default search action
Amir Rahmati
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j6]Pratik Vaishnavi, Kevin Eykholt, Amir Rahmati:
A Study of the Effects of Transfer Learning on Adversarial Robustness. Trans. Mach. Learn. Res. 2024 (2024) - [c29]Preston Chang, Veena Krish, Amir Rahmati:
Security Analysis of RL-Based Artificial Pancreas Systems. HealthSec@CCS 2024: 69-76 - [c28]Stanley Bak, Sergiy Bogomolov, Abdelrahman Hekal, Niklas Kochdumper, Ethan Lew, Andrew Mata, Amir Rahmati:
Falsification using Reachability of Surrogate Koopman Models. HSCC 2024: 27:1-27:13 - [c27]Stanley Bak, Sergiy Bogomolov, Abdelrahman Hekal, Veena Krish, Andrew Mata, Amir Rahmati:
Zero-One Attack: Degrading Closed-Loop Neural Network Control Systems using State-Time Perturbations. ICCPS 2024: 12-22 - [c26]Xigao Li, Amir Rahmati, Nick Nikiforakis:
Like, Comment, Get Scammed: Characterizing Comment Scams on Media Platforms. NDSS 2024 - [c25]Veena Krish, Nicola Paoletti, Milad Kazemi, Scott A. Smolka, Amir Rahmati:
Biosignal Authentication Considered Harmful Today. USENIX Security Symposium 2024 - [i16]Kevin Eykholt, Farhan Ahmed, Pratik Vaishnavi, Amir Rahmati:
Taking off the Rose-Tinted Glasses: A Critical Look at Adversarial ML Through the Lens of Evasion Attacks. CoRR abs/2410.12076 (2024) - 2023
- [j5]Veena Krish, Nicola Paoletti, Scott A. Smolka, Amir Rahmati:
Synthesizing Pareto-Optimal Signal-Injection Attacks on ICDs. IEEE Access 11: 4992-5003 (2023) - [c24]Yoonsang Kim, Sanket Goutam, Amir Rahmati, Arie E. Kaufman:
Erebus: Access Control for Augmented Reality Systems. USENIX Security Symposium 2023: 929-946 - [c23]Xigao Li, Babak Amin Azad, Amir Rahmati, Nick Nikiforakis:
Scan Me If You Can: Understanding and Detecting Unwanted Vulnerability Scanning. WWW 2023: 2284-2294 - 2022
- [c22]Pratik Vaishnavi, Kevin Eykholt, Amir Rahmati:
Accelerating Certified Robustness Training via Knowledge Transfer. NeurIPS 2022 - [c21]Farhan Ahmed, Pratik Vaishnavi, Kevin Eykholt, Amir Rahmati:
Ares: A System-Oriented Wargame Framework for Adversarial ML. SP (Workshops) 2022: 73-79 - [c20]Pratik Vaishnavi, Kevin Eykholt, Amir Rahmati:
Transferring Adversarial Robustness Through Robust Representation Matching. USENIX Security Symposium 2022: 2083-2098 - [i15]Pratik Vaishnavi, Kevin Eykholt, Amir Rahmati:
Transferring Adversarial Robustness Through Robust Representation Matching. CoRR abs/2202.09994 (2022) - [i14]Farhan Ahmed, Pratik Vaishnavi, Kevin Eykholt, Amir Rahmati:
Ares: A System-Oriented Wargame Framework for Adversarial ML. CoRR abs/2210.12952 (2022) - [i13]Pratik Vaishnavi, Kevin Eykholt, Amir Rahmati:
Accelerating Certified Robustness Training via Knowledge Transfer. CoRR abs/2210.14283 (2022) - 2021
- [c19]Xigao Li, Babak Amin Azad, Amir Rahmati, Nick Nikiforakis:
Good Bot, Bad Bot: Characterizing Automated Browsing Activity. SP 2021: 1589-1605 - 2020
- [c18]Pubali Datta, Prabuddha Kumar, Tristan Morris, Michael Grace, Amir Rahmati, Adam Bates:
Valve: Securing Function Workflows on Serverless Computing Platforms. WWW 2020: 939-950 - [c17]Vasudevan Nagendra, Arani Bhattacharya, Vinod Yegneswaran, Amir Rahmati, Samir Ranjan Das:
An Intent-Based Automation Framework for Securing Dynamic Consumer IoT Infrastructures. WWW 2020: 1625-1636
2010 – 2019
- 2019
- [c16]Jk Jensen, Jinhan Hu, Amir Rahmati, Robert LiKamWa:
Protecting Visual Information in Augmented Reality from Malicious Application Developers. WearSys@MobiSys 2019: 23-28 - [i12]Vasudevan Nagendra, Arani Bhattacharya, Vinod Yegneswaran, Amir Rahmati, Samir R. Das:
VISCR: Intuitive & Conflict-free Automation for Securing the Dynamic Consumer IoT Infrastructures. CoRR abs/1907.13288 (2019) - [i11]Pratik Vaishnavi, Kevin Eykholt, Atul Prakash, Amir Rahmati:
Transferable Adversarial Robustness using Adversarially Trained Autoencoders. CoRR abs/1909.05921 (2019) - [i10]Earlence Fernandes, Amir Rahmati, Nick Feamster:
New Problems and Solutions in IoT Security and Privacy. CoRR abs/1910.03686 (2019) - [i9]Mohammad Reza Daneshvaramoli, Mohammad Sina Kiarostami, Saleh Khalaj Monfared, Helia Karisani, Hamed Khashehchi, Dara Rahmati, Saeid Gorgin, Amir Rahmati:
Decentralized Cooperative Communication-less Multi-Agent Task Assignment with Monte-Carlo Tree Search. CoRR abs/1910.12062 (2019) - [i8]Pratik Vaishnavi, Tianji Cong, Kevin Eykholt, Atul Prakash, Amir Rahmati:
Can Attention Masks Improve Adversarial Robustness? CoRR abs/1911.11946 (2019) - 2018
- [c15]Kevin Eykholt, Ivan Evtimov, Earlence Fernandes, Bo Li, Amir Rahmati, Chaowei Xiao, Atul Prakash, Tadayoshi Kohno, Dawn Song:
Robust Physical-World Attacks on Deep Learning Visual Classification. CVPR 2018: 1625-1634 - [c14]Earlence Fernandes, Amir Rahmati, Jaeyeon Jung, Atul Prakash:
Decentralized Action Integrity for Trigger-Action IoT Platforms. NDSS 2018 - [c13]Amir Rahmati, Earlence Fernandes, Kevin Eykholt, Atul Prakash:
Tyche: A Risk-Based Permission Model for Smart Homes. SecDev 2018: 29-36 - [c12]Dave (Jing) Tian, Grant Hernandez, Joseph I. Choi, Vanessa Frost, Christie Ruales, Patrick Traynor, Hayawardh Vijayakumar, Lee Harrison, Amir Rahmati, Michael Grace, Kevin R. B. Butler:
ATtention Spanned: Comprehensive Vulnerability Analysis of AT Commands Within the Android Ecosystem. USENIX Security Symposium 2018: 273-290 - [c11]Dawn Song, Kevin Eykholt, Ivan Evtimov, Earlence Fernandes, Bo Li, Amir Rahmati, Florian Tramèr, Atul Prakash, Tadayoshi Kohno:
Physical Adversarial Examples for Object Detectors. WOOT @ USENIX Security Symposium 2018 - [i7]Amir Rahmati, Earlence Fernandes, Kevin Eykholt, Atul Prakash:
Tyche: Risk-Based Permissions for Smart Home Platforms. CoRR abs/1801.04609 (2018) - [i6]Kevin Eykholt, Ivan Evtimov, Earlence Fernandes, Bo Li, Amir Rahmati, Florian Tramèr, Atul Prakash, Tadayoshi Kohno, Dawn Song:
Physical Adversarial Examples for Object Detectors. CoRR abs/1807.07769 (2018) - 2017
- [b1]Amir Rahmati:
Attacking and Defending Emerging Computer Systems Using The Memory Remanence Effect. University of Michigan, USA, 2017 - [j4]Earlence Fernandes, Amir Rahmati, Jaeyeon Jung, Atul Prakash:
Security Implications of Permission Models in Smart-Home Application Frameworks. IEEE Secur. Priv. 15(2): 24-30 (2017) - [j3]Earlence Fernandes, Amir Rahmati, Kevin Eykholt, Atul Prakash:
Internet of Things Security Research: A Rehash of Old Ideas or New Intellectual Challenges? IEEE Secur. Priv. 15(4): 79-84 (2017) - [c10]Amir Rahmati, Earlence Fernandes, Kevin Eykholt, Xinheng Chen, Atul Prakash:
Heimdall: A Privacy-Respecting Implicit Preference Collection Framework. MobiSys 2017: 453-463 - [c9]Yunhan Jack Jia, Qi Alfred Chen, Shiqi Wang, Amir Rahmati, Earlence Fernandes, Zhuoqing Morley Mao, Atul Prakash:
ContexloT: Towards Providing Contextual Integrity to Appified IoT Platforms. NDSS 2017 - [i5]Earlence Fernandes, Amir Rahmati, Kevin Eykholt, Atul Prakash:
Internet of Things Security Research: A Rehash of Old Ideas or New Intellectual Challenges? CoRR abs/1705.08522 (2017) - [i4]Earlence Fernandes, Amir Rahmati, Jaeyeon Jung, Atul Prakash:
Decoupled-IFTTT: Constraining Privilege in Trigger-Action Platforms for the Internet of Things. CoRR abs/1707.00405 (2017) - [i3]Ivan Evtimov, Kevin Eykholt, Earlence Fernandes, Tadayoshi Kohno, Bo Li, Atul Prakash, Amir Rahmati, Dawn Song:
Robust Physical-World Attacks on Machine Learning Models. CoRR abs/1707.08945 (2017) - [i2]Amir Rahmati, Earlence Fernandes, Jaeyeon Jung, Atul Prakash:
IFTTT vs. Zapier: A Comparative Study of Trigger-Action Programming Frameworks. CoRR abs/1709.02788 (2017) - [i1]Kevin Eykholt, Ivan Evtimov, Earlence Fernandes, Bo Li, Dawn Song, Tadayoshi Kohno, Amir Rahmati, Atul Prakash, Florian Tramèr:
Note on Attacking Object Detectors with Adversarial Stickers. CoRR abs/1712.08062 (2017) - 2016
- [j2]Josiah D. Hester, Nicole Tobias, Amir Rahmati, Lanny Sitanayah, Daniel E. Holcomb, Kevin Fu, Wayne P. Burleson, Jacob Sorber:
Persistent Clocks for Batteryless Sensing Devices. ACM Trans. Embed. Comput. Syst. 15(4): 77:1-77:28 (2016) - [c8]Han Zhang, Kasra Edalat Nejad, Amir Rahmati, Harsha V. Madhyastha:
Towards Comprehensive Repositories of Opinions. HotNets 2016: 15-21 - [c7]Amir Rahmati, Earlence Fernandes, Atul Prakash:
Applying the Opacified Computation Model to Enforce Information Flow Policies in IoT Applications. SecDev 2016: 88-93 - [c6]Earlence Fernandes, Justin Paupore, Amir Rahmati, Daniel Simionato, Mauro Conti, Atul Prakash:
FlowFence: Practical Data Protection for Emerging IoT Application Frameworks. USENIX Security Symposium 2016: 531-548 - 2015
- [j1]Xiaolin Xu, Amir Rahmati, Daniel E. Holcomb, Kevin Fu, Wayne P. Burleson:
Reliable Physical Unclonable Functions Using Data Retention Voltage of SRAM Cells. IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. 34(6): 903-914 (2015) - [c5]Amir Rahmati, Harsha V. Madhyastha:
Context-Specific Access Control: Conforming Permissions With User Expectations. SPSM@CCS 2015: 75-80 - [c4]Amir Rahmati, Matthew Hicks, Daniel E. Holcomb, Kevin Fu:
Probable cause: the deanonymizing effects of approximate DRAM. ISCA 2015: 604-615 - 2013
- [c3]Shane S. Clark, Benjamin Ransford, Amir Rahmati, Shane Guineau, Jacob Sorber, Wenyuan Xu, Kevin Fu:
WattsUpDoc: Power Side Channels to Nonintrusively Discover Untargeted Malware on Embedded Medical Devices. HealthTech 2013 - 2012
- [c2]Daniel E. Holcomb, Amir Rahmati, Mastooreh Salajegheh, Wayne P. Burleson, Kevin Fu:
DRV-Fingerprinting: Using Data Retention Voltage of SRAM Cells for Chip Identification. RFIDSec 2012: 165-179 - [c1]Amir Rahmati, Mastooreh Salajegheh, Daniel E. Holcomb, Jacob Sorber, Wayne P. Burleson, Kevin Fu:
TARDIS: Time and Remanence Decay in SRAM to Implement Secure Protocols on Embedded Devices without Clocks. USENIX Security Symposium 2012: 221-236
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-02 21:32 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint