Follow
Mehrdad Aliasgari
Mehrdad Aliasgari
Computer Engineering and Computer Science, California State University Long Beach
Verified email at csulb.edu - Homepage
Title
Cited by
Cited by
Year
Secure computation on floating point numbers
M Aliasgari, M Blanton, Y Zhang, A Steele
Cryptology ePrint Archive, 2012
1532012
Secure outsourcing of DNA searching via finite automata
M Blanton, M Aliasgari
IFIP Annual Conference on Data and Applications Security and Privacy, 49-64, 2010
1302010
Data-oblivious graph algorithms for secure computation and outsourcing
M Blanton, A Steele, M Alisagari
Proceedings of the 8th ACM SIGSAC symposium on Information, computer and …, 2013
1262013
Analysis of reusability of secure sketches and fuzzy extractors
M Blanton, M Aliasgari
IEEE transactions on information forensics and security 8 (9), 1433-1445, 2013
712013
Secure outsourced computation of iris matching
M Blanton, M Aliasgari
Journal of Computer Security 20 (2-3), 259-305, 2012
382012
On the (non-) reusability of fuzzy sketches and extractors and security in the computational setting
M Blanton, M Aliasgari
Proceedings of the International Conference on Security and Cryptography, 68-77, 2011
342011
Secure computation of hidden Markov models and secure floating-point arithmetic in the malicious model
M Aliasgari, M Blanton, F Bayatbabolghani
International Journal of Information Security 16, 577-601, 2017
322017
When machine learning meets hardware cybersecurity: Delving into accurate zero-day malware detection
Z He, T Miari, HM Makrani, M Aliasgari, H Homayoun, H Sayadi
2021 22nd International Symposium on Quality Electronic Design (ISQED), 85-90, 2021
252021
Recent advancements in microarchitectural security: Review of machine learning countermeasures
H Sayadi, H Wang, T Miari, HM Makrani, M Aliasgari, S Rafatirad, ...
2020 IEEE 63rd International Midwest Symposium on Circuits and Systems …, 2020
242020
Secure computation of hidden Markov models
M Aliasgari, M Blanton
2013 International Conference on Security and Cryptography (SECRYPT), 1-12, 2013
222013
Security vulnerabilities in mobile health applications
M Aliasgari, M Black, N Yadav
2018 IEEE Conference on application, information and network security (AINS …, 2018
212018
Secure computation of biometric matching
M Blanton, M Aliasgari
Department of Computer Science and Engineering, University of Notre Dame …, 2009
162009
On the (non-) reusability of fuzzy sketches and extractors and security improvements in the computational setting
M Blanton, M Aliasgari
Cryptology ePrint Archive, 2012
142012
Secure fingerprint alignment and matching protocols
F Bayatbabolghani, M Blanton, M Aliasgari, M Goodrich
arXiv preprint arXiv:1702.03379, 2017
132017
Global attack and remedy on IC-specific logic encryption
A Rezaei, A Hedayatipour, H Sayadi, M Aliasgari, H Zhou
2022 IEEE International Symposium on Hardware Oriented Security and Trust …, 2022
82022
Adaptive-hmd: Accurate and cost-efficient machine learning-driven malware detection using microarchitectural events
Y Gao, HM Makrani, M Aliasgari, A Rezaei, J Lin, H Homayoun, H Sayadi
2021 IEEE 27th International Symposium on On-Line Testing and Robust System …, 2021
82021
Automated detection of sewer pipe structural defects using machine learning
J Huang, KE Leung, R Verceles, W Chen, B Englert, M Aliasgari
WEFTEC 2017, 2017
62017
A comprehensive analysis of chaos-based secure systems
A Hedayatipour, R Monani, A Rezaei, M Aliasgari, H Sayadi
Silicon Valley Cybersecurity Conference, 90-105, 2021
52021
Rapid, multi-vehicle and feed-forward neural network based intrusion detection system for controller area network bus
M Sami, M Ibarra, AC Esparza, S Al-Jufout, M Aliasgari, M Mozumdar
2020 IEEE Green Energy and Smart Systems Conference (IGESSC), 1-6, 2020
52020
Sesame: a secure and convenient mobile solution for passwords
M Aliasgari, N Sabol, A Sharma
2015 First Conference on Mobile and Secure Services (MOBISECSERV), 1-5, 2015
52015
The system can't perform the operation now. Try again later.
Articles 1–20