Sadeghi, Ahmad-Reza
1880  results:
Search for persons X
?
2

Unleashing IoT Security: Assessing the Effectiveness of Bes..:

, In: Proceedings of the 39th Annual Computer Security Applications Conference,
 
?
3

PSOFuzz: Fuzzing Processors with Particle Swarm Optimizatio:

, In: 2023 IEEE/ACM International Conference on Computer Aided Design (ICCAD),
Chen, Chen ; Gohil, Vasudev ; Kande, Rahul.. - p. 1-9 , 2023
 
?
4

BayBFed: Bayesian Backdoor Defense for Federated Learning:

, In: 2023 IEEE Symposium on Security and Privacy (SP),
 
?
5

Follow Us and Become Famous! Insights and Guidelines From I..:

, In: Proceedings of the 15th ACM Web Science Conference 2023,
 
?
6

FLAIRS: FPGA-Accelerated Inference-Resistant & Secure Feder..:

, In: 2023 33rd International Conference on Field-Programmable Logic and Applications (FPL),
Li, Huimin ; Rieger, Phillip ; Zeitouni, Shaza.. - p. 271-276 , 2023
 
?
10

Wireless and Mobile Security Research and Teaching in the P..:

, In: Proceedings of the 15th ACM Conference on Security and Privacy in Wireless and Mobile Networks,
 
?
11

RiscyROP: Automated Return-Oriented Programming Attacks on ..:

, In: 25th International Symposium on Research in Attacks, Intrusions and Defenses,
 
?
13

VirTEE : a full backward-compatible TEE with native live..:

, In: Proceedings of the 59th ACM/IEEE Design Automation Conference,
 
?
14

Trusting the trust anchor : towards detecting cross-laye..:

, In: Proceedings of the 59th ACM/IEEE Design Automation Conference,
Chen, Chen ; Kande, Rahul ; Mahmoody, Pouya.. - p. 1379-1383 , 2022
 
?
15

WIGHT: Wired Ghost Touch Attack on Capacitive Touchscreens:

, In: 2022 IEEE Symposium on Security and Privacy (SP),
Jiang, Yan ; Ji, Xiaoyu ; Wang, Kai... - p. 984-1001 , 2022
 
1-15