Secure computation on floating point numbers M Aliasgari, M Blanton, Y Zhang, A Steele Cryptology ePrint Archive, 2012 | 164 | 2012 |
Data-oblivious graph algorithms for secure computation and outsourcing M Blanton, A Steele, M Alisagari Proceedings of the 8th ACM SIGSAC symposium on Information, computer and …, 2013 | 135 | 2013 |
Secure outsourcing of DNA searching via finite automata M Blanton, M Aliasgari IFIP Annual Conference on Data and Applications Security and Privacy, 49-64, 2010 | 129 | 2010 |
Analysis of reusability of secure sketches and fuzzy extractors M Blanton, M Aliasgari IEEE transactions on information forensics and security 8 (9), 1433-1445, 2013 | 77 | 2013 |
Secure outsourced computation of iris matching M Blanton, M Aliasgari Journal of Computer Security 20 (2-3), 259-305, 2012 | 42 | 2012 |
On the (non-) reusability of fuzzy sketches and extractors and security in the computational setting M Blanton, M Aliasgari Proceedings of the International Conference on Security and Cryptography, 68-77, 2011 | 36 | 2011 |
Secure computation of hidden Markov models and secure floating-point arithmetic in the malicious model M Aliasgari, M Blanton, F Bayatbabolghani International Journal of Information Security 16, 577-601, 2017 | 35 | 2017 |
When machine learning meets hardware cybersecurity: Delving into accurate zero-day malware detection Z He, T Miari, HM Makrani, M Aliasgari, H Homayoun, H Sayadi 2021 22nd International Symposium on Quality Electronic Design (ISQED), 85-90, 2021 | 32 | 2021 |
Recent advancements in microarchitectural security: Review of machine learning countermeasures H Sayadi, H Wang, T Miari, HM Makrani, M Aliasgari, S Rafatirad, ... 2020 IEEE 63rd International Midwest Symposium on Circuits and Systems …, 2020 | 29 | 2020 |
Security vulnerabilities in mobile health applications M Aliasgari, M Black, N Yadav 2018 IEEE Conference on application, information and network security (AINS …, 2018 | 26 | 2018 |
Secure computation of hidden Markov models M Aliasgari, M Blanton 2013 International Conference on Security and Cryptography (SECRYPT), 1-12, 2013 | 23 | 2013 |
Adaptive-hmd: Accurate and cost-efficient machine learning-driven malware detection using microarchitectural events Y Gao, HM Makrani, M Aliasgari, A Rezaei, J Lin, H Homayoun, H Sayadi 2021 IEEE 27th International Symposium on On-Line Testing and Robust System …, 2021 | 18 | 2021 |
Secure computation of biometric matching M Blanton, M Aliasgari Department of Computer Science and Engineering, University of Notre Dame …, 2009 | 16 | 2009 |
On the (non-) reusability of fuzzy sketches and extractors and security improvements in the computational setting M Blanton, M Aliasgari Cryptology ePrint Archive, 2012 | 14 | 2012 |
Secure fingerprint alignment and matching protocols F Bayatbabolghani, M Blanton, M Aliasgari, M Goodrich arXiv preprint arXiv:1702.03379, 2017 | 13 | 2017 |
Global attack and remedy on IC-specific logic encryption A Rezaei, A Hedayatipour, H Sayadi, M Aliasgari, H Zhou 2022 IEEE International Symposium on Hardware Oriented Security and Trust …, 2022 | 10 | 2022 |
Automated detection of sewer pipe structural defects using machine learning J Huang, KE Leung, R Verceles, W Chen, B Englert, M Aliasgari WEFTEC 2017, 2017 | 8 | 2017 |
Towards an efficient client selection system for federated learning G Ding, Z Li, Y Wu, X Yang, M Aliasgari, H Xu International Conference on Cloud Computing, 13-21, 2022 | 6 | 2022 |
Towards ai-enabled hardware security: Challenges and opportunities H Sayadi, M Aliasgari, F Aydin, S Potluri, A Aysu, J Edmonds, ... 2022 IEEE 28th International Symposium on On-Line Testing and Robust System …, 2022 | 6 | 2022 |
Vector maps mobile application for sustainable eco-driving transportation route selection V Balali, S Fathi, M Aliasgari Sustainability 12 (14), 5584, 2020 | 6 | 2020 |