Amir Houmansadr

Orcid: 0000-0002-7553-6657

According to our database1, Amir Houmansadr authored at least 114 papers between 2005 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Fake or Compromised? Making Sense of Malicious Clients in Federated Learning.
CoRR, 2024

SoK: Challenges and Opportunities in Federated Unlearning.
CoRR, 2024

2023
I Still Know What You Did Last Summer: Inferring Sensitive User Activities on Messaging Applications Through Traffic Analysis.
IEEE Trans. Dependable Secur. Comput., 2023

Location Privacy Protection for UAVs in Package Delivery and IoT Data Collection.
IEEE Internet Things J., 2023

Understanding (Un)Intended Memorization in Text-to-Image Generative Models.
CoRR, 2023

Diffence: Fencing Membership Privacy With Diffusion Models.
CoRR, 2023

Memory Triggers: Unveiling Memorization in Text-To-Image Generative Models through Word-Level Duplication.
CoRR, 2023

RAIFLE: Reconstruction Attacks on Interaction-based Federated Learning with Active Data Manipulation.
CoRR, 2023

Realistic Website Fingerprinting By Augmenting Network Trace.
CoRR, 2023

On the Risks of Stealing the Decoding Algorithms of Language Models.
CoRR, 2023

How the Great Firewall of China Detects and Blocks Fully Encrypted Traffic.
Proceedings of the 32nd USENIX Security Symposium, 2023

Every Vote Counts: Ranking-Based Training of Federated Learning to Resist Poisoning Attacks.
Proceedings of the 32nd USENIX Security Symposium, 2023

On the Pitfalls of Security Evaluation of Robust Federated Learning.
Proceedings of the 2023 IEEE Security and Privacy Workshops (SPW), 2023

Effectively Using Public Data in Privacy Preserving Machine Learning.
Proceedings of the International Conference on Machine Learning, 2023

The Perils of Learning From Unlabeled Data: Backdoor Attacks on Semi-supervised Learning.
Proceedings of the IEEE/CVF International Conference on Computer Vision, 2023

Stealing the Decoding Algorithms of Language Models.
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, 2023

Realistic Website Fingerprinting By Augmenting Network Traces.
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, 2023

Investigating Traffic Analysis Attacks on Apple iCloud Private Relay.
Proceedings of the 2023 ACM Asia Conference on Computer and Communications Security, 2023

2022
Machine Learning with Differentially Private Labels: Mechanisms and Frameworks.
Proc. Priv. Enhancing Technol., 2022

Superstring-Based Sequence Obfuscation to Thwart Pattern Matching Attacks.
IEEE Internet Things J., 2022

Emerging topics in defending networked systems.
Future Gener. Comput. Syst., 2022

E2FL: Equal and Equitable Federated Learning.
CoRR, 2022

Mitigating Membership Inference Attacks by Self-Distillation Through a Novel Ensemble Architecture.
Proceedings of the 31st USENIX Security Symposium, 2022

Back to the Drawing Board: A Critical Evaluation of Poisoning Attacks on Production Federated Learning.
Proceedings of the 43rd IEEE Symposium on Security and Privacy, 2022

Security Analysis of SplitFed Learning.
Proceedings of the 20th ACM Conference on Embedded Networked Sensor Systems, 2022

Privacy-Preserving Path-Planning for UAVs.
Proceedings of the International Symposium on Networks, Computers and Communications, 2022

Constrained Obfuscation to Thwart Pattern Matching Attacks.
Proceedings of the IEEE International Symposium on Information Theory, 2022

2021
Asymptotic Privacy Loss Due to Time Series Matching of Dependent Users.
IEEE Commun. Lett., 2021

FSL: Federated Supermask Learning.
CoRR, 2021

Back to the Drawing Board: A Critical Evaluation of Poisoning Attacks on Federated Learning.
CoRR, 2021

Defeating DNN-Based Traffic Analysis Systems in Real-Time With Blind Adversarial Perturbations.
Proceedings of the 30th USENIX Security Symposium, 2021

Manipulating the Byzantine: Optimizing Model Poisoning Attacks and Defenses for Federated Learning.
Proceedings of the 28th Annual Network and Distributed System Security Symposium, 2021

Robust Adversarial Attacks Against DNN-Based Wireless Communication Systems.
Proceedings of the CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security, Virtual Event, Republic of Korea, November 15, 2021

FINN: Fingerprinting Network Flows using Neural Networks.
Proceedings of the ACSAC '21: Annual Computer Security Applications Conference, Virtual Event, USA, December 6, 2021

Membership Privacy for Machine Learning Models Through Knowledge Transfer.
Proceedings of the Thirty-Fifth AAAI Conference on Artificial Intelligence, 2021

2020
Leveraging Prior Knowledge Asymmetries in the Design of Location Privacy-Preserving Mechanisms.
IEEE Wirel. Commun. Lett., 2020

Privacy of Dependent Users Against Statistical Matching.
IEEE Trans. Inf. Theory, 2020

Fundamental Limits of Invisible Flow Fingerprinting.
IEEE Trans. Inf. Forensics Secur., 2020

Fundamental Limits of Covert Packet Insertion.
IEEE Trans. Commun., 2020

Improving Deep Learning with Differential Privacy using Gradient Encoding and Denoising.
CoRR, 2020

Blind Adversarial Network Perturbations.
CoRR, 2020

Triplet Censors: Demystifying Great Firewall's DNS Censorship Behavior.
Proceedings of the 10th USENIX Workshop on Free and Open Communications on the Internet, 2020

The Bitcoin Hunter: Detecting Bitcoin Traffic over Encrypted Channels.
Proceedings of the Security and Privacy in Communication Networks, 2020

MassBrowser: Unblocking the Censored Web for the Masses, by the Masses.
Proceedings of the 27th Annual Network and Distributed System Security Symposium, 2020

Heterogeneous Private Information Retrieval.
Proceedings of the 27th Annual Network and Distributed System Security Symposium, 2020

Practical Traffic Analysis Attacks on Secure Messaging Applications.
Proceedings of the 27th Annual Network and Distributed System Security Symposium, 2020

Sequence Obfuscation to Thwart Pattern Matching Attacks.
Proceedings of the IEEE International Symposium on Information Theory, 2020

How China Detects and Blocks Shadowsocks.
Proceedings of the IMC '20: ACM Internet Measurement Conference, 2020

2019
Matching Anonymized and Obfuscated Time Series to Users' Profiles.
IEEE Trans. Inf. Theory, 2019

Cronus: Robust and Heterogeneous Collaborative Learning with Black-Box Knowledge Transfer.
CoRR, 2019

Reconciling Utility and Membership Privacy via Knowledge Distillation.
CoRR, 2019

Asymptotic Loss in Privacy due to Dependency in Gaussian Traces.
Proceedings of the 2019 IEEE Wireless Communications and Networking Conference, 2019

On the Importance of Encrypted-SNI (ESNI) to Censorship Circumvention.
Proceedings of the 9th USENIX Workshop on Free and Open Communications on the Internet, 2019

Comprehensive Privacy Analysis of Deep Learning: Passive and Active White-box Inference Attacks against Centralized and Federated Learning.
Proceedings of the 2019 IEEE Symposium on Security and Privacy, 2019

Enemy At the Gateways: Censorship-Resilient Proxy Distribution Using Game Theory.
Proceedings of the 26th Annual Network and Distributed System Security Symposium, 2019

Blocking-Resilient Communications in Information-Centric Networks Using Router Redirection.
Proceedings of the 2019 IEEE Globecom Workshops, Waikoloa, HI, USA, December 9-13, 2019, 2019

Asymptotic Limits of Privacy in Bayesian Time Series Matching.
Proceedings of the 53rd Annual Conference on Information Sciences and Systems, 2019

Revisiting utility metrics for location privacy-preserving mechanisms.
Proceedings of the 35th Annual Computer Security Applications Conference, 2019

2018
Comprehensive Privacy Analysis of Deep Learning: Stand-alone and Federated Learning under Passive and Active White-box Inference Attacks.
CoRR, 2018

Privacy Against Statistical Matching: Inter-User Correlation.
Proceedings of the 2018 IEEE International Symposium on Information Theory, 2018

Comprehensive assessment of run-time hardware-supported malware detection using general and ensemble learning.
Proceedings of the 15th ACM International Conference on Computing Frontiers, 2018

Machine Learning with Membership Privacy using Adversarial Regularization.
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018

DeepCorr: Strong Flow Correlation Attacks on Tor Using Deep Learning.
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018

Main-Memory Requirements of Big Data Applications on Commodity Server Platform.
Proceedings of the 18th IEEE/ACM International Symposium on Cluster, 2018

Fundamental Limits of Covert Bit Insertion in Packets.
Proceedings of the 56th Annual Allerton Conference on Communication, 2018

2017
SWEET: Serving the Web by Exploiting Email Tunnels.
IEEE/ACM Trans. Netw., 2017

Achieving Perfect Location Privacy in Wireless Devices Using Anonymization.
IEEE Trans. Inf. Forensics Secur., 2017

TagIt: Tagging Network Flows using Blind Fingerprints.
Proc. Priv. Enhancing Technol., 2017

Enemy At the Gateways: A Game Theoretic Approach to Proxy Distribution.
CoRR, 2017

Limits of location privacy under anonymization and obfuscation.
Proceedings of the 2017 IEEE International Symposium on Information Theory, 2017

Graphene: A New Protocol for Block Propagation Using Set Reconciliation.
Proceedings of the Data Privacy Management, Cryptocurrencies and Blockchain Technology, 2017

Fundamental limits of location privacy using anonymization.
Proceedings of the 51st Annual Conference on Information Sciences and Systems, 2017

The Waterfall of Liberty: Decoy Routing Circumvention that Resists Routing Attacks.
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, 2017

Compressive Traffic Analysis: A New Paradigm for Scalable Traffic Analysis.
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, 2017

Towards provably invisible network flow fingerprints.
Proceedings of the 51st Asilomar Conference on Signals, Systems, and Computers, 2017

2016
CovertCast: Using Live Streaming to Evade Internet Censorship.
Proc. Priv. Enhancing Technol., 2016

An Analysis of Attacks on Blockchain Consensus.
CoRR, 2016

Achieving perfect location privacy in Markov models using anonymization.
Proceedings of the 2016 International Symposium on Information Theory and Its Applications, 2016

Defining perfect location privacy using anonymization.
Proceedings of the 2016 Annual Conference on Information Science and Systems, 2016

Practical Censorship Evasion Leveraging Content Delivery Networks.
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016

GAME OF DECOYS: Optimal Decoy Routing Through Game Theory.
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016

Covert communications on renewal packet channels.
Proceedings of the 54th Annual Allerton Conference on Communication, 2016

2015
CacheBrowser: Bypassing Chinese Censorship without Proxies Using Cached Content.
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015

Covert communications on Poisson packet channels.
Proceedings of the 53rd Annual Allerton Conference on Communication, 2015

Know Your Achilles' Heel: Automatic Detection of Network Critical Services.
Proceedings of the 31st Annual Computer Security Applications Conference, 2015

2014
Non-Blind Watermarking of Network Flows.
IEEE/ACM Trans. Netw., 2014

CloudTransport: Using Cloud Storage for Censorship-Resistant Networking.
Proceedings of the Privacy Enhancing Technologies - 14th International Symposium, 2014

No Direction Home: The True Cost of Routing Around Decoys.
Proceedings of the 21st Annual Network and Distributed System Security Symposium, 2014

2013
BotMosaic: Collaborative network watermark for the detection of IRC-based botnets.
J. Syst. Softw., 2013

Secloud: A cloud-based comprehensive and lightweight security solution for smartphones.
Comput. Secur., 2013

The Parrot Is Dead: Observing Unobservable Network Communications.
Proceedings of the 2013 IEEE Symposium on Security and Privacy, 2013

The Need for Flow Fingerprints to Link Correlated Network Flows.
Proceedings of the Privacy Enhancing Technologies - 13th International Symposium, 2013

I want my voice to be heard: IP over Voice-over-IP for unobservable censorship circumvention.
Proceedings of the 20th Annual Network and Distributed System Security Symposium, 2013

2012
Design, analysis, and implementation of effective network flow watermarking schemes
PhD thesis, 2012

IP over Voice-over-IP for censorship circumvention
CoRR, 2012

CensorSpoofer: Asymmetric Communication with IP Spoofing for Censorship-Resistant Web Browsing
CoRR, 2012

BotMosaic: Collaborative Network Watermark for Botnet Detection
CoRR, 2012

Multi-Flow Attacks Against Network Flow Watermarks: Analysis and Countermeasures
CoRR, 2012

EliMet: Security metric elicitation in power grid critical infrastructures by observing system administrators' responsive behavior.
Proceedings of the IEEE/IFIP International Conference on Dependable Systems and Networks, 2012

CensorSpoofer: asymmetric communication using IP spoofing for censorship-resistant web browsing.
Proceedings of the ACM Conference on Computer and Communications Security, 2012

2011
Stegobot: construction of an unobservable communication network leveraging social behavior
CoRR, 2011

SWIRL: A Scalable Watermark to Detect Correlated Network Flows.
Proceedings of the Network and Distributed System Security Symposium, 2011

Stegobot: A Covert Social Network Botnet.
Proceedings of the Information Hiding - 13th International Conference, 2011

CoCo: Coding-Based Covert Timing Channels for Network Flows.
Proceedings of the Information Hiding - 13th International Conference, 2011

Towards improving network flow watermarks using the repeat-accumulate codes.
Proceedings of the IEEE International Conference on Acoustics, 2011

A cloud-based intrusion detection and response system for mobile phones.
Proceedings of the IEEE/IFIP International Conference on Dependable Systems and Networks Workshops (DSN-W 2011), 2011

Cirripede: circumvention infrastructure using router redirection with plausible deniability.
Proceedings of the 18th ACM Conference on Computer and Communications Security, 2011

Nexat: a history-based approach to predict attacker actions.
Proceedings of the Twenty-Seventh Annual Computer Security Applications Conference, 2011

2009
RAINBOW: A Robust And Invisible Non-Blind Watermark for Network Flows.
Proceedings of the Network and Distributed System Security Symposium, 2009

Multi-flow attack resistant watermarks for network flows.
Proceedings of the IEEE International Conference on Acoustics, 2009

2008
Multi-flow Attacks Against Network Flow Watermarking Schemes.
Proceedings of the 17th USENIX Security Symposium, 2008

2006
Robust Content-Based Video Watermarking Exploiting Motion Entropy Masking Effect.
Proceedings of the SIGMAP 2006, 2006

A Collusion-Resistant Video Watermarking Scheme.
Proceedings of the Information Hiding, 8th International Workshop, 2006

2005
Robustness Enhancement of Content-Based Watermarks Using Entropy Masking Effect.
Proceedings of the Digital Watermarking, 4th International Workshop, 2005


  Loading...