Follow
Mehrdad Aliasgari
Mehrdad Aliasgari
Computer Engineering and Computer Science, California State University Long Beach
Verified email at csulb.edu - Homepage
Title
Cited by
Cited by
Year
Secure computation on floating point numbers
M Aliasgari, M Blanton, Y Zhang, A Steele
Cryptology ePrint Archive, 2012
1642012
Data-oblivious graph algorithms for secure computation and outsourcing
M Blanton, A Steele, M Alisagari
Proceedings of the 8th ACM SIGSAC symposium on Information, computer and …, 2013
1352013
Secure outsourcing of DNA searching via finite automata
M Blanton, M Aliasgari
IFIP Annual Conference on Data and Applications Security and Privacy, 49-64, 2010
1292010
Analysis of reusability of secure sketches and fuzzy extractors
M Blanton, M Aliasgari
IEEE transactions on information forensics and security 8 (9), 1433-1445, 2013
772013
Secure outsourced computation of iris matching
M Blanton, M Aliasgari
Journal of Computer Security 20 (2-3), 259-305, 2012
422012
On the (non-) reusability of fuzzy sketches and extractors and security in the computational setting
M Blanton, M Aliasgari
Proceedings of the International Conference on Security and Cryptography, 68-77, 2011
362011
Secure computation of hidden Markov models and secure floating-point arithmetic in the malicious model
M Aliasgari, M Blanton, F Bayatbabolghani
International Journal of Information Security 16, 577-601, 2017
352017
When machine learning meets hardware cybersecurity: Delving into accurate zero-day malware detection
Z He, T Miari, HM Makrani, M Aliasgari, H Homayoun, H Sayadi
2021 22nd International Symposium on Quality Electronic Design (ISQED), 85-90, 2021
322021
Recent advancements in microarchitectural security: Review of machine learning countermeasures
H Sayadi, H Wang, T Miari, HM Makrani, M Aliasgari, S Rafatirad, ...
2020 IEEE 63rd International Midwest Symposium on Circuits and Systems …, 2020
292020
Security vulnerabilities in mobile health applications
M Aliasgari, M Black, N Yadav
2018 IEEE Conference on application, information and network security (AINS …, 2018
262018
Secure computation of hidden Markov models
M Aliasgari, M Blanton
2013 International Conference on Security and Cryptography (SECRYPT), 1-12, 2013
232013
Adaptive-hmd: Accurate and cost-efficient machine learning-driven malware detection using microarchitectural events
Y Gao, HM Makrani, M Aliasgari, A Rezaei, J Lin, H Homayoun, H Sayadi
2021 IEEE 27th International Symposium on On-Line Testing and Robust System …, 2021
182021
Secure computation of biometric matching
M Blanton, M Aliasgari
Department of Computer Science and Engineering, University of Notre Dame …, 2009
162009
On the (non-) reusability of fuzzy sketches and extractors and security improvements in the computational setting
M Blanton, M Aliasgari
Cryptology ePrint Archive, 2012
142012
Secure fingerprint alignment and matching protocols
F Bayatbabolghani, M Blanton, M Aliasgari, M Goodrich
arXiv preprint arXiv:1702.03379, 2017
132017
Global attack and remedy on IC-specific logic encryption
A Rezaei, A Hedayatipour, H Sayadi, M Aliasgari, H Zhou
2022 IEEE International Symposium on Hardware Oriented Security and Trust …, 2022
102022
Automated detection of sewer pipe structural defects using machine learning
J Huang, KE Leung, R Verceles, W Chen, B Englert, M Aliasgari
WEFTEC 2017, 2017
82017
Towards an efficient client selection system for federated learning
G Ding, Z Li, Y Wu, X Yang, M Aliasgari, H Xu
International Conference on Cloud Computing, 13-21, 2022
62022
Towards ai-enabled hardware security: Challenges and opportunities
H Sayadi, M Aliasgari, F Aydin, S Potluri, A Aysu, J Edmonds, ...
2022 IEEE 28th International Symposium on On-Line Testing and Robust System …, 2022
62022
Vector maps mobile application for sustainable eco-driving transportation route selection
V Balali, S Fathi, M Aliasgari
Sustainability 12 (14), 5584, 2020
62020
The system can't perform the operation now. Try again later.
Articles 1–20