Search

Your search keyword '"Sadeghi, Ahmad-Reza"' showing total 305 results

Search Constraints

Start Over You searched for: Author "Sadeghi, Ahmad-Reza" Remove constraint Author: "Sadeghi, Ahmad-Reza" Language english Remove constraint Language: english
305 results on '"Sadeghi, Ahmad-Reza"'

Search Results

1. To ChatGPT, or not to ChatGPT: That is the question!

2. Token-Based Cloud Computing : Secure Outsourcing of Data and Arbitrary Computations with Lower Latency

4. Oops..! I Glitched It Again! How to Multi-Glitch the Glitching-Protections on ARM TrustZone-M

5. AuthentiSense: A Scalable Behavioral Biometrics Authentication Scheme using Few-Shot Learning for Mobile Platforms

6. BayBFed: Bayesian Backdoor Defense for Federated Learning

7. Intelligent Security: Is 'AI for Cybersecurity' a Blessing or a Curse (Dagstuhl Seminar 22412)

8. Softer Smartcards : Usable Cryptographic Tokens with Secure Execution

9. Twin Clouds: Secure Cloud Computing with Low Latency : (Full Version)

10. Close the Gate: Detecting Backdoored Models in Federated Learning based on Client-Side Deep Layer Output Analysis

11. POSE: Practical Off-chain Smart Contract Execution

12. Garbled Circuits for Leakage-Resilience: Hardware Implementation and Evaluation of One-Time Programs : (Full Version)

14. Trusted Container Extensions for Container-based Confidential Computing

15. ESCORT: Ethereum Smart COntRacTs Vulnerability Detection using Deep Neural Network and Transfer Learning

16. Contact Tracing by Giant Data Collectors: Opening Pandora's Box of Threats to Privacy, Sovereignty and National Security

19. Privacy-preserving speech processing via STPC and TEEs

20. CURE: A Security Architecture with CUstomizable and Resilient Enclaves

24. Sustainable security & safety

25. Sustainable Security and Safety: Challenges and Opportunities

26. Sustainable Security & Safety: Challenges and Opportunities

27. When a Patch is Not Enough - HardFails: Software-Exploitable Hardware Bugs

28. On the Security of Strong Memristor-based Physically Unclonable Functions.

29. INVITED: AI Utopia or Dystopia - On Securing AI Platforms.

31. ASSURED

32. D\'IoT: A Federated Self-learning Anomaly Detection System for IoT

34. HardScope: Thwarting DOP with Hardware-assisted Run-time Scope Enforcement

35. Execution Integrity with In-Place Encryption

36. Software Grand Exposure: SGX Cache Attacks Are Practical

38. With Great Complexity Comes Great Vulnerability: From Stand-Alone Fixes to Reconfigurable Security.

39. Trusted Execution Environments: Properties, Applications, and Challenges.

40. INVITED: In Hardware We Trust: Gains and Pains of Hardware-assisted Security.

41. HardScope: Hardening Embedded Systems Against Data-Oriented Attacks.

42. ARM2GC: Succinct Garbled Processor for Secure Computation.

43. Key agreement for heterogeneous mobile ad-hoc groups

44. CAn't Touch This: Practical and Generic Software-only Defenses Against Rowhammer Attacks

45. SandBlaster: Reversing the Apple Sandbox

47. Regulating Smart Personal Devices in Restricted Spaces

48. Invited: Reconciling Remote Attestation and Safety-Critical Operation on Simple IoT Devices.

49. It's Hammer Time: How to Attack (Rowhammer-based) DRAM-PUFs.

50. AuDI: Toward Autonomous IoT Device-Type Identification Using Periodic Communication.

Catalog

Books, media, physical & digital resources