default search action
Mehrdad Aliasgari
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c18]Zhangying He, Thomas Nguyen, Tahereh Miari, Mehrdad Aliasgari, Setareh Rafatirad, Hossein Sayadi:
The AI Companion in Education: Analyzing the Pedagogical Potential of ChatGPT in Computer Science and Engineering. EDUCON 2024: 1-10 - [c17]Hossein Sayadi, Zhangying He, Tahereh Miari, Mehrdad Aliasgari:
Redefining Trust: Assessing Reliability of Machine Learning Algorithms in Intrusion Detection Systems. ISCAS 2024: 1-5 - [i7]Zhangying He, Thomas Nguyen, Tahereh Miari, Mehrdad Aliasgari, Setareh Rafatirad, Hossein Sayadi:
The AI Companion in Education: Analyzing the Pedagogical Potential of ChatGPT in Computer Science and Engineering. CoRR abs/2407.05205 (2024) - 2023
- [j6]Jinha Hwang, Gauri Kale, Persis Premkumar Patel, Rahul Vishwakarma, Mehrdad Aliasgari, Ava Hedayatipour, Amin Rezaei, Hossein Sayadi:
Machine Learning in Chaos-Based Encryption: Theory, Implementations, and Applications. IEEE Access 11: 125749-125767 (2023) - [c16]Erald Troja, Joan DeBello, Nikhil Yadav, Mehrdad Aliasgari, Laura M. Truong, James Worden:
Mitigating Autonomous Vehicle GPS Spoofing Attacks through Scene Text Observations. HICSS 2023: 6706-6715 - [c15]Rahul Vishwakarma, Ravi Monani, Amin Rezaei, Hossein Sayadi, Mehrdad Aliasgari, Ava Hedayatipour:
Attacks on Continuous Chaos Communication and Remedies for Resource Limited Devices. ISQED 2023: 1-8 - [i6]Rahul Vishwakarma, Ravi Monani, Amin Rezaei, Hossein Sayadi, Mehrdad Aliasgari, Ava Hedayatipour:
Attacks on Continuous Chaos Communication and Remedies for Resource Limited Devices. CoRR abs/2305.16692 (2023) - 2022
- [c14]Guanyu Ding, Zhengxiong Li, Yusen Wu, Xiaokun Yang, Mehrdad Aliasgari, Hailu Xu:
Towards an Efficient Client Selection System for Federated Learning. CLOUD 2022: 13-21 - [c13]Amin Rezaei, Ava Hedayatipour, Hossein Sayadi, Mehrdad Aliasgari, Hai Zhou:
Global Attack and Remedy on IC-Specific Logic Encryption. HOST 2022: 145-148 - [c12]Hossein Sayadi, Mehrdad Aliasgari, Furkan Aydin, Seetal Potluri, Aydin Aysu, Jack Edmonds, Sara Tehranipoor:
Towards AI-Enabled Hardware Security: Challenges and Opportunities. IOLTS 2022: 1-10 - 2021
- [j5]Wenlu Zhang, Lusi Li, Vincent Cheong, Bo Fu, Mehrdad Aliasgari:
Deep Encoder-Decoder Neural Networks for Retinal Blood Vessels Dense Prediction. Int. J. Comput. Intell. Syst. 14(1): 1078-1086 (2021) - [c11]Yifeng Gao, Hosein Mohammadi Makrani, Mehrdad Aliasgari, Amin Rezaei, Jessica Lin, Houman Homayoun, Hossein Sayadi:
Adaptive-HMD: Accurate and Cost-Efficient Machine Learning-Driven Malware Detection using Microarchitectural Events. IOLTS 2021: 1-7 - [c10]Zhangying He, Tahereh Miari, Hosein Mohammadi Makrani, Mehrdad Aliasgari, Houman Homayoun, Hossein Sayadi:
When Machine Learning Meets Hardware Cybersecurity: Delving into Accurate Zero-Day Malware Detection. ISQED 2021: 85-90 - [c9]Ava Hedayatipour, Ravi Monani, Amin Rezaei, Mehrdad Aliasgari, Hossein Sayadi:
A Comprehensive Analysis of Chaos-Based Secure Systems. SVCC 2021: 90-105 - [c8]Mehrdad Aliasgari, Burkhard Englert, Oscar Morales-Ponce:
Computing the Optimal Longest Queue Length in Torus Networks. TPNC 2021: 3-14 - 2020
- [c7]Bo Fu, Jimmy Chao, Melissa Bittner, Wenlu Zhang, Mehrdad Aliasgari:
Improving Fitness Levels of Individuals with Autism Spectrum Disorder: A Preliminary Evaluation of Real-Time Interactive Heart Rate Visualization to Motivate Engagement in Physical Activity. ICCHP (2) 2020: 81-89 - [c6]Hossein Sayadi, Han Wang, Tahereh Miari, Hosein Mohammadi Makrani, Mehrdad Aliasgari, Setareh Rafatirad, Houman Homayoun:
Recent Advancements in Microarchitectural Security: Review of Machine Learning Countermeasures. MWSCAS 2020: 949-952
2010 – 2019
- 2018
- [j4]Nikhil Yadav, Mehrdad Aliasgari, Christopher Azzara, Fazel Keshtkar:
Secure Mobile Automation of Ecological Momentary Assessments (EMA) For Structured Querying. EAI Endorsed Trans. Ambient Syst. 5(17): e2 (2018) - 2017
- [j3]Mehrdad Aliasgari, Marina Blanton, Fattaneh Bayatbabolghani:
Secure computation of hidden Markov models and secure floating-point arithmetic in the malicious model. Int. J. Inf. Sec. 16(6): 577-601 (2017) - [i5]Fattaneh Bayatbabolghani, Marina Blanton, Mehrdad Aliasgari, Michael T. Goodrich:
Secure Fingerprint Alignment and Matching Protocols. CoRR abs/1702.03379 (2017) - 2016
- [i4]Oscar Morales-Ponce, Burkhard Englert, Mehrdad Aliasgari:
Optimal Queue Length in Torus Networks with Traffic Signals. CoRR abs/1606.03800 (2016) - 2013
- [j2]Marina Blanton, Mehrdad Aliasgari:
Analysis of Reusability of Secure Sketches and Fuzzy Extractors. IEEE Trans. Inf. Forensics Secur. 8(9): 1433-1445 (2013) - [c5]Marina Blanton, Aaron Steele, Mehrdad Aliasgari:
Data-oblivious graph algorithms for secure computation and outsourcing. AsiaCCS 2013: 207-218 - [c4]Mehrdad Aliasgari, Marina Blanton, Yihua Zhang, Aaron Steele:
Secure Computation on Floating Point Numbers. NDSS 2013 - [c3]Mehrdad Aliasgari, Marina Blanton:
Secure Computation of Hidden Markov Models. SECRYPT 2013: 242-253 - 2012
- [j1]Marina Blanton, Mehrdad Aliasgari:
Secure outsourced computation of iris matching. J. Comput. Secur. 20(2-3): 259-305 (2012) - [i3]Mehrdad Aliasgari, Marina Blanton, Yihua Zhang, Aaron Steele:
Secure Computation on Floating Point Numbers. IACR Cryptol. ePrint Arch. 2012: 405 (2012) - [i2]Marina Blanton, Mehrdad Aliasgari:
On the (Non-)Reusability of Fuzzy Sketches and Extractors and Security Improvements in the Computational Setting. IACR Cryptol. ePrint Arch. 2012: 608 (2012) - 2011
- [c2]Marina Blanton, Mehrdad Aliasgari:
On the (Non-)reusability of Fuzzy Sketches and Extractors and Security in the Computational Setting. SECRYPT 2011: 68-77 - [i1]Marina Blanton, Mehrdad Aliasgari:
Secure Outsourced Computation of Iris Matching. IACR Cryptol. ePrint Arch. 2011: 462 (2011) - 2010
- [c1]Marina Blanton, Mehrdad Aliasgari:
Secure Outsourcing of DNA Searching via Finite Automata. DBSec 2010: 49-64
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 22:20 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint