2021

  1. Adversary Instantiation: Lower Bounds for Differentially Private Machine Learning Nasr, Milad, Song, Shuang, Thakurta, Abhradeep, Papernot, Nicolas, and Carlini, Nicholas In 2021 IEEE symposium on security and privacy (SP) 2021
  2. Defeating DNN-Based Traffic Analysis Systems in Real-Time With Blind Adversarial Perturbations Nasr, Milad, Bahramali, Alireza, and Houmansadr, Amir In 30th {USENIX} Security Symposium ({USENIX} Security 21) 2021

2020

  1. Massbrowser: Unblocking the censored web for the masses, by the masses Nasr, Milad, Zolfaghar, Hadi, Houmansadr, Amir, and Ghafari, Amirhossein In NDSS 2020
  2. Bidding strategies with gender nondiscrimination constraints for online ad auctions Nasr, Milad, and Tschantz, Michael Carl In Proceedings of the 2020 Conference on Fairness, Accountability, and Transparency 2020
  3. Improving Deep Learning with Differential Privacy using Gradient Encoding and Denoising Nasr, Milad, Shokri, Reza, and others, TPDP 2020

2019

  1. Enemy At the Gateways: Censorship-Resilient Proxy Distribution Using Game Theory. Nasr, Milad, Farhang, Sadegh, Houmansadr, Amir, and Grossklags, Jens In NDSS 2019
  2. Comprehensive privacy analysis of deep learning: Passive and active white-box inference attacks against centralized and federated learning Nasr, Milad, Shokri, Reza, and Houmansadr, Amir In 2019 IEEE symposium on security and privacy (SP) 2019

2018

  1. DeepCorr: Strong Flow Correlation Attacks on Tor Using Deep Learning Nasr, Milad, Bahramali, Alireza, and Houmansadr, Amir In Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security 2018
  2. Machine Learning with Membership Privacy using Adversarial Regularization Nasr, Milad, Shokri, Reza, and Houmansadr, Amir In Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security 2018
  3. Poster: Introducing MassBrowser: A Censorship Circumvention System Run by the Masses Nasr, Milad, Anonymous, , and Houmansadr, Amir 2018

2017

  1. The waterfall of liberty: Decoy routing circumvention that resists routing attacks Nasr, Milad, Zolfaghari, Hadi, and Houmansadr, Amir In Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security 2017
  2. Compressive Traffic Analysis: A New Paradigm for Scalable Traffic Analysis Nasr, Milad, Houmansadr, Amir, and Mazumdar, Arya In Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security 2017

2016

  1. GAME OF DECOYS: Optimal decoy routing through game theory Nasr, Milad, and Houmansadr, Amir In Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security 2016

2015

  1. Daemo: A self-governed crowdsourcing marketplace Gaikwad, Snehal Neil, Morina, Durim, Nistala, Rohit, Agarwal, Megha, Cossette, Alison, Bhanu, Radhika, Savage, Saiph, Narwal, Vishwajeet, Rajpal, Karan, Regino, Jeff, and others, In Adjunct Proceedings of the 28th Annual ACM Symposium on User Interface Software & Technology 2015

2014

  1. A dynamic Bayesian security game framework for strategic defense mechanism design Farhang, Sadegh, Manshaei, Mohammad Hossein, Nasr, Milad, and Zhu, Quanyan In International conference on decision and game theory for security 2014