default search action
Hossein Sayadi
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j7]Zhangying He, Houman Homayoun, Hossein Sayadi:
Guarding Against the Unknown: Deep Transfer Learning for Hardware Image-Based Malware Detection. J. Hardw. Syst. Secur. 8(2): 61-78 (2024) - [c52]Najmeh Nazari, Chongzhou Fang, Hosein Mohammadi Makrani, Behnam Omidi, Mahdi Eslamimehr, Setareh Rafatirad, Avesta Sasan, Hossein Sayadi, Khaled N. Khasawneh, Houman Homayoun:
Architectural Whispers: Robust Machine Learning Models Fingerprinting via Frequency Throttling Side-Channels. DAC 2024: 179:1-179:6 - [c51]Zhangying He, Houman Homayoun, Hossein Sayadi:
Beyond Conventional Defenses: Proactive and Adversarial-Resilient Hardware Malware Detection using Deep Reinforcement Learning. DAC 2024: 314:1-314:6 - [c50]Zhangying He, Chelsea William Fernandes, Hossein Sayadi:
ObfusGate: Representation Learning-Based Gatekeeper for Hardware-Level Obfuscated Malware Detection. DATE 2024: 1-2 - [c49]Zhangying He, Thomas Nguyen, Tahereh Miari, Mehrdad Aliasgari, Setareh Rafatirad, Hossein Sayadi:
The AI Companion in Education: Analyzing the Pedagogical Potential of ChatGPT in Computer Science and Engineering. EDUCON 2024: 1-10 - [c48]Hossein Sayadi, Zhangying He, Tahereh Miari, Mehrdad Aliasgari:
Redefining Trust: Assessing Reliability of Machine Learning Algorithms in Intrusion Detection Systems. ISCAS 2024: 1-5 - [c47]Najmeh Nazari, Furi Xiang, Chongzhou Fang, Hosein Mohammadi Makrani, Aditya Puri, Kartik Patwari, Hossein Sayadi, Setareh Rafatirad, Chen-Nee Chuah, Houman Homayoun:
LLM-FIN: Large Language Models Fingerprinting Attack on Edge Devices. ISQED 2024: 1-6 - [c46]Hossein Sayadi, Zhangying He, Hosein Mohammadi Makrani, Houman Homayoun:
Intelligent Malware Detection based on Hardware Performance Counters: A Comprehensive Survey. ISQED 2024: 1-10 - [c45]Najmeh Nazari, Hosein Mohammadi Makrani, Chongzhou Fang, Hossein Sayadi, Setareh Rafatirad, Khaled N. Khasawneh, Houman Homayoun:
Forget and Rewire: Enhancing the Resilience of Transformer-based Models against Bit-Flip Attacks. USENIX Security Symposium 2024 - [i4]Zhangying He, Thomas Nguyen, Tahereh Miari, Mehrdad Aliasgari, Setareh Rafatirad, Hossein Sayadi:
The AI Companion in Education: Analyzing the Pedagogical Potential of ChatGPT in Computer Science and Engineering. CoRR abs/2407.05205 (2024) - 2023
- [j6]Jinha Hwang, Gauri Kale, Persis Premkumar Patel, Rahul Vishwakarma, Mehrdad Aliasgari, Ava Hedayatipour, Amin Rezaei, Hossein Sayadi:
Machine Learning in Chaos-Based Encryption: Theory, Implementations, and Applications. IEEE Access 11: 125749-125767 (2023) - [j5]Najmeh Nazari, Hosein Mohammadi Makrani, Chongzhou Fang, Behnam Omidi, Setareh Rafatirad, Hossein Sayadi, Khaled N. Khasawneh, Houman Homayoun:
Adversarial Attacks Against Machine Learning-Based Resource Provisioning Systems. IEEE Micro 43(5): 35-44 (2023) - [c44]Hossein Sayadi, Zhangying He, Chelsea William Fernandes, Tahereh Miari:
