Hossein Fereidooni

Orcid: 0000-0002-3559-0296

According to our database1, Hossein Fereidooni authored at least 21 papers between 2014 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
FreqFed: A Frequency Analysis-Based Approach for Mitigating Poisoning Attacks in Federated Learning.
CoRR, 2023

DEMASQ: Unmasking the ChatGPT Wordsmith.
CoRR, 2023

To ChatGPT, or not to ChatGPT: That is the question!
CoRR, 2023

ARGUS: Context-Based Detection of Stealthy IoT Infiltration Attacks.
Proceedings of the 32nd USENIX Security Symposium, 2023

BayBFed: Bayesian Backdoor Defense for Federated Learning.
Proceedings of the 44th IEEE Symposium on Security and Privacy, 2023

Smarter Contracts: Detecting Vulnerabilities in Smart Contracts with Deep Transfer Learning.
Proceedings of the 30th Annual Network and Distributed System Security Symposium, 2023

AuthentiSense: A Scalable Behavioral Biometrics Authentication Scheme using Few-Shot Learning for Mobile Platforms.
Proceedings of the 30th Annual Network and Distributed System Security Symposium, 2023

FLEDGE: Ledger-based Federated Learning Resilient to Inference and Backdoor Attacks.
Proceedings of the Annual Computer Security Applications Conference, 2023

2022

FedCRI: Federated Mobile Cyber-Risk Intelligence.
Proceedings of the 29th Annual Network and Distributed System Security Symposium, 2022

2021
FLGUARD: Secure and Private Federated Learning.
IACR Cryptol. ePrint Arch., 2021

SAFELearn: Secure Aggregation for private FEderated Learning.
IACR Cryptol. ePrint Arch., 2021

ESCORT: Ethereum Smart COntRacTs Vulnerability Detection using Deep Neural Network and Transfer Learning.
CoRR, 2021

2020
Peek-a-boo: i see your smart home activities, even encrypted!
Proceedings of the WiSec '20: 13th ACM Conference on Security and Privacy in Wireless and Mobile Networks, 2020

On the Security of Strong Memristor-based Physically Unclonable Functions.
Proceedings of the 57th ACM/IEEE Design Automation Conference, 2020

2019
DÏoT: A Federated Self-learning Anomaly Detection System for IoT.
Proceedings of the 39th IEEE International Conference on Distributed Computing Systems, 2019

2017
Breaking Fitness Records Without Moving: Reverse Engineering and Spoofing Fitbit.
Proceedings of the Research in Attacks, Intrusions, and Defenses, 2017

Fitness Trackers: Fit for Health but Unfit for Security and Privacy.
Proceedings of the Second IEEE/ACM International Conference on Connected Health: Applications, 2017

2016
Android Code Protection via Obfuscation Techniques: Past, Present and Future Directions.
CoRR, 2016

ANASTASIA: ANdroid mAlware detection using STatic analySIs of Applications.
Proceedings of the 8th IFIP International Conference on New Technologies, 2016

2014
Secure Message Delivery Games for Device-to-Device Communications.
Proceedings of the Decision and Game Theory for Security - 5th International Conference, 2014


  Loading...