Secure computation on floating point numbers M Aliasgari, M Blanton, Y Zhang, A Steele Cryptology ePrint Archive, 2012 | 169 | 2012 |
Data-oblivious graph algorithms for secure computation and outsourcing M Blanton, A Steele, M Alisagari Proceedings of the 8th ACM SIGSAC symposium on Information, computer and …, 2013 | 141 | 2013 |
Secure outsourcing of DNA searching via finite automata M Blanton, M Aliasgari IFIP Annual Conference on Data and Applications Security and Privacy, 49-64, 2010 | 131 | 2010 |
Analysis of reusability of secure sketches and fuzzy extractors M Blanton, M Aliasgari IEEE transactions on information forensics and security 8 (9), 1433-1445, 2013 | 80 | 2013 |
Secure outsourced computation of iris matching M Blanton, M Aliasgari Journal of Computer Security 20 (2-3), 259-305, 2012 | 44 | 2012 |
When machine learning meets hardware cybersecurity: Delving into accurate zero-day malware detection Z He, T Miari, HM Makrani, M Aliasgari, H Homayoun, H Sayadi 2021 22nd International Symposium on Quality Electronic Design (ISQED), 85-90, 2021 | 36 | 2021 |
Secure computation of hidden Markov models and secure floating-point arithmetic in the malicious model M Aliasgari, M Blanton, F Bayatbabolghani International Journal of Information Security 16, 577-601, 2017 | 36 | 2017 |
On the (non-) reusability of fuzzy sketches and extractors and security in the computational setting M Blanton, M Aliasgari Proceedings of the International Conference on Security and Cryptography, 68-77, 2011 | 36 | 2011 |
Recent advancements in microarchitectural security: Review of machine learning countermeasures H Sayadi, H Wang, T Miari, HM Makrani, M Aliasgari, S Rafatirad, ... 2020 ieee 63rd international midwest symposium on circuits and systems …, 2020 | 30 | 2020 |
Secure computation of hidden Markov models M Aliasgari, M Blanton 2013 International Conference on Security and Cryptography (SECRYPT), 1-12, 2013 | 25 | 2013 |
Security vulnerabilities in mobile health applications M Aliasgari, M Black, N Yadav 2018 IEEE Conference on application, information and network security (AINS …, 2018 | 24 | 2018 |
Adaptive-hmd: Accurate and cost-efficient machine learning-driven malware detection using microarchitectural events Y Gao, HM Makrani, M Aliasgari, A Rezaei, J Lin, H Homayoun, H Sayadi 2021 IEEE 27th International Symposium on On-Line Testing and Robust System …, 2021 | 21 | 2021 |
Secure computation of biometric matching M Blanton, M Aliasgari Department of Computer Science and Engineering, University of Notre Dame …, 2009 | 16 | 2009 |
On the (non-) reusability of fuzzy sketches and extractors and security improvements in the computational setting M Blanton, M Aliasgari Cryptology ePrint Archive, 2012 | 14 | 2012 |
Global attack and remedy on IC-specific logic encryption A Rezaei, A Hedayatipour, H Sayadi, M Aliasgari, H Zhou 2022 IEEE International Symposium on Hardware Oriented Security and Trust …, 2022 | 13 | 2022 |
Secure fingerprint alignment and matching protocols F Bayatbabolghani, M Blanton, M Aliasgari, M Goodrich arXiv preprint arXiv:1702.03379, 2017 | 13 | 2017 |
Towards ai-enabled hardware security: Challenges and opportunities H Sayadi, M Aliasgari, F Aydin, S Potluri, A Aysu, J Edmonds, ... 2022 IEEE 28th International Symposium on On-Line Testing and Robust System …, 2022 | 8 | 2022 |
Rapid, multi-vehicle and feed-forward neural network based intrusion detection system for controller area network bus M Sami, M Ibarra, AC Esparza, S Al-Jufout, M Aliasgari, M Mozumdar 2020 IEEE Green Energy and Smart Systems Conference (IGESSC), 1-6, 2020 | 8 | 2020 |
Machine learning in chaos-based encryption: Theory, implementations, and applications J Hwang, G Kale, PP Patel, R Vishwakarma, M Aliasgari, A Hedayatipour, ... IEEE Access 11, 125749-125767, 2023 | 7 | 2023 |
Towards an efficient client selection system for federated learning G Ding, Z Li, Y Wu, X Yang, M Aliasgari, H Xu International Conference on Cloud Computing, 13-21, 2022 | 7 | 2022 |