Sadeghi, Ahmad-Reza
2219  results:
Search for persons X
?
3

Analyzing and Defending GhostTouch Attack against Capacitiv..:

Wang, Kai ; Mitev, Richard ; Yan, Chen...
IEEE Transactions on Dependable and Secure Computing.  , 2024
 
?
4

Marionette: Manipulate Your Touchscreen via A Charging Cabl:

Jiang, Yan ; Ji, Xiaoyu ; Wang, Kai...
IEEE Transactions on Dependable and Secure Computing.  , 2024
 
?
5

Digital Contact Tracing Solutions: Promises, Pitfalls and C..:

Nguyen, Thien Duc ; Miettinen, Markus ; Dmitrienko, Alexandra..
IEEE Transactions on Emerging Topics in Computing.  12 (2024)  2 - p. 483-495 , 2024
 
?
6

DMA'n'Play: Practical Remote Attestation Based on Direct Me..:

, In: Applied Cryptography and Network Security; Lecture Notes in Computer Science,
 
?
7

Unleashing IoT Security: Assessing the Effectiveness of Bes..:

, In: Proceedings of the 39th Annual Computer Security Applications Conference,
 
?
8

PSOFuzz: Fuzzing Processors with Particle Swarm Optimizatio:

, In: 2023 IEEE/ACM International Conference on Computer Aided Design (ICCAD),
Chen, Chen ; Gohil, Vasudev ; Kande, Rahul.. - p. 1-9 , 2023
 
?
9

BayBFed: Bayesian Backdoor Defense for Federated Learning:

, In: 2023 IEEE Symposium on Security and Privacy (SP),
 
?
10

Follow Us and Become Famous! Insights and Guidelines From I..:

, In: Proceedings of the 15th ACM Web Science Conference 2023,
 
?
11

FLAIRS: FPGA-Accelerated Inference-Resistant & Secure Feder..:

, In: 2023 33rd International Conference on Field-Programmable Logic and Applications (FPL),
Li, Huimin ; Rieger, Phillip ; Zeitouni, Shaza.. - p. 271-276 , 2023
 
?
15

Wireless and Mobile Security Research and Teaching in the P..:

, In: Proceedings of the 15th ACM Conference on Security and Privacy in Wireless and Mobile Networks,
 
1-15