Cyber-Immunity at the Core: Securing Biomedical Devices through Hardware-Level Machine Learning Defense. BioCAS 2023: 1-5 - [c43]Brendan Baird, Namya Radesh, Setareh Rafatirad, Hossein Sayadi:
Towards Race and Gender Equity in Data Science Education. FIE 2023: 1-10 - [c42]Chelsea William Fernandes, Tahereh Miari, Setareh Rafatirad, Hossein Sayadi:
Unleashing the Potential of Reinforcement Learning for Enhanced Personalized Education. FIE 2023: 1-5 - [c41]Zhangying He, Hossein Sayadi:
Image-Based Zero-Day Malware Detection in IoMT Devices: A Hybrid AI-Enabled Method. ISQED 2023: 1-8 - [c40]Rahul Vishwakarma, Ravi Monani, Amin Rezaei, Hossein Sayadi, Mehrdad Aliasgari, Ava Hedayatipour:
Attacks on Continuous Chaos Communication and Remedies for Resource Limited Devices. ISQED 2023: 1-8 - [i3]Rahul Vishwakarma, Ravi Monani, Amin Rezaei, Hossein Sayadi, Mehrdad Aliasgari, Ava Hedayatipour:
Attacks on Continuous Chaos Communication and Remedies for Resource Limited Devices. CoRR abs/2305.16692 (2023) - 2022
- [c39]Wooyoung Chung, Xiyu Zhang, Zunaira Ahmad, Hossein Sayadi, Setareh Rafatirad:
Machine Learning to the Rescue: ML-Assisted Framework for Equity-Driven Education. EDUCON 2022: 1254-1263 - [c38]Zhangying He, Amin Rezaei, Houman Homayoun, Hossein Sayadi:
Deep Neural Network and Transfer Learning for Accurate Hardware-Based Zero-Day Malware Detection. ACM Great Lakes Symposium on VLSI 2022: 27-32 - [c37]Raheel Afsharmazayejani, Hossein Sayadi, Amin Rezaei:
Distributed Logic Encryption: Essential Security Requirements and Low-Overhead Implementation. ACM Great Lakes Symposium on VLSI 2022: 127-131 - [c36]Amin Rezaei, Ava Hedayatipour, Hossein Sayadi, Mehrdad Aliasgari, Hai Zhou:
Global Attack and Remedy on IC-Specific Logic Encryption. HOST 2022: 145-148 - [c35]Zhangying He, Hosein Mohammadi Makrani, Setareh Rafatirad, Houman Homayoun, Hossein Sayadi:
Breakthrough to Adaptive and Cost-Aware Hardware-Assisted Zero-Day Malware Detection: A Reinforcement Learning-Based Approach. ICCD 2022: 231-238 - [c34]Hossein Sayadi, Mehrdad Aliasgari, Furkan Aydin, Seetal Potluri, Aydin Aysu, Jack Edmonds, Sara Tehranipoor:
Towards AI-Enabled Hardware Security: Challenges and Opportunities. IOLTS 2022: 1-10 - [c33]Hosein Mohammadi Makrani, Zhangying He, Setareh Rafatirad, Hossein Sayadi:
Accelerated Machine Learning for On-Device Hardware-Assisted Cybersecurity in Edge Platforms. ISQED 2022: 77-83 - 2021
- [j4]Hossein Sayadi, Yifeng Gao, Hosein Mohammadi Makrani, Jessica Lin, Paulo Cesar G. da Costa, Setareh Rafatirad, Houman Homayoun:
Towards Accurate Run-Time Hardware-Assisted Stealthy Malware Detection: A Lightweight, yet Effective Time Series CNN-Based Approach. Cryptogr. 5(4): 28 (2021) - [j3]Han Wang, Hossein Sayadi, Sai Manoj Pudukotai Dinakarrao, Avesta Sasan, Setareh Rafatirad, Houman Homayoun:
Enabling Micro AI for Securing Edge Devices at Hardware Level. IEEE J. Emerg. Sel. Topics Circuits Syst. 11(4): 803-815 (2021) - [j2]Hosein Mohammadi Makrani, Hossein Sayadi, Najmeh Nazari, Sai Manoj Pudukotai Dinakarrao, Avesta Sasan, Tinoosh Mohsenin, Setareh Rafatirad, Houman Homayoun:
Adaptive Performance Modeling of Data-intensive Workloads for Resource Provisioning in Virtualized Environment. ACM Trans. Model. Perform. Evaluation Comput. Syst. 5(4): 18:1-18:24 (2021) - [c32]Han Wang, Soheil Salehi, Hossein Sayadi, Avesta Sasan, Tinoosh Mohsenin, Sai Manoj P. D., Setareh Rafatirad, Houman Homayoun:
Evaluation of Machine Learning-based Detection against Side-Channel Attacks on Autonomous Vehicle. AICAS 2021: 1-4 - [c31]Najmeh Nazari Bavarsad, Hosein Mohammadi Makrani, Hossein Sayadi, Lawrence Landis, Setareh Rafatirad, Houman Homayoun:
HosNa: A DPC++ Benchmark Suite for Heterogeneous Architectures. ICCD 2021: 509-516 - [c30]Yifeng Gao, Hosein Mohammadi Makrani, Mehrdad Aliasgari, Amin Rezaei, Jessica Lin, Houman Homayoun, Hossein Sayadi:
Adaptive-HMD: Accurate and Cost-Efficient Machine Learning-Driven Malware Detection using Microarchitectural Events. IOLTS 2021: 1-7 - [c29]Han Wang, Hossein Sayadi, Avesta Sasan, Sai Manoj P. D., Setareh Rafatirad, Houman Homayoun:
Machine Learning-Assisted Website Fingerprinting Attacks with Side-Channel Information: A Comprehensive Analysis and Characterization. ISQED 2021: 79-84 - [c28]Zhangying He, Tahereh Miari, Hosein Mohammadi Makrani, Mehrdad Aliasgari, Houman Homayoun, Hossein Sayadi:
When Machine Learning Meets Hardware Cybersecurity: Delving into Accurate Zero-Day Malware Detection. ISQED 2021: 85-90 - [c27]Hosein Mohammadi Makrani, Hossein Sayadi, Najmeh Nazari, Khaled N. Khasawneh, Avesta Sasan, Setareh Rafatirad, Houman Homayoun:
Cloak & Co-locate: Adversarial Railroading of Resource Sharing-based Attacks on the Cloud. SEED 2021: 1-13 - [c26]Hosein Mohammadi Makrani, Hossein Sayadi, Najmeh Nazari, Houman Homayoun:
Security Threats in Cloud Rooted from Machine Learning-Based Resource Provisioning Systems. SVCC 2021: 22-32 - [c25]Ava Hedayatipour, Ravi Monani, Amin Rezaei, Mehrdad Aliasgari, Hossein Sayadi:
A Comprehensive Analysis of Chaos-Based Secure Systems. SVCC 2021: 90-105 - 2020
- [j1]Sai Manoj Pudukotai Dinakarrao, Xiaojie Guo, Hossein Sayadi, Cameron Nowzari, Avesta Sasan, Setareh Rafatirad, Liang Zhao, Houman Homayoun:
Cognitive and Scalable Technique for Securing IoT Networks Against Malware Epidemics. IEEE Access 8: 138508-138528 (2020) - [c24]Han Wang, Hossein Sayadi, Tinoosh Mohsenin, Liang Zhao, Avesta Sasan, Setareh Rafatirad, Houman Homayoun:
Mitigating Cache-Based Side-Channel Attacks through Randomization: A Comprehensive System and Architecture Level Analysis. DATE 2020: 1414-1419 - [c23]Hossein Sayadi, Yifeng Gao, Hosein Mohammadi Makrani, Tinoosh Mohsenin, Avesta Sasan, Setareh Rafatirad, Jessica Lin, Houman Homayoun:
StealthMiner: Specialized Time Series Machine Learning for Run-Time Stealthy Malware Detection based on Microarchitectural Features. ACM Great Lakes Symposium on VLSI 2020: 175-180 - [c22]Han Wang, Hossein Sayadi, Avesta Sasan, Setareh Rafatirad, Tinoosh Mohsenin, Houman Homayoun:
Comprehensive Evaluation of Machine Learning Countermeasures for Detecting Microarchitectural Side-Channel Attacks. ACM Great Lakes Symposium on VLSI 2020: 181-186 - [c21]Han Wang, Hossein Sayadi, Avesta Sasan, Setareh Rafatirad, Houman Homayoun:
Hybrid-Shield: Accurate and Efficient Cross-Layer Countermeasure for Run-Time Detection and Mitigation of Cache-Based Side-Channel Attacks. ICCAD 2020: 36:1-36:9 - [c20]Han Wang, Hossein Sayadi, Gaurav Kolhe, Avesta Sasan, Setareh Rafatirad, Houman Homayoun:
Phased-Guard: Multi-Phase Machine Learning Framework for Detection and Identification of Zero-Day Microarchitectural Side-Channel Attacks. ICCD 2020: 648-655 - [c19]Han Wang, Hossein Sayadi, Avesta Sasan, Setareh Rafatirad, Houman Homayoun:
HybriDG: Hybrid Dynamic Time Warping and Gaussian Distribution Model for Detecting Emerging Zero-Day Microarchitectural Side-Channel Attacks. ICMLA 2020: 604-611 - [c18]Han Wang, Hossein Sayadi, Setareh Rafatirad, Avesta Sasan, Houman Homayoun:
SCARF: Detecting Side-Channel Attacks at Real-time using Low-level Hardware Features. IOLTS 2020: 1-6 - [c17]Hossein Sayadi, Han Wang, Tahereh Miari, Hosein Mohammadi Makrani, Mehrdad Aliasgari, Setareh Rafatirad, Houman Homayoun:
Recent Advancements in Microarchitectural Security: Review of Machine Learning Countermeasures. MWSCAS 2020: 949-952
2010 – 2019
- 2019
- [c16]Hosein Mohammadi Makrani, Hossein Sayadi, Tinoosh Mohsenin, Setareh Rafatirad, Avesta Sasan, Houman Homayoun:
XPPE: cross-platform performance estimation of hardware accelerators using machine learning. ASP-DAC 2019: 727-732 - [c15]Sai Manoj Pudukotai Dinakarrao, Sairaj Amberkar, Sahil Bhat, Abhijitt Dhavlle, Hossein Sayadi, Avesta Sasan, Houman Homayoun, Setareh Rafatirad:
Adversarial Attack on Microarchitectural Events based Malware Detectors. DAC 2019: 164 - [c14]Hossein Sayadi, Hosein Mohammadi Makrani, Sai Manoj Pudukotai Dinakarrao, Tinoosh Mohsenin, Avesta Sasan, Setareh Rafatirad, Houman Homayoun:
2SMaRT: A Two-Stage Machine Learning-Based Approach for Run-Time Specialized Hardware-Assisted Malware Detection. DATE 2019: 728-733 - [c13]Sai Manoj Pudukotai Dinakarrao, Hossein Sayadi, Hosein Mohammadi Makrani, Cameron Nowzari, Setareh Rafatirad, Houman Homayoun:
Lightweight Node-level Malware Detection and Network-level Malware Confinement in IoT Networks. DATE 2019: 776-781 - [c12]Hosein Mohammadi Makrani, Farnoud Farahmand, Hossein Sayadi, Sara Bondi, Sai Manoj Pudukotai Dinakarrao, Houman Homayoun, Setareh Rafatirad:
Pyramid: Machine Learning Framework to Estimate the Optimal Timing and Resource Usage of a High-Level Synthesis Design. FPL 2019: 397-403 - [i2]Hosein Mohammadi Makrani, Farnoud Farahmand, Hossein Sayadi, Sara Bondi, Sai Manoj Pudukotai Dinakarrao, Liang Zhao, Avesta Sasan, Houman Homayoun, Setareh Rafatirad:
Pyramid: Machine Learning Framework to Estimate the Optimal Timing and Resource Usage of a High-Level Synthesis Design. CoRR abs/1907.12952 (2019) - 2018
- [c11]Hosein Mohammadi Makrani, Hossein Sayadi, Sai Manoj P. D., Setareh Rafatirad, Houman Homayoun:
Compressive Sensing on Storage Data: An Effective Solution to Alleviate I/0 Bottleneck in Data- Intensive Workloads. ASAP 2018: 1-8 - [c10]Hossein Sayadi, Divya Pathak, Ioannis Savidis, Houman Homayoun:
Power conversion efficiency-aware mapping of multithreaded applications on heterogeneous architectures: A comprehensive parameter tuning. ASP-DAC 2018: 70-75 - [c9]Ferdinand Brasser, Lucas Davi, Abhijitt Dhavlle, Tommaso Frassetto, Sai Manoj Pudukotai Dinakarrao, Setareh Rafatirad, Ahmad-Reza Sadeghi, Avesta Sasan, Hossein Sayadi, Shaza Zeitouni, Houman Homayoun:
Advances and throwbacks in hardware-assisted security: special session. CASES 2018: 15:1-15:10 - [c8]Hossein Sayadi, Sai Manoj P. D., Amir Houmansadr, Setareh Rafatirad, Houman Homayoun:
Comprehensive assessment of run-time hardware-supported malware detection using general and ensemble learning. CF 2018: 212-215 - [c7]Hosein Mohammadi Makrani, Hossein Sayadi, Devang Motwani, Han Wang, Setareh Rafatirad, Houman Homayoun:
Energy-aware and Machine Learning-based Resource Provisioning of In-Memory Analytics on Cloud. SoCC 2018: 517 - [c6]Hossein Sayadi, Nisarg Patel, Sai Manoj P. D., Avesta Sasan, Setareh Rafatirad, Houman Homayoun:
Ensemble learning for effective run-time hardware-based malware detection: a comprehensive analysis and classification. DAC 2018: 1:1-1:6 - [c5]Hosein Mohammadi Makrani, Hossein Sayadi, Sai Manoj Pudukotai Dinakarrao, Setareh Rafatirad, Houman Homayoun:
A comprehensive memory analysis of data intensive workloads on server class architecture. MEMSYS 2018: 19-30 - [c4]Hossein Sayadi, Hosein Mohammadi Makrani, Onkar Randive, Sai Manoj Pudukotai Dinakarrao, Setareh Rafatirad, Houman Homayoun:
Customized Machine Learning-Based Hardware-Assisted Malware Detection in Embedded Devices. TrustCom/BigDataSE 2018: 1685-1688 - [i1]Hossein Sayadi:
Energy-Efficiency Prediction of Multithreaded Workloads on Heterogeneous Composite Cores Architectures using Machine Learning Techniques. CoRR abs/1808.01728 (2018) - 2017
- [c3]Hossein Sayadi, Houman Homayoun:
Scheduling multithreaded applications onto heterogeneous composite cores architecture. IGSC 2017: 1-8 - [c2]Hossein Sayadi, Nisarg Patel, Avesta Sasan, Houman Homayoun:
Machine Learning-Based Approaches for Energy-Efficiency Prediction and Scheduling in Composite Cores Architectures. ICCD 2017: 129-136 - 2014
- [c1]Hossein Sayadi, Hamed Farbeh, Amir Mahdi Hosseini Monazzah, Seyed Ghassem Miremadi:
A data recomputation approach for reliability improvement of scratchpad memory in embedded systems. DFT 2014: 228-233
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-14 22:06 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint