.06319 (2024) - [i51]Ali Naseh, Katherine Thai, Mohit Iyyer, Amir Houmansadr:
Iteratively Prompting Multimodal LLMs to Reproduce Natural and AI-Generated Images. CoRR abs/2404.13784 (2024) - [i50]Yuefeng Peng, Jaechul Roh, Subhransu Maji, Amir Houmansadr:
OSLO: One-Shot Label-Only Membership Inference Attacks. CoRR abs/2405.16978 (2024) - [i49]Sajjad Amini, Mohammadreza Teymoorianfard, Shiqing Ma, Amir Houmansadr:
MeanSparse: Post-Training Robustness Enhancement Through Mean-Centered Feature Sparsification. CoRR abs/2406.05927 (2024) - [i48]Yapei Chang, Kalpesh Krishna, Amir Houmansadr, John Wieting, Mohit Iyyer:
PostMark: A Robust Blackbox Watermark for Large Language Models. CoRR abs/2406.14517 (2024) - [i47]Ali Naseh, Jaechul Roh, Eugene Bagdasaryan, Amir Houmansadr:
Injecting Bias in Text-To-Image Models via Composite-Trigger Backdoors. CoRR abs/2406.15213 (2024) - [i46]Dzung Pham, Jade Sheffey, Chau Minh Pham, Amir Houmansadr:
ProxyGPT: Enabling Anonymous Queries in AI Chatbots with (Un)Trustworthy Browser Proxies. CoRR abs/2407.08792 (2024) - 2023
- [j18]Saeede Enayati, Dennis Goeckel, Amir Houmansadr, Hossein Pishro-Nik:
Location Privacy Protection for UAVs in Package Delivery and IoT Data Collection. IEEE Internet Things J. 10(23): 20586-20601 (2023) - [j17]Ardavan Bozorgi, Alireza Bahramali, Fatemeh Rezaei, Amirhossein Ghafari, Amir Houmansadr, Ramin Soltani, Dennis Goeckel, Don Towsley:
I Still Know What You Did Last Summer: Inferring Sensitive User Activities on Messaging Applications Through Traffic Analysis. IEEE Trans. Dependable Secur. Comput. 20(5): 4135-4153 (2023) - [c72]Ali Zohaib, Jade Sheffey, Amir Houmansadr:
Investigating Traffic Analysis Attacks on Apple iCloud Private Relay. AsiaCCS 2023: 773-784 - [c71]Alireza Bahramali, Ardavan Bozorgi, Amir Houmansadr:
Realistic Website Fingerprinting By Augmenting Network Traces. CCS 2023: 1035-1049 - [c70]Ali Naseh, Kalpesh Krishna, Mohit Iyyer, Amir Houmansadr:
Stealing the Decoding Algorithms of Language Models. CCS 2023: 1835-1849 - [c69]Virat Shejwalkar, Lingjuan Lyu, Amir Houmansadr:
The Perils of Learning From Unlabeled Data: Backdoor Attacks on Semi-supervised Learning. ICCV 2023: 4707-4717 - [c68]Milad Nasr, Saeed Mahloujifar, Xinyu Tang, Prateek Mittal, Amir Houmansadr:
Effectively Using Public Data in Privacy Preserving Machine Learning. ICML 2023: 25718-25732 - [c67]Momin Ahmad Khan, Virat Shejwalkar, Amir Houmansadr, Fatima M. Anwar:
On the Pitfalls of Security Evaluation of Robust Federated Learning. SP (Workshops) 2023: 57-68 - [c66]Hamid Mozaffari, Virat Shejwalkar, Amir Houmansadr:
Every Vote Counts: Ranking-Based Training of Federated Learning to Resist Poisoning Attacks. USENIX Security Symposium 2023: 1721-1738 - [c65]Mingshi Wu, Jackson Sippe, Danesh Sivakumar, Jack Burg, Peter Anderson, Xiaokang Wang, Kevin Bock, Amir Houmansadr, Dave Levin, Eric Wustrow:
How the Great Firewall of China Detects and Blocks Fully Encrypted Traffic. USENIX Security Symposium 2023: 2653-2670 - [i45]Ali Naseh, Kalpesh Krishna, Mohit Iyyer, Amir Houmansadr:
On the Risks of Stealing the Decoding Algorithms of Language Models. CoRR abs/2303.04729 (2023) - [i44]Alireza Bahramali, Ardavan Bozorgi, Amir Houmansadr:
Realistic Website Fingerprinting By Augmenting Network Trace. CoRR abs/2309.10147 (2023) - [i43]Dzung Pham, Shreyas Kulkarni, Amir Houmansadr:
RAIFLE: Reconstruction Attacks on Interaction-based Federated Learning with Active Data Manipulation. CoRR abs/2310.19163 (2023) - [i42]Ali Naseh, Jaechul Roh, Amir Houmansadr:
Memory Triggers: Unveiling Memorization in Text-To-Image Generative Models through Word-Level Duplication. CoRR abs/2312.03692 (2023) - [i41]Yuefeng Peng, Ali Naseh, Amir Houmansadr:
Diffence: Fencing Membership Privacy With Diffusion Models. CoRR abs/2312.04692 (2023) - [i40]Ali Naseh, Jaechul Roh, Amir Houmansadr:
Understanding (Un)Intended Memorization in Text-to-Image Generative Models. CoRR abs/2312.07550 (2023) - 2022
- [j16]Steffen Wendzel, Wojciech Mazurczyk, Luca Caviglione, Amir Houmansadr:
Emerging topics in defending networked systems. Future Gener. Comput. Syst. 128: 317-319 (2022) - [j15]Bo Guan, Nazanin Takbiri, Dennis Goeckel, Amir Houmansadr, Hossein Pishro-Nik:
Superstring-Based Sequence Obfuscation to Thwart Pattern Matching Attacks. IEEE Internet Things J. 9(23): 23348-23365 (2022) - [j14]Xinyu Tang, Milad Nasr, Saeed Mahloujifar, Virat Shejwalkar, Liwei Song, Amir Houmansadr, Prateek Mittal:
Machine Learning with Differentially Private Labels: Mechanisms and Frameworks. Proc. Priv. Enhancing Technol. 2022(4): 332-350 (2022) - [c64]Saeede Enayati, Dennis L. Goeckel, Amir Houmansadr, Hossein Pishro-Nik:
Constrained Obfuscation to Thwart Pattern Matching Attacks. ISIT 2022: 643-648 - [c63]Saeede Enayati, Dennis L. Goeckel, Amir Houmansadr, Hossein Pishro-Nik:
Privacy-Preserving Path-Planning for UAVs. ISNCC 2022: 1-6 - [c62]Momin Ahmad Khan, Virat Shejwalkar, Amir Houmansadr, Fatima M. Anwar:
Security Analysis of SplitFed Learning. SenSys 2022: 987-993 - [c61]Virat Shejwalkar, Amir Houmansadr, Peter Kairouz, Daniel Ramage:
Back to the Drawing Board: A Critical Evaluation of Poisoning Attacks on Production Federated Learning. SP 2022: 1354-1371 - [c60]Xinyu Tang, Saeed Mahloujifar, Liwei Song, Virat Shejwalkar, Milad Nasr, Amir Houmansadr, Prateek Mittal:
Mitigating Membership Inference Attacks by Self-Distillation Through a Novel Ensemble Architecture. USENIX Security Symposium 2022: 1433-1450 - [i39]Hamid Mozaffari, Amir Houmansadr:
E2FL: Equal and Equitable Federated Learning. CoRR abs/2205.10454 (2022) - [i38]Virat Shejwalkar, Lingjuan Lyu, Amir Houmansadr:
The Perils of Learning From Unlabeled Data: Backdoor Attacks on Semi-supervised Learning. CoRR abs/2211.00453 (2022) - [i37]Momin Ahmad Khan, Virat Shejwalkar, Amir Houmansadr, Fatima M. Anwar:
Security Analysis of SplitFed Learning. CoRR abs/2212.01716 (2022) - 2021
- [j13]Nazanin Takbiri, Minting Chen, Dennis L. Goeckel, Amir Houmansadr, Hossein Pishro-Nik:
Asymptotic Privacy Loss Due to Time Series Matching of Dependent Users. IEEE Commun. Lett. 25(4): 1079-1083 (2021) - [c59]Virat Shejwalkar, Amir Houmansadr:
Membership Privacy for Machine Learning Models Through Knowledge Transfer. AAAI 2021: 9549-9557 - [c58]Fatemeh Rezaei, Amir Houmansadr:
FINN: Fingerprinting Network Flows using Neural Networks. ACSAC 2021: 1011-1024 - [c57]Alireza Bahramali, Milad Nasr, Amir Houmansadr, Dennis Goeckel, Don Towsley:
Robust Adversarial Attacks Against DNN-Based Wireless Communication Systems. CCS 2021: 126-140 - [c56]Virat Shejwalkar, Amir Houmansadr:
Manipulating the Byzantine: Optimizing Model Poisoning Attacks and Defenses for Federated Learning. NDSS 2021 - [c55]Milad Nasr, Alireza Bahramali, Amir Houmansadr:
Defeating DNN-Based Traffic Analysis Systems in Real-Time With Blind Adversarial Perturbations. USENIX Security Symposium 2021: 2705-2722 - [i36]Alireza Bahramali, Milad Nasr, Amir Houmansadr, Dennis Goeckel, Don Towsley:
Robust Adversarial Attacks Against DNN-Based Wireless Communication Systems. CoRR abs/2102.00918 (2021) - [i35]Virat Shejwalkar, Amir Houmansadr, Peter Kairouz, Daniel Ramage:
Back to the Drawing Board: A Critical Evaluation of Poisoning Attacks on Federated Learning. CoRR abs/2108.10241 (2021) - [i34]Bo Guan, Nazanin Takbiri, Dennis Goeckel, Amir Houmansadr, Hossein Pishro-Nik:
Superstring-Based Sequence Obfuscation to Thwart Pattern Matching Attacks. CoRR abs/2108.12336 (2021) - [i33]Hamid Mozaffari, Virat Shejwalkar, Amir Houmansadr:
FSL: Federated Supermask Learning. CoRR abs/2110.04350 (2021) - [i32]Xinyu Tang, Saeed Mahloujifar, Liwei Song, Virat Shejwalkar, Milad Nasr, Amir Houmansadr, Prateek Mittal:
Mitigating Membership Inference Attacks by Self-Distillation Through a Novel Ensemble Architecture. CoRR abs/2110.08324 (2021) - 2020
- [j12]Ramin Soltani, Dennis Goeckel, Don Towsley, Amir Houmansadr:
Fundamental Limits of Covert Packet Insertion. IEEE Trans. Commun. 68(6): 3401-3414 (2020) - [j11]Ramin Soltani, Dennis Goeckel, Don Towsley, Amir Houmansadr:
Fundamental Limits of Invisible Flow Fingerprinting. IEEE Trans. Inf. Forensics Secur. 15: 345-360 (2020) - [j10]Nazanin Takbiri, Amir Houmansadr, Dennis L. Goeckel, Hossein Pishro-Nik:
Privacy of Dependent Users Against Statistical Matching. IEEE Trans. Inf. Theory 66(9): 5842-5865 (2020) - [j9]Nazanin Takbiri, Virat Shejwalkar, Amir Houmansadr, Dennis L. Goeckel, Hossein Pishro-Nik:
Leveraging Prior Knowledge Asymmetries in the Design of Location Privacy-Preserving Mechanisms. IEEE Wirel. Commun. Lett. 9(11): 2005-2009 (2020) - [c54]Alice, Bob, Carol, Jan Beznazwy, Amir Houmansadr:
How China Detects and Blocks Shadowsocks. Internet Measurement Conference 2020: 111-124 - [c53]Bo Guan, Nazanin Takbiri, Dennis L. Goeckel, Amir Houmansadr, Hossein Pishro-Nik:
Sequence Obfuscation to Thwart Pattern Matching Attacks. ISIT 2020: 884-889 - [c52]Alireza Bahramali, Amir Houmansadr, Ramin Soltani, Dennis Goeckel, Don Towsley:
Practical Traffic Analysis Attacks on Secure Messaging Applications. NDSS 2020 - [c51]Hamid Mozaffari, Amir Houmansadr:
