Publications

In Journals

         W. Zhang, L. Li, V. Cheong, B. Fu, and M. Aliasgari, Deep Encoder–Decoder Neural Networks for Retinal Blood Vessels Dense Prediction, International Journal of Computational Intelligence Systems, 14(1),  March 2021
    
        V. Balali, S. Fathi, and M. Aliasgari, Vector maps mobile application for sustainable eco-driving transportation route selection, Sustainability, 12(14), July 2020

        N. Miller, and M. Aliasgari, Benchmarks for Evaluating Anomaly Based Intrusion Detection Solutions, International Journal of Network Security & Its Applications (IJNSA) Vol. 10, No.5, September 2018   

        N. Yadav, M. Aliasgari, C. Azzara, and F. Keshtkar, Secure Mobile Automation of Ecological Momentary Assessments (EMA) For Structured Querying, EAI Endorsed Transactions on Ambient Systems, Vol. 18, No. 17, March 2018  

        M. Aliasgari, M. Blanton, and F. Bayatbabolghani, Secure Computation of Hidden Markov Models and Secure Floating-Point Arithmetic in the Malicious Model, International Journal of Information Security, Vol. 16, No. 6, pp 577-601, November 2017

        M. Aliasgari, G. Chan, and M. Mozumdar, IoT-1-Pass-Security: 1(One)-Pass Authenticated Key Agreement Protocol for Energy Constraint IoT Applications, International Journal On Smart Sensing and Intelligent Systems (S2IS), Vol. 9, No. 2, June 2016

        N. Yadav, M. Aliasgari and C. Poellabauer, Mobile Healthcare in an Increasingly Connected Developing World, International Journal of Privacy and Health Information Management (IJPHIM), Vol. 4 • Issue 2 • pp. 76-97, July 2016

        M. Mozumdar, M. Aliasgari, S. Venkata, S. Renduchintala, Ensuring Authentication and Security using Zero Knowledge Protocol for Wireless Sensor Network Applications, International Journal of Computing and Digital Systems (IJCDS), Vol. 5, Issue 3, April 2016

        M. Blanton and M. Aliasgari, Analysis of Reusability of Secure Sketches and Fuzzy ExtractorsIEEE Transactions on Information Forensics and Security (TIFS), Vol. 8, No. 9, pp. 1433-1445, Sep. 2013

        M. Blanton and M. Aliasgari, Secure Outsourced Computation of Iris MatchingJournal of Computer Security, Vol. 20, No. 2-3, pp. 259-305, 2012

In Conference Proceedings

                R. Vishwakarma, R. Monani, A, Rezaei, H. Sayadi, \bfseries M. Aliasgari\normalfont, and A. Hedayatipour, Attacks on Continuous Chaos Communication and Remedies for Resource Limited Devices. 24th International Symposium on Quality Electronic Design (ISQED) (pp. 1-8). April 2023


                E. Troja, J. Debello, N. Yadav, \bfseries M. Aliasgari\normalfont, L. M. Truong, and J. Worden, Mitigating Autonomous Vehicle GPS Spoofing Attacks through Scene Text Observations, 56th Hawaii International Conference on System Sciences, (pp. 6706-6715), Jan. 2023


                G. Ding, Z. Li, Y. Wu, X. Yang, \bfseries M. Aliasgari\normalfont, and H. Xu, Towards an Efficient Client Selection System for Federated Learning, 15th International Conference on Cloud Computing-CLOUD, (pp. 13-21), Dec. 2022

                 H. Sayadi, M. Aliasgari, F. Aydin, S. Potluri, A. Aysu, J. Edmonds, and S. Tehranipoor, Towards AI-enabled Hardware Security: Challenges and Opportunities, 28th IEEE International Symposium on On-Line Testing and Robust System Design (IOLTS), Sept. 2022

                 A. Rezaei, A. Hedayatipour, H. Sayadi, M. Aliasgari, and Hai Zhou, Global Attack and Remedy on IC-Specific Logic Encryption, 2022 IEEE International Symposium on Hardware Oriented Security and Trust (HOST), June 2022


                 E. Troja, L. Truong, N. Yadav, A.C Bukhari, and M. Aliasgari, Personalized Outsourced Privacy-Preserving Database Updates for Crowd-Sensed Dynamic Spectrum Access, IEEE 21st Mediterranean Electrotechnical Conference (MELECON), June 2022


