Siavash Ahmadi
Orcid: 0000-0002-8801-337X
  According to our database1,
  Siavash Ahmadi
  authored at least 19 papers
  between 2014 and 2025.
  
  
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
  2025
Spotting and Mitigating DDoS Attacks Using Deep Learning for Online Traffic Analysis.
    
  
    ISC Int. J. Inf. Secur., July, 2025
    
  
A Lightweight Online Intrusion Detection and Localization Framework for Industrial Control Systems.
    
  
    ISC Int. J. Inf. Secur., July, 2025
    
  
    ISC Int. J. Inf. Secur., July, 2025
    
  
    ISC Int. J. Inf. Secur., July, 2025
    
  
Impossible 4-Tuple Attack: A New Mixture-Based Cryptanalysis Applied to Reduced-Round AES-128.
    
  
    IEEE Access, 2025
    
  
GenAtt NIDS Attack: A Practical Generative Adversarial Attack Against Network Intrusion Detection Systems.
    
  
    Proceedings of the 29th International Computer Conference, Computer Society of Iran, 2025
    
  
  2024
    IEEE Internet Things J., March, 2024
    
  
  2023
    ISC Int. J. Inf. Secur., October, 2023
    
  
  2020
Generalized Meet in the Middle Cryptanalysis of Block Ciphers With an Automated Search Algorithm.
    
  
    IEEE Access, 2020
    
  
  2019
Biclique Cryptanalysis of Block Ciphers LBlock and TWINE-80 with Practical Data Complexity.
    
  
    ISC Int. J. Inf. Secur., 2019
    
  
  2018
    Int. J. Commun. Syst., 2018
    
  
  2017
    Inf. Process. Lett., 2017
    
  
    Proceedings of the 14th International ISC (Iranian Society of Cryptology) Conference on Information Security and Cryptology, 2017
    
  
    Proceedings of the 14th International ISC (Iranian Society of Cryptology) Conference on Information Security and Cryptology, 2017
    
  
  2016
    Proceedings of the 13th International Iranian Society of Cryptology Conference on Information Security and Cryptology, 2016
    
  
    Proceedings of the 13th International Iranian Society of Cryptology Conference on Information Security and Cryptology, 2016
    
  
  2014
Low-Data Complexity Biclique Cryptanalysis of Block Ciphers With Application to Piccolo and HIGHT.
    
  
    IEEE Trans. Inf. Forensics Secur., 2014
    
  
    Proceedings of the 11th International ISC Conference on Information Security and Cryptology, 2014