Secure computation on floating point numbers M Aliasgari, M Blanton, Y Zhang, A Steele Cryptology ePrint Archive, 2012 | 159 | 2012 |
Secure outsourcing of DNA searching via finite automata M Blanton, M Aliasgari IFIP Annual Conference on Data and Applications Security and Privacy, 49-64, 2010 | 130 | 2010 |
Data-oblivious graph algorithms for secure computation and outsourcing M Blanton, A Steele, M Alisagari Proceedings of the 8th ACM SIGSAC symposium on Information, computer and …, 2013 | 126 | 2013 |
Analysis of reusability of secure sketches and fuzzy extractors M Blanton, M Aliasgari IEEE transactions on information forensics and security 8 (9), 1433-1445, 2013 | 73 | 2013 |
Secure outsourced computation of iris matching M Blanton, M Aliasgari Journal of Computer Security 20 (2-3), 259-305, 2012 | 40 | 2012 |
On the (non-) reusability of fuzzy sketches and extractors and security in the computational setting M Blanton, M Aliasgari Proceedings of the International Conference on Security and Cryptography, 68-77, 2011 | 35 | 2011 |
Secure computation of hidden Markov models and secure floating-point arithmetic in the malicious model M Aliasgari, M Blanton, F Bayatbabolghani International Journal of Information Security 16, 577-601, 2017 | 33 | 2017 |
When machine learning meets hardware cybersecurity: Delving into accurate zero-day malware detection Z He, T Miari, HM Makrani, M Aliasgari, H Homayoun, H Sayadi 2021 22nd International Symposium on Quality Electronic Design (ISQED), 85-90, 2021 | 30 | 2021 |
Recent advancements in microarchitectural security: Review of machine learning countermeasures H Sayadi, H Wang, T Miari, HM Makrani, M Aliasgari, S Rafatirad, ... 2020 IEEE 63rd International Midwest Symposium on Circuits and Systems …, 2020 | 26 | 2020 |
Secure computation of hidden Markov models M Aliasgari, M Blanton 2013 International Conference on Security and Cryptography (SECRYPT), 1-12, 2013 | 23 | 2013 |
Security vulnerabilities in mobile health applications M Aliasgari, M Black, N Yadav 2018 IEEE Conference on application, information and network security (AINS …, 2018 | 22 | 2018 |
Adaptive-hmd: Accurate and cost-efficient machine learning-driven malware detection using microarchitectural events Y Gao, HM Makrani, M Aliasgari, A Rezaei, J Lin, H Homayoun, H Sayadi 2021 IEEE 27th International Symposium on On-Line Testing and Robust System …, 2021 | 17 | 2021 |
Secure computation of biometric matching M Blanton, M Aliasgari Department of Computer Science and Engineering, University of Notre Dame …, 2009 | 16 | 2009 |
On the (non-) reusability of fuzzy sketches and extractors and security improvements in the computational setting M Blanton, M Aliasgari Cryptology ePrint Archive, 2012 | 14 | 2012 |
Secure fingerprint alignment and matching protocols F Bayatbabolghani, M Blanton, M Aliasgari, M Goodrich arXiv preprint arXiv:1702.03379, 2017 | 13 | 2017 |
Global attack and remedy on IC-specific logic encryption A Rezaei, A Hedayatipour, H Sayadi, M Aliasgari, H Zhou 2022 IEEE International Symposium on Hardware Oriented Security and Trust …, 2022 | 9 | 2022 |
Automated detection of sewer pipe structural defects using machine learning J Huang, KE Leung, R Verceles, W Chen, B Englert, M Aliasgari WEFTEC 2017, 2017 | 6 | 2017 |
A comprehensive analysis of chaos-based secure systems A Hedayatipour, R Monani, A Rezaei, M Aliasgari, H Sayadi Silicon Valley Cybersecurity Conference, 90-105, 2021 | 5 | 2021 |
Rapid, multi-vehicle and feed-forward neural network based intrusion detection system for controller area network bus M Sami, M Ibarra, AC Esparza, S Al-Jufout, M Aliasgari, M Mozumdar 2020 IEEE Green Energy and Smart Systems Conference (IGESSC), 1-6, 2020 | 5 | 2020 |
Vector maps mobile application for sustainable eco-driving transportation route selection V Balali, S Fathi, M Aliasgari Sustainability 12 (14), 5584, 2020 | 5 | 2020 |