Hossein Hosseini

According to our database1, Hossein Hosseini authored at least 38 papers between 2001 and 2021.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2021
Unsupervised Information Obfuscation for Split Inference of Neural Networks.
CoRR, 2021

Federated Learning of User Verification Models Without Sharing Embeddings.
CoRR, 2021

2020
Federated Learning of User Authentication Models.
CoRR, 2020

2019
Reliability Analysis of a Decentralized Microgrid Control Architecture.
IEEE Trans. Smart Grid, 2019

Are Odds Really Odd? Bypassing Statistical Detection of Adversarial Examples.
CoRR, 2019

Dropping Pixels for Adversarial Robustness.
Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition Workshops, 2019

Learning Equilibria in Stochastic Information Flow Tracking Games with Partial Knowledge.
Proceedings of the 58th IEEE Conference on Decision and Control, 2019

2018
Designing three indicators to detect false data injection attacks on smart grid by dynamic state estimation.
J. Intell. Fuzzy Syst., 2018

Battery Degradation Temporal Modeling Using LSTM Networks.
Proceedings of the 17th IEEE International Conference on Machine Learning and Applications, 2018

A Game Theoretical Framework for Inter-process Adversarial Intervention Detection.
Proceedings of the Decision and Game Theory for Security - 9th International Conference, 2018

Assessing Shape Bias Property of Convolutional Neural Networks.
Proceedings of the 2018 IEEE Conference on Computer Vision and Pattern Recognition Workshops, 2018

Semantic Adversarial Examples.
Proceedings of the 2018 IEEE Conference on Computer Vision and Pattern Recognition Workshops, 2018

Conditioning Neural Networks: A Case Study of Electricity Load Forecasting.
Proceedings of the IEEE International Conference on Big Data, 2018

Modeling and Mitigating the Coremelt Attack.
Proceedings of the 2018 Annual American Control Conference, 2018

2017
Deep Neural Networks Do Not Recognize Negative Images.
CoRR, 2017

Deceiving Google's Perspective API Built for Detecting Toxic Comments.
CoRR, 2017

Blocking Transferability of Adversarial Examples in Black-Box Learning Systems.
CoRR, 2017

Google's Cloud Vision API is Not Robust to Noise.
Proceedings of the 16th IEEE International Conference on Machine Learning and Applications, 2017

On the Limitation of Convolutional Neural Networks in Recognizing Negative Images.
Proceedings of the 16th IEEE International Conference on Machine Learning and Applications, 2017

Deceiving Google's Cloud Video Intelligence API Built for Summarizing Videos.
Proceedings of the 2017 IEEE Conference on Computer Vision and Pattern Recognition Workshops, 2017

Attacking Automatic Video Analysis Algorithms: A Case Study of Google Cloud Video Intelligence API.
Proceedings of the 2017 on Multimedia Privacy and Security, 2017

2016
A routing protocol for wireless sensor networks with load balancing.
Proceedings of the 2016 IEEE International Conference on Electro Information Technology, 2016

Learning Temporal Dependence from Time-Series Data with Latent Variables.
Proceedings of the 2016 IEEE International Conference on Data Science and Advanced Analytics, 2016

Despicable me(ter): Anonymous and fine-grained metering data reporting with dishonest meters.
Proceedings of the 2016 IEEE Conference on Communications and Network Security, 2016

2015
Real-Time Impulse Noise Suppression from Images Using an Efficient Weighted-Average Filtering.
IEEE Signal Process. Lett., 2015

A Routing Protocol for Wireless Sensor Networks with Reliable Delivery of Data.
Proceedings of the IEEE International Conference on Data Science and Data Intensive Systems, 2015

Verifiable and privacy-preserving fine-grained data-collection for smart metering.
Proceedings of the 2015 IEEE Conference on Communications and Network Security, 2015

2014
Automatic selection and fusion of color spaces for image thresholding.
Signal Image Video Process., 2014

Using optimal fuzzy logic controller to improve transient fluctuations in deregulated power system with random variable load.
J. Intell. Fuzzy Syst., 2014

Application of fuzzy subtractive clustering for optimal transient performance of automatic generation control in restructured power system.
J. Intell. Fuzzy Syst., 2014

Defending false data injection attack on smart grid network using neuro-fuzzy controller.
J. Intell. Fuzzy Syst., 2014

On Image Block Loss Restoration Using the Sparsity Pattern as Side Information.
CoRR, 2014

2013
Fast restoration of natural images corrupted by high-density impulse noise.
EURASIP J. Image Video Process., 2013

A GOST-like Blind Signature Scheme Based on Elliptic Curve Discrete Logarithm Problem
CoRR, 2013

2012
An ECS-Control Scheme to Improve Power Quality in Grid Connected Wind Farms.
Proceedings of the Sixth Asia Modelling Symposium, 2012

2011
Fast Impulse Noise Removal from Highly Corrupted Images
CoRR, 2011

2010
Image Inpainting Using Sparsity of the Transform Domain
CoRR, 2010

2001
Objective characterization of voice service quality in wideband CDMA.
Proceedings of the 54th IEEE Vehicular Technology Conference, 2001


  Loading...