default search action
Amin Hassanzadeh
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2022
- [i4]Minxue Tang, Jianyi Zhang, Mingyuan Ma, Louis DiValentin, Aolin Ding, Amin Hassanzadeh, Hai Helen Li, Yiran Chen:
FADE: Enabling Large-Scale Federated Adversarial Training on Resource-Constrained Edge Devices. CoRR abs/2209.03839 (2022) - 2021
- [j5]Kamrul Hasan, Sachin Shetty, Sharif Ullah, Amin Hassanzadeh, Tariqul Islam:
Criticality based Optimal Cyber Defense Remediation in Energy Delivery Systems. EAI Endorsed Trans. Security Safety 8(28): e5 (2021) - [c16]Jingwei Sun, Ang Li, Louis DiValentin, Amin Hassanzadeh, Yiran Chen, Hai Li:
FL-WBC: Enhancing Robustness against Model Poisoning Attacks in Federated Learning from a Client Perspective. NeurIPS 2021: 12613-12624 - [i3]Jingwei Sun, Ang Li, Louis DiValentin, Amin Hassanzadeh, Yiran Chen, Hai Li:
FL-WBC: Enhancing Robustness against Model Poisoning Attacks in Federated Learning from a Client Perspective. CoRR abs/2110.13864 (2021) - 2020
- [c15]Sharif Ullah, Sachin Shelly, Amin Hassanzadeh, Anup Nayak, Kamrul Hasan:
On the Effectiveness of Intrusion Response Systems against Persistent Threats. ICNC 2020: 415-421 - [i2]Amin Hassanzadeh, Amin Rasekh, Stefano Galelli, Mohsen Aghashahi, Riccardo Taormina, Avi Ostfeld, M. Katherine Banks:
A Review of Cybersecurity Incidents in the Water Sector. CoRR abs/2001.11144 (2020) - [i1]Nader Sehatbakhsh, Ellie Daw, Onur Savas, Amin Hassanzadeh, Ian McCulloh:
Security and Privacy Considerations for Machine Learning Models Deployed in the Government and Public Sector (white paper). CoRR abs/2010.05809 (2020)
2010 – 2019
- 2019
- [c14]Kamrul Hasan, Sachin Shetty, Sharif Ullah, Amin Hassanzadeh, Ethan Hadar:
Towards Optimal Cyber Defense Remediation in Energy Delivery Systems. GLOBECOM 2019: 1-7 - [c13]Kamrul Hasan, Sachin Shetty, Amin Hassanzadeh, Sharif Ullah:
Towards Optimal Cyber Defense Remediation in Cyber Physical Systems by Balancing Operational Resilience and Strategic Risk. MILCOM 2019: 1-8 - [c12]Ethan Hadar, Amin Hassanzadeh:
Big Data Analytics on Cyber Attack Graphs for Prioritizing Agile Security Requirements. RE 2019: 330-339 - [c11]Sharif Ullah, Sachin Shetty, Anup Nayak, Amin Hassanzadeh, Kamrul Hasan:
Cyber Threat Analysis Based on Characterizing Adversarial Behavior for Energy Delivery System. SecureComm (2) 2019: 146-160 - 2018
- [c10]Kamrul Hasan, Sachin Shetty, Amin Hassanzadeh, Malek Ben Salem, Jay Chen:
Self-Healing Cyber Resilient Framework for Software Defined Networking-Enabled Energy Delivery System. CCTA 2018: 1692-1697 - [c9]Kamrul Hasan, Sachin Shetty, Amin Hassanzadeh, Malek Ben Salem, Jay Chen:
Modeling Cost of Countermeasures in Software Defined Networking-enabled Energy Delivery Systems. CNS 2018: 1-9 - 2016
- [j4]Amin Hassanzadeh, Zhaoyan Xu, Radu Stoleru, Guofei Gu, Michalis Polychronakis:
PRIDE: A practical intrusion detection system for resource constrained wireless mesh networks. Comput. Secur