2018

  1. DeepCorr: Strong Flow Correlation Attacks on Tor Using Deep Learning Nasr, Milad, Bahramali, Alireza, and Houmansadr, Amir In Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security 2018
  2. Machine Learning with Membership Privacy using Adversarial Regularization Nasr, Milad, Shokri, Reza, and Houmansadr, Amir In Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security 2018
  3. Poster: Introducing MassBrowser: A Censorship Circumvention System Run by the Masses Nasr, Milad, Anonymous, , and Houmansadr, Amir 2018

2017

  1. The waterfall of liberty: Decoy routing circumvention that resists routing attacks Nasr, Milad, Zolfaghari, Hadi, and Houmansadr, Amir In Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security 2017
  2. Compressive Traffic Analysis: A New Paradigm for Scalable Traffic Analysis Nasr, Milad, Houmansadr, Amir, and Mazumdar, Arya In Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security 2017

2016

  1. GAME OF DECOYS: Optimal decoy routing through game theory Nasr, Milad, and Houmansadr, Amir In Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security 2016

2015

  1. Daemo: A self-governed crowdsourcing marketplace Gaikwad, Snehal Neil, Morina, Durim, Nistala, Rohit, Agarwal, Megha, Cossette, Alison, Bhanu, Radhika, Savage, Saiph, Narwal, Vishwajeet, Rajpal, Karan, Regino, Jeff, and others, In Adjunct Proceedings of the 28th Annual ACM Symposium on User Interface Software & Technology 2015

2014

  1. A dynamic Bayesian security game framework for strategic defense mechanism design Farhang, Sadegh, Manshaei, Mohammad Hossein, Nasr, Milad, and Zhu, Quanyan In International conference on decision and game theory for security 2014