Comprehensive privacy analysis of deep learning: Passive and active white-box inference attacks against centralized and federated learning M Nasr, R Shokri, A Houmansadr 2019 IEEE symposium on security and privacy (SP), 739-753, 2019 | 1710* | 2019 |
Machine learning with membership privacy using adversarial regularization M Nasr, R Shokri, A Houmansadr Proceedings of the 2018 ACM SIGSAC conference on computer and communications …, 2018 | 477 | 2018 |
Manipulating the Byzantine: Optimizing Model Poisoning Attacks and Defenses for Federated Learning V Shejwalkar, A Houmansadr NDSS, 2021 | 332 | 2021 |
The parrot is dead: Observing unobservable network communications A Houmansadr, C Brubaker, V Shmatikov 2013 IEEE Symposium on Security and Privacy, 65-79, 2013 | 244 | 2013 |
Back to the drawing board: A critical evaluation of poisoning attacks on production federated learning V Shejwalkar, A Houmansadr, P Kairouz, D Ramage 2022 IEEE Symposium on Security and Privacy (SP), 1354-1371, 2022 | 240 | 2022 |
RAINBOW: A Robust And Invisible Non-Blind Watermark for Network Flows. A Houmansadr, N Kiyavash, N Borisov NDSS 2009, 406-422, 2009 | 199 | 2009 |
Information hiding in communication networks: fundamentals, mechanisms, applications, and countermeasures W Mazurczyk, S Wendzel, S Zander, A Houmansadr, K Szczypiorski John Wiley & Sons, 2016 | 191 | 2016 |
DeepCorr: Strong flow correlation attacks on Tor using deep learning M Nasr, A Bahramali, A Houmansadr Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications …, 2018 | 186 | 2018 |
Cirripede: Circumvention infrastructure using router redirection with plausible deniability A Houmansadr, GTK Nguyen, M Caesar, N Borisov Proceedings of the 18th ACM conference on Computer and communications …, 2011 | 168 | 2011 |
Cronus: Robust and heterogeneous collaborative learning with black-box knowledge transfer H Chang, V Shejwalkar, R Shokri, A Houmansadr arXiv preprint arXiv:1912.11279, 2019 | 167 | 2019 |
I want my voice to be heard: IP over Voice-over-IP for unobservable censorship circumvention. A Houmansadr, TJ Riedl, N Borisov, AC Singer NDSS, 2013 | 150 | 2013 |
A Cloud-based Intrusion Detection and Response System for Mobile Phones A Houmansadr, SA Zonouz, R Berthier 5th Workshop on Recent Advances in Intrusion-Tolerant Systems, 2011 | 140 | 2011 |
Stegobot: a covert social network botnet S Nagaraja, A Houmansadr, P Piyawongwisal, V Singh, P Agarwal, ... Information Hiding: 13th International Conference, IH 2011, Prague, Czech …, 2011 | 139 | 2011 |
SWIRL: A Scalable Watermark to Detect Correlated Network Flows. A Houmansadr, N Borisov NDSS, 2011 | 136 | 2011 |
Secloud: A cloud-based comprehensive and lightweight security solution for smartphones S Zonouz, A Houmansadr, R Berthier, N Borisov, W Sanders Computers & Security 37, 215-227, 2013 | 132 | 2013 |
Censorspoofer: asymmetric communication using ip spoofing for censorship-resistant web browsing Q Wang, X Gong, GTK Nguyen, A Houmansadr, N Borisov Proceedings of the 2012 ACM conference on Computer and communications …, 2012 | 129 | 2012 |
Multi-flow Attacks Against Network Flow Watermarking Schemes. N Kiyavash, A Houmansadr, N Borisov USENIX security symposium, 307-320, 2008 | 112 | 2008 |
Membership Privacy for Machine Learning Models Through Knowledge Transfer V Shejwalkar, A Houmansadr 35th AAAI Conference on Artificial Intelligence (AAAI), 2021 | 105* | 2021 |
Defeating DNN-Based Traffic Analysis Systems in Real-Time With Blind Adversarial Perturbations M Nasr, A Bahramali, A Houmansadr 30th USENIX Security Symposium (USENIX Security 21), 2021 | 104 | 2021 |
Compressive traffic analysis: A new paradigm for scalable traffic analysis M Nasr, A Houmansadr, A Mazumdar Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications …, 2017 | 80 | 2017 |