Heterogeneous Private Information Retrieval. NDSS 2020 - [c50]Milad Nasr, Hadi Zolfaghari, Amir Houmansadr, Amirhossein Ghafari:
MassBrowser: Unblocking the Censored Web for the Masses, by the Masses. NDSS 2020 - [c49]Fatemeh Rezaei, Shahrzad Naseri, Ittay Eyal, Amir Houmansadr:
The Bitcoin Hunter: Detecting Bitcoin Traffic over Encrypted Channels. SecureComm (1) 2020: 152-171 - [c48]anonymous, Arian Akhavan Niaki, Nguyen Phong Hoang, Phillipa Gill, Amir Houmansadr:
Triplet Censors: Demystifying Great Firewall's DNS Censorship Behavior. FOCI @ USENIX Security Symposium 2020 - [i31]Milad Nasr, Alireza Bahramali, Amir Houmansadr:
Blind Adversarial Network Perturbations. CoRR abs/2002.06495 (2020) - [i30]Alireza Bahramali, Ramin Soltani, Amir Houmansadr, Dennis Goeckel, Don Towsley:
Practical Traffic Analysis Attacks on Secure Messaging Applications. CoRR abs/2005.00508 (2020) - [i29]Nazanin Takbiri, Minting Chen, Dennis L. Goeckel, Amir Houmansadr, Hossein Pishro-Nik:
Asymptotic Privacy Loss due to Time Series Matching of Dependent Users. CoRR abs/2007.06119 (2020) - [i28]Milad Nasr, Reza Shokri, Amir Houmansadr:
Improving Deep Learning with Differential Privacy using Gradient Encoding and Denoising. CoRR abs/2007.11524 (2020)
2010 – 2019
- 2019
- [j8]Nazanin Takbiri, Amir Houmansadr, Dennis L. Goeckel, Hossein Pishro-Nik:
Matching Anonymized and Obfuscated Time Series to Users' Profiles. IEEE Trans. Inf. Theory 65(2): 724-741 (2019) - [c47]Virat Shejwalkar, Amir Houmansadr, Hossein Pishro-Nik, Dennis Goeckel:
Revisiting utility metrics for location privacy-preserving mechanisms. ACSAC 2019: 313-327 - [c46]Nazanin Takbiri, Dennis L. Goeckel, Amir Houmansadr, Hossein Pishro-Nik:
Asymptotic Limits of Privacy in Bayesian Time Series Matching. CISS 2019: 1-6 - [c45]Hamid Mozaffari, Amir Houmansadr, Arun Venkataramani:
Blocking-Resilient Communications in Information-Centric Networks Using Router Redirection. GLOBECOM Workshops 2019: 1-6 - [c44]Milad Nasr, Sadegh Farhang, Amir Houmansadr, Jens Grossklags:
Enemy At the Gateways: Censorship-Resilient Proxy Distribution Using Game Theory. NDSS 2019 - [c43]Milad Nasr, Reza Shokri, Amir Houmansadr:
Comprehensive Privacy Analysis of Deep Learning: Passive and Active White-box Inference Attacks against Centralized and Federated Learning. IEEE Symposium on Security and Privacy 2019: 739-753 - [c42]Zimo Chai, Amirhossein Ghafari, Amir Houmansadr:
On the Importance of Encrypted-SNI (ESNI) to Censorship Circumvention. FOCI @ USENIX Security Symposium 2019 - [c41]Nazanin Takbiri, Ramin Soltani, Dennis L. Goeckel, Amir Houmansadr, Hossein Pishro-Nik:
Asymptotic Loss in Privacy due to Dependency in Gaussian Traces. WCNC 2019: 1-6 - [i27]Nazanin Takbiri, Dennis L. Goeckel, Amir Houmansadr, Hossein Pishro-Nik:
Asymptotic Limits of Privacy in Bayesian Time Series Matching. CoRR abs/1902.06404 (2019) - [i26]Ramin Soltani, Dennis Goeckel, Don Towsley, Amir Houmansadr:
Fundamental Limits of Covert Packet Insertion. CoRR abs/1903.11640 (2019) - [i25]Virat Shejwalkar, Amir Houmansadr:
Reconciling Utility and Membership Privacy via Knowledge Distillation. CoRR abs/1906.06589 (2019) - [i24]Nazanin Takbiri, Virat Shejwalkar, Amir Houmansadr, Dennis L. Goeckel, Hossein Pishro-Nik:
Leveraging Prior Knowledge Asymmetries in the Design of Location Privacy-Preserving Mechanisms. CoRR abs/1912.02209 (2019) - [i23]Hongyan Chang, Virat Shejwalkar, Reza Shokri, Amir Houmansadr:
Cronus: Robust and Heterogeneous Collaborative Learning with Black-Box Knowledge Transfer. CoRR abs/1912.11279 (2019) - 2018
- [c40]Ramin Soltani, Dennis Goeckel, Don Towsley, Amir Houmansadr:
Fundamental Limits of Covert Bit Insertion in Packets. Allerton 2018: 1065-1072 - [c39]Hosein Mohammadi Makrani, Setareh Rafatirad, Amir Houmansadr, Houman Homayoun:
Main-Memory Requirements of Big Data Applications on Commodity Server Platform. CCGrid 2018: 653-660 - [c38]Milad Nasr, Reza Shokri, Amir Houmansadr:
Machine Learning with Membership Privacy using Adversarial Regularization. CCS 2018: 634-646 - [c37]Milad Nasr, Alireza Bahramali, Amir Houmansadr:
DeepCorr: Strong Flow Correlation Attacks on Tor Using Deep Learning. CCS 2018: 1962-1976 - [c36]Hossein Sayadi, Sai Manoj P. D., Amir Houmansadr, Setareh Rafatirad, Houman Homayoun:
Comprehensive assessment of run-time hardware-supported malware detection using general and ensemble learning. CF 2018: 212-215 - [c35]Nazanin Takbiri, Amir Houmansadr, Dennis L. Goeckel, Hossein Pishro-Nik:
Privacy Against Statistical Matching: Inter-User Correlation. ISIT 2018: 1036-1040 - [i22]Nazanin Takbiri, Amir Houmansadr, Dennis L. Goeckel, Hossein Pishro-Nik:
Privacy against Statistical Matching: Inter-User Correlation. CoRR abs/1805.01296 (2018) - [i21]Nazanin Takbiri, Amir Houmansadr, Dennis L. Goeckel, Hossein Pishro-Nik:
Privacy of Dependent Users Against Statistical Matching. CoRR abs/1806.11108 (2018) - [i20]Milad Nasr, Reza Shokri, Amir Houmansadr:
Machine Learning with Membership Privacy using Adversarial Regularization. CoRR abs/1807.05852 (2018) - [i19]Milad Nasr, Alireza Bahramali, Amir Houmansadr:
DeepCorr: Strong Flow Correlation Attacks on Tor Using Deep Learning. CoRR abs/1808.07285 (2018) - [i18]Ramin Soltani, Dennis Goeckel, Don Towsley, Amir Houmansadr:
Fundamental Limits of Invisible Flow Fingerprinting. CoRR abs/1809.08514 (2018) - [i17]Nazanin Takbiri, Ramin Soltani, Dennis L. Goeckel, Amir Houmansadr, Hossein Pishro-Nik:
Asymptotic Loss in Privacy due to Dependency in Gaussian Traces. CoRR abs/1809.10289 (2018) - [i16]Ramin Soltani, Dennis Goeckel, Don Towsley, Amir Houmansadr:
Fundamental Limits of Covert Bit Insertion in Packets. CoRR abs/1810.03510 (2018) - [i15]Milad Nasr, Reza Shokri, Amir Houmansadr:
Comprehensive Privacy Analysis of Deep Learning: Stand-alone and Federated Learning under Passive and Active White-box Inference Attacks. CoRR abs/1812.00910 (2018) - 2017
- [j7]Fatemeh Rezaei, Amir Houmansadr:
TagIt: Tagging Network Flows using Blind Fingerprints. Proc. Priv. Enhancing Technol. 2017(4): 290-307 (2017) - [j6]Zarrin Montazeri, Amir Houmansadr, Hossein Pishro-Nik:
Achieving Perfect Location Privacy in Wireless Devices Using Anonymization. IEEE Trans. Inf. Forensics Secur. 12(11): 2683-2698 (2017) - [j5]Amir Houmansadr, Wenxuan Zhou, Matthew Caesar, Nikita Borisov:
SWEET: Serving the Web by Exploiting Email Tunnels. IEEE/ACM Trans. Netw. 25(3): 1517-1527 (2017) - [c34]Ramin Soltani, Dennis Goeckel, Don Towsley, Amir Houmansadr:
Towards provably invisible network flow fingerprints. ACSSC 2017: 258-262 - [c33]Milad Nasr, Hadi Zolfaghari, Amir Houmansadr:
The Waterfall of Liberty: Decoy Routing Circumvention that Resists Routing Attacks. CCS 2017: 2037-2052 - [c32]Milad Nasr, Amir Houmansadr, Arya Mazumdar:
Compressive Traffic Analysis: A New Paradigm for Scalable Traffic Analysis. CCS 2017: 2053-2069 - [c31]Nazanin Takbiri, Amir Houmansadr, Dennis L. Goeckel, Hossein Pishro-Nik:
Fundamental limits of location privacy using anonymization. CISS 2017: 1-6 - [c30]A. Pinar Ozisik, Gavin Andresen, George Bissias, Amir Houmansadr, Brian Neil Levine:
Graphene: A New Protocol for Block Propagation Using Set Reconciliation. DPM/CBT@ESORICS 2017: 420-428 - [c29]Nazanin Takbiri, Amir Houmansadr, Dennis L. Goeckel, Hossein Pishro-Nik:
Limits of location privacy under anonymization and obfuscation. ISIT 2017: 764-768 - [i14]Milad Nasr, Sadegh Farhang, Amir Houmansadr, Jens Grossklags:
Enemy At the Gateways: A Game Theoretic Approach to Proxy Distribution. CoRR abs/1709.04030 (2017) - [i13]Nazanin Takbiri, Amir Houmansadr, Dennis L. Goeckel, Hossein Pishro-Nik:
Matching Anonymized and Obfuscated Time Series to Users' Profiles. CoRR abs/1710.00197 (2017) - [i12]Ramin Soltani, Dennis Goeckel, Don Towsley, Amir Houmansadr:
Towards Provably Invisible Network Flow Fingerprints. CoRR abs/1711.10079 (2017) - 2016
- [j4]Richard McPherson, Amir Houmansadr, Vitaly Shmatikov:
CovertCast: Using Live Streaming to Evade Internet Censorship. Proc. Priv. Enhancing Technol. 2016(3): 212-225 (2016) - [c28]Ramin Soltani, Dennis Goeckel, Don Towsley, Amir Houmansadr:
Covert communications on renewal packet channels. Allerton 2016: 548-555 - [c27]Hadi Zolfaghari, Amir Houmansadr:
Practical Censorship Evasion Leveraging Content Delivery Networks. CCS 2016: 1715-1726 - [c26]Milad Nasr, Amir Houmansadr:
GAME OF DECOYS: Optimal Decoy Routing Through Game Theory. CCS 2016: 1727-1738 - [c25]Zarrin Montazeri, Amir Houmansadr, Hossein Pishro-Nik:
Defining perfect location privacy using anonymization. CISS 2016: 204-209 - [c24]Zarrin Montazeri, Amir Houmansadr, Hossein Pishro-Nik:
Achieving perfect location privacy in Markov models using anonymization. ISITA 2016: 355-359 - [e1]Amir Houmansadr, Prateek Mittal:
6th USENIX Workshop on Free and Open Communications on the Internet, FOCI '16, Austin, TX, USA, August 8, 2016. USENIX Association 2016 [contents] - [i11]Ramin Soltani, Dennis Goeckel, Don Towsley, Amir Houmansadr:
Covert Communications on Renewal Packet Channels. CoRR abs/1610.00368 (2016) - [i10]Ramin Soltani, Dennis Goeckel, Don Towsley, Amir Houmansadr:
Covert Communications on Poisson Packet Channels. CoRR abs/1610.00381 (2016) - [i9]Zarrin Montazeri, Amir Houmansadr, Hossein Pishro-Nik:
Achieving Perfect Location Privacy in Wireless Devices Using Anonymization. CoRR abs/1610.05210 (2016) - [i8]George Bissias, Brian Neil Levine, A. Pinar Ozisik, Gavin Andresen, Amir Houmansadr:
An Analysis of Attacks on Blockchain Consensus. CoRR abs/1610.07985 (2016) - 2015
- [c23]Ali Zand, Amir Houmansadr, Giovanni Vigna, Richard A. Kemmerer, Christopher Kruegel:
Know Your Achilles' Heel: Automatic Detection of Network Critical Services. ACSAC 2015: 41-50 - [c22]Ramin Soltani, Dennis Goeckel, Don Towsley, Amir Houmansadr:
Covert communications on Poisson packet channels. Allerton 2015: 1046-1052 - [c21]John Holowczak, Amir Houmansadr:
CacheBrowser: Bypassing Chinese Censorship without Proxies Using Cached Content. CCS 2015: 70-83 - 2014
- [j3]Amir Houmansadr, Negar Kiyavash, Nikita Borisov:
Non-Blind Watermarking of Network Flows. IEEE/ACM Trans. Netw. 22(4): 1232-1244 (2014) - [c20]Amir Houmansadr, Edmund L. Wong, Vitaly Shmatikov:
No Direction Home: The True Cost of Routing Around Decoys. NDSS 2014 - [c19]Chad Brubaker, Amir Houmansadr, Vitaly Shmatikov:
CloudTransport: Using Cloud Storage for Censorship-Resistant Networking. Privacy Enhancing Technologies 2014: 1-20 - 2013
- [j2]Saman A. Zonouz, Amir Houmansadr, Robin Berthier, Nikita Borisov, William H. Sanders:
Secloud: A cloud-based comprehensive and lightweight security solution for smartphones. Comput. Secur. 37: 215-227 (2013) - [j1]Amir Houmansadr, Nikita Borisov:
BotMosaic: Collaborative network watermark for the detection of IRC-based botnets. J. Syst. Softw. 86(3): 707-715 (2013) - [c18]Amir Houmansadr, Thomas J. Riedl, Nikita Borisov, Andrew C. Singer:
I want my voice to be heard: IP over Voice-over-IP for unobservable censorship circumvention. NDSS 2013 - [c17]Amir Houmansadr, Nikita Borisov:
The Need for Flow Fingerprints to Link Correlated Network Flows. Privacy Enhancing Technologies 2013: 205-224 - [c16]Amir Houmansadr, Chad Brubaker, Vitaly Shmatikov:
The Parrot Is Dead: Observing Unobservable Network Communications. IEEE Symposium on Security and Privacy 2013: 65-79 - 2012
- [b1]Amir Houmansadr:
Design, analysis, and implementation of effective network flow watermarking schemes. University of Illinois Urbana-Champaign, USA, 2012 - [c15]Qiyan Wang, Xun Gong, Giang T. K. Nguyen, Amir Houmansadr, Nikita Borisov:
CensorSpoofer: asymmetric communication using IP spoofing for censorship-resistant web browsing. CCS 2012: 121-132 - [c14]Saman A. Zonouz, Amir Houmansadr, Parisa Haghani:
EliMet: Security metric elicitation in power grid critical infrastructures by observing system administrators' responsive behavior. DSN 2012: 1-12 - [i7]Negar Kiyavash, Amir Houmansadr, Nikita Borisov:
Multi-Flow Attacks Against Network Flow Watermarks: Analysis and Countermeasures. CoRR abs/1203.1390 (2012) - [i6]Amir Houmansadr, Nikita Borisov:
