Search

Your search keyword '"Sadeghi, Ahmad"' showing total 1,416 results

Search Constraints

Start Over You searched for: Author "Sadeghi, Ahmad" Remove constraint Author: "Sadeghi, Ahmad"
1,416 results on '"Sadeghi, Ahmad"'

Search Results

1. Phantom: Untargeted Poisoning Attacks on Semi-Supervised Learning (Full Version)

2. Beyond Random Inputs: A Novel ML-Based Hardware Fuzzing

3. One for All and All for One: GNN-based Control-Flow Attestation for Embedded Devices

4. DeepEclipse: How to Break White-Box DNN-Watermarking Schemes

5. WhisperFuzz: White-Box Fuzzing for Detecting and Locating Timing Vulnerabilities in Processors

6. FreqFed: A Frequency Analysis-Based Approach for Mitigating Poisoning Attacks in Federated Learning

7. MABFuzz: Multi-Armed Bandit Algorithms for Fuzzing Processors

8. DEMASQ: Unmasking the ChatGPT Wordsmith

9. FLEDGE: Ledger-based Federated Learning Resilient to Inference and Backdoor Attacks

11. Unleashing IoT Security: Assessing the Effectiveness of Best Practices in Protecting Against Threats

12. Accountability of Things: Large-Scale Tamper-Evident Logging for Smart Devices

13. FLAIRS: FPGA-Accelerated Inference-Resistant & Secure Federated Learning

14. Don't Shoot the Messenger: Localization Prevention of Satellite Internet Users

15. PSOFuzz: Fuzzing Processors with Particle Swarm Optimization

16. HyPFuzz: Formal-Assisted Processor Fuzzing

17. To ChatGPT, or not to ChatGPT: That is the question!

18. ARGUS: Context-Based Detection of Stealthy IoT Infiltration Attacks

19. Oops..! I Glitched It Again! How to Multi-Glitch the Glitching-Protections on ARM TrustZone-M

20. AuthentiSense: A Scalable Behavioral Biometrics Authentication Scheme using Few-Shot Learning for Mobile Platforms

21. BayBFed: Bayesian Backdoor Defense for Federated Learning

22. Follow Us and Become Famous! Insights and Guidelines From Instagram Engagement Mechanisms

23. DARWIN: Survival of the Fittest Fuzzing Mutators

24. CrowdGuard: Federated Backdoor Detection in Federated Learning

25. POSE: Practical Off-chain Smart Contract Execution

26. Trusted Container Extensions for Container-based Confidential Computing

27. V'CER: Efficient Certificate Validation in Constrained Networks

28. Building Your Own Trusted Execution Environments Using FPGA

29. Digital Contact Tracing Solutions: Promises, Pitfalls and Challenges

30. TheHuzz: Instruction Fuzzing of Processors Using Golden-Reference Models for Finding Software-Exploitable Vulnerabilities

31. DeepSight: Mitigating Backdoor Attacks in Federated Learning Through Deep Model Inspection

32. Chunked-Cache: On-Demand and Scalable Cache Isolation for Security Architectures

33. FakeWake: Understanding and Mitigating Fake Wake-up Words of Voice Assistants

36. DMA’n’Play: Practical Remote Attestation Based on Direct Memory Access

37. ESCORT: Ethereum Smart COntRacTs Vulnerability Detection using Deep Neural Network and Transfer Learning

38. FLAME: Taming Backdoors in Federated Learning (Extended Version 1)

39. CURE: A Security Architecture with CUstomizable and Resilient Enclaves

40. Goal coping resources scales: Psychometric properties and mediation analysis among individuals with visual impairment

41. SoK: On the Security Challenges and Risks of Multi-Tenant FPGAs in the Cloud

42. Trustworthy AI Inference Systems: An Industry Research View

43. Offline Model Guard: Secure and Private ML on Mobile Devices

44. LeakyPick: IoT Audio Spy Detector

45. Mind the GAP: Security & Privacy Risks of Contact Tracing Apps

46. V0LTpwn: Attacking x86 Processor Integrity from Software

47. GrandDetAuto: Detecting Malicious Nodes in Large-Scale Autonomous Networks

48. The Impact of 18F-DCFPyL PET-CT Imaging on Initial Staging, Radiation, and Systemic Therapy Treatment Recommendations for Veterans With Aggressive Prostate Cancer

50. HybCache: Hybrid Side-Channel-Resilient Caches for Trusted Execution Environments

Catalog

Books, media, physical & digital resources