                N. Yadav, L. Truong, E. Troja, and M. Aliasgari , Machine Learning Architecture for Signature-Based IoT Intrusion Detection in Smart Energy Grids, IEEE 21st Mediterranean Electrotechnical Conference (MELECON), June 2022

                M. Aliasgari , B. Englert, and O. Morales-Ponce, Computing the Optimal Longest Queue Length in Torus Networks, International Conference on the Theory and Practice of Natural Computing, Dec. 2021

                A. Hedayatipour, R. Monani, A. Rezaei, M. Aliasgari , and H. Sayadi, A Comprehensive Analysis of Chaos-Based Secure Systems, Silicon Valley Cybersecurity Conference, Dec. 2021

                Y. Gao, H. M, Makrani, M. Aliasgari , A. Rezaei, J. Lin, H. Homayoun, and H. Sayadi, Adaptive-HMD: Accurate and Cost-Efficient Machine Learning-Driven Malware Detection using Microarchitectural Events, 2021 IEEE 27th International Symposium on On-Line Testing and Robust System Design (IOLTS), June 2021        

                Z. He, T. Miari, H.M. Makrani, M. Aliasgari, H. Homayoun,and H. Sayadi, When Machine Learning Meets Hardware Cybersecurity: Delving into Accurate Zero-Day Malware Detection, 22nd International Symposium on Quality Electronic Design (ISQED), April 2021

                M. Sami, M. Ibarra, A. C. Esparza, S. Al-Jufout, M. Aliasgari, and M. Mozumdar, Rapid, Multi-vehicle and Feed-forward Neural Network based Intrusion Detection System for Controller Area Network Bus, 2020 IEEE Green Energy and Smart Systems Conference (IGESSC), Dec. 2020
 
                B. Fu, J. Chao, M. Bittner, W. Zhang, and M. Aliasgari, Improving Fitness Levels of Individuals with Autism Spectrum Disorder:A Preliminary Evaluation of Real-Time Interactive Heart Rate Visualization to Motivate Engagement in Physical Activity, 17th International Conference on Computers Helping People with Special Needs(ICCHP), Sept. 2020

                H. Sayadi, H. Wang, T. Miari, H.M. Makrani, M. Aliasgari, S. Rafatirad, and H. Homayoun, Recent advancements in microarchitectural security: Review of machine learning countermeasures, IEEE 63rd International Midwest Symposium on Circuits and Systems (MWSCAS), August 2020

        M. Aliasgari, M. Black, N. Yadav, Security Vulnerabilities in Mobile Health Applications, IEEE Conference on Applications, Information & Network Security (AINS2018), Nov. 2018

        M. Aliasgari, N. Sabol, and A. Sharma, Sesame: A Secure and Convenient Mobile Solution for Passwords, Conference on Mobile and Secure Services (MobiSecServ'15), Feb. 2015

        M. Aliasgari and M. Blanton, Secure Computation of Hidden Markov ModelsInternational Conference on Security and Cryptography (SECRYPT'13), Jul. 2013

        M. Blanton, A. Steele, and M. Aliasgari, Data-Oblivious Graph Algorithms for Secure Computation and Outsourcing, ACM Symposium on Information, Computer and Communications Security (ASIACCS'13), May 2013

        M. Aliasgari, M. Blanton, Y. Zhang, and A. Steele, Secure Computation on Floating Point NumbersNetwork and Distributed System Security Symposuim (NDSS'13), Feb. 2013

        M. Blanton and M. Aliasgari, On the (Non-)Reusability of Fuzzy Sketches and Extractors and Security in the Computational SettingInternational Conference on Security and Cryptography (SECRYPT'11), Jul. 2011

        M. Blanton and M. Aliasgari, Secure Outsourcing of DNA Searching via Finite AutomataAnnual IFIP WG11.3 Working Conference on Data and Applications Security (DBSec'10), Jun. 2010

 

Selected Technical Reports

        M. Aliasgari, M.Blanton, Y.Zhang and A.Steele, Secure Computation on Floating Point Numbers,
Cryptology ePrint Archive, July 2012

M. Blanton and M. Aliasgari, Secure Computation of Biometric MatchingCSE Technical Report TR 2009-03, University of Notre Dame, Apr. 2009