Search

Your search keyword '"Sadeghi, Ahmad-Reza"' showing total 1,265 results

Search Constraints

Start Over You searched for: Author "Sadeghi, Ahmad-Reza" Remove constraint Author: "Sadeghi, Ahmad-Reza"
1,265 results on '"Sadeghi, Ahmad-Reza"'

Search Results

1. Fuzzerfly Effect: Hardware Fuzzing for Memory Safety

2. Lost and Found in Speculation: Hybrid Speculative Vulnerability Detection

3. Phantom: Untargeted Poisoning Attacks on Semi-Supervised Learning (Full Version)

4. Beyond Random Inputs: A Novel ML-Based Hardware Fuzzing

5. One for All and All for One: GNN-based Control-Flow Attestation for Embedded Devices

6. DeepEclipse: How to Break White-Box DNN-Watermarking Schemes

7. WhisperFuzz: White-Box Fuzzing for Detecting and Locating Timing Vulnerabilities in Processors

8. FreqFed: A Frequency Analysis-Based Approach for Mitigating Poisoning Attacks in Federated Learning

9. MABFuzz: Multi-Armed Bandit Algorithms for Fuzzing Processors

10. DEMASQ: Unmasking the ChatGPT Wordsmith

11. Unleashing IoT Security: Assessing the Effectiveness of Best Practices in Protecting Against Threats

12. Accountability of Things: Large-Scale Tamper-Evident Logging for Smart Devices

13. FLAIRS: FPGA-Accelerated Inference-Resistant & Secure Federated Learning

14. Don't Shoot the Messenger: Localization Prevention of Satellite Internet Users

15. PSOFuzz: Fuzzing Processors with Particle Swarm Optimization

16. HyPFuzz: Formal-Assisted Processor Fuzzing

17. To ChatGPT, or not to ChatGPT: That is the question!

18. ARGUS: Context-Based Detection of Stealthy IoT Infiltration Attacks

19. Oops..! I Glitched It Again! How to Multi-Glitch the Glitching-Protections on ARM TrustZone-M

20. AuthentiSense: A Scalable Behavioral Biometrics Authentication Scheme using Few-Shot Learning for Mobile Platforms

21. BayBFed: Bayesian Backdoor Defense for Federated Learning

22. Follow Us and Become Famous! Insights and Guidelines From Instagram Engagement Mechanisms

23. DARWIN: Survival of the Fittest Fuzzing Mutators

24. CrowdGuard: Federated Backdoor Detection in Federated Learning

25. POSE: Practical Off-chain Smart Contract Execution

26. Trusted Container Extensions for Container-based Confidential Computing

27. V'CER: Efficient Certificate Validation in Constrained Networks

28. Building Your Own Trusted Execution Environments Using FPGA

29. Digital Contact Tracing Solutions: Promises, Pitfalls and Challenges

30. TheHuzz: Instruction Fuzzing of Processors Using Golden-Reference Models for Finding Software-Exploitable Vulnerabilities

31. DeepSight: Mitigating Backdoor Attacks in Federated Learning Through Deep Model Inspection

32. Chunked-Cache: On-Demand and Scalable Cache Isolation for Security Architectures

33. FakeWake: Understanding and Mitigating Fake Wake-up Words of Voice Assistants

34. ESCORT: Ethereum Smart COntRacTs Vulnerability Detection using Deep Neural Network and Transfer Learning

35. FLAME: Taming Backdoors in Federated Learning (Extended Version 1)

36. DMA’n’Play: Practical Remote Attestation Based on Direct Memory Access

37. CURE: A Security Architecture with CUstomizable and Resilient Enclaves

38. SoK: On the Security Challenges and Risks of Multi-Tenant FPGAs in the Cloud

39. Trustworthy AI Inference Systems: An Industry Research View

40. Offline Model Guard: Secure and Private ML on Mobile Devices

41. LeakyPick: IoT Audio Spy Detector

42. Mind the GAP: Security & Privacy Risks of Contact Tracing Apps

43. V0LTpwn: Attacking x86 Processor Integrity from Software

44. GrandDetAuto: Detecting Malicious Nodes in Large-Scale Autonomous Networks

45. HybCache: Hybrid Side-Channel-Resilient Caches for Trusted Execution Environments

46. ARM2GC: Succinct Garbled Processor for Secure Computation

47. Control Behavior Integrity for Distributed Cyber-Physical Systems

48. When a Patch is Not Enough - HardFails: Software-Exploitable Hardware Bugs

49. Baseline functionality for security and control of commodity IoT devices and domain-controlled device lifecycle management

50. Peek-a-Boo: I see your smart home activities, even encrypted!

Catalog

Books, media, physical & digital resources