BotMosaic: Collaborative Network Watermark for Botnet Detection. CoRR abs/1203.1568 (2012) - [i5]Qiyan Wang, Xun Gong, Giang T. K. Nguyen, Amir Houmansadr, Nikita Borisov:
CensorSpoofer: Asymmetric Communication with IP Spoofing for Censorship-Resistant Web Browsing. CoRR abs/1203.1673 (2012) - [i4]Amir Houmansadr, Negar Kiyavash, Nikita Borisov:
Non-blind watermarking of network flows. CoRR abs/1203.2273 (2012) - [i3]Amir Houmansadr, Thomas J. Riedl, Nikita Borisov, Andrew C. Singer:
IP over Voice-over-IP for censorship circumvention. CoRR abs/1207.2683 (2012) - [i2]Amir Houmansadr, Wenxuan Zhou, Matthew Caesar, Nikita Borisov:
SWEET: Serving the Web by Exploiting Email Tunnels. CoRR abs/1211.3191 (2012) - 2011
- [c13]Casey Cipriano, Ali Zand, Amir Houmansadr, Christopher Kruegel, Giovanni Vigna:
Nexat: a history-based approach to predict attacker actions. ACSAC 2011: 383-392 - [c12]Amir Houmansadr, Giang T. K. Nguyen, Matthew Caesar, Nikita Borisov:
Cirripede: circumvention infrastructure using router redirection with plausible deniability. CCS 2011: 187-200 - [c11]Amir Houmansadr, Saman A. Zonouz, Robin Berthier:
A cloud-based intrusion detection and response system for mobile phones. DSN Workshops 2011: 31-32 - [c10]Amir Houmansadr, Nikita Borisov:
Towards improving network flow watermarks using the repeat-accumulate codes. ICASSP 2011: 1852-1855 - [c9]Shishir Nagaraja, Amir Houmansadr, Pratch Piyawongwisal, Vijit Singh, Pragya Agarwal, Nikita Borisov:
Stegobot: A Covert Social Network Botnet. Information Hiding 2011: 299-313 - [c8]Amir Houmansadr, Nikita Borisov:
CoCo: Coding-Based Covert Timing Channels for Network Flows. Information Hiding 2011: 314-328 - [c7]Amir Houmansadr, Nikita Borisov:
SWIRL: A Scalable Watermark to Detect Correlated Network Flows. NDSS 2011 - [i1]Shishir Nagaraja, Amir Houmansadr, Pratch Piyawongwisal, Vijit Singh, Pragya Agarwal, Nikita Borisov:
Stegobot: construction of an unobservable communication network leveraging social behavior. CoRR abs/1107.2031 (2011)
2000 – 2009
- 2009
- [c6]Amir Houmansadr, Negar Kiyavash, Nikita Borisov:
Multi-flow attack resistant watermarks for network flows. ICASSP 2009: 1497-1500 - [c5]Amir Houmansadr, Negar Kiyavash, Nikita Borisov:
RAINBOW: A Robust And Invisible Non-Blind Watermark for Network Flows. NDSS 2009 - 2008
- [c4]Negar Kiyavash, Amir Houmansadr, Nikita Borisov:
Multi-flow Attacks Against Network Flow Watermarking Schemes. USENIX Security Symposium 2008: 307-320 - 2006
- [c3]Amir Houman Sadr, Shahrokh Ghaemmaghami:
A Collusion-Resistant Video Watermarking Scheme. Information Hiding 2006: 343-354 - [c2]Amir Houmansadr, Hamed Pirsiavash, Shahrokh Ghaemmaghami:
Robust Content-Based Video Watermarking Exploiting Motion Entropy Masking Effect. SIGMAP 2006: 252-259 - 2005
- [c1]Amir Houman Sadr, Shahrokh Ghaemmaghami:
Robustness Enhancement of Content-Based Watermarks Using Entropy Masking Effect. IWDW 2005: 444-458
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-15 19:31 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint