Deep fingerprinting: Undermining website fingerprinting defenses with deep learning P Sirinam, M Imani, M Juarez, M Wright Proceedings of the 2018 ACM SIGSAC conference on computer and communications …, 2018 | 544 | 2018 |
Toward an efficient website fingerprinting defense M Juarez, M Imani, M Perry, C Diaz, M Wright Computer Security–ESORICS 2016: 21st European Symposium on Research in …, 2016 | 332 | 2016 |
Mockingbird: Defending Against Deep-Learning-Based Website Fingerprinting Attacks with Adversarial Traces M Imani, MS Rahman, N Matthews, M Wright IEEE Transactions on Information Forensics and Security, 2019 | 109 | 2019 |
Security enhanced routing protocol for ad hoc networks M Imani, M Taheri, M Naderi J Converg I (1) 3542, 2010 | 35 | 2010 |
Towards predicting efficient and anonymous Tor circuits A Barton, M Imani, M Wright, J Ming 27th {USENIX} Security Symposium ({USENIX} Security 18), 429-444, 2018 | 25 | 2018 |
The relationship between weight-efficacy of life style and overweight and obesity A Navidian, F Kermansaravi, M Imani IRANIAN JOURNAL OF ENDOCRINOLOGY AND METABOLISM (IJEM) 14 (666), 556-563, 2012 | 22 | 2012 |
Adversarial traces for website fingerprinting defense M Imani, MS Rahman, M Wright Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications …, 2018 | 21 | 2018 |
Modified relay selection and circuit selection for faster Tor M Imani, M Amirabadi, M Wright IET Communications 13 (17), 2723-2734, 2019 | 18 | 2019 |
Guard sets in tor using as relationships M Imani, A Barton, M Wright Proceedings on Privacy Enhancing Technologies (PoPETs) 2018 (1), 2018 | 17* | 2018 |
Refinement of AODV routing algorithm for wireless mesh networks (WMNs) M Imani, B Hassanabadi, M Naderi 2011 19th Iranian Conference on Electrical Engineering, 1-6, 2011 | 8 | 2011 |
Vulnerabilities in network layer at wireless mesh networks (WMNs) M Imani, M Taheri, ME Rajabi, M Naderi 2010 International Conference on Educational and Network Technology, 487-492, 2010 | 6 | 2010 |
A Novel Approach to Combine Misuse Detection and Anomaly Detection Using POMDP in Mobile Ad-Hoc Networks ME Rajabi, M Imani, M Taheri, M Naderi International Journal of Information and Electronics Engineering 5 (4), 245, 2015 | 2 | 2015 |
A secure method on a routing protocol for ad hoc networks M Imani, M Taheri, ME Rajabi, M Naderi 2010 International Conference on Educational and Network Technology, 482-486, 2010 | 2 | 2010 |
The evaluation of circuit selection methods on tor M Imani, M Amirabadi, M Wright arXiv preprint arXiv:1706.06457, 2017 | 1 | 2017 |
EFFICIENT MANAGEMENT OF COMPLEX ATTACK SURFACES W Huang, M Imani, Y Zhou US Patent 20,230,344,848, 2023 | | 2023 |
Network data timeline W Huang, Y Zhou, P Guo, M Imani US Patent US11245711B2, 2022 | | 2022 |
Improving Performance and Security in Anonymity Systems M Imani | | 2018 |
A Secure Routing Method on Wireless Mesh Sensor Networks (WMSNs) M Imani, HR Tavakoli, ME Rajabi, M Naderi International Journal of Information and Electronics Engineering 5 (4), 236, 2015 | | 2015 |
Secure Lightweight Routing Protocol with Confidentiality Redundancy in Wireless Ad Hoc Networks (SLRCR) M Taheri, M Imani, MM Hajikolaei, M Naderi International Journal of Information and Electronics Engineering 5 (4), 254, 2015 | | 2015 |
Vulnerabilities in network layer at wireless mesh networks (WMNs) M Imani, M Taheri, ME Rajabi, M Naderi 2010 International Conference on Educational and Network Technology, 0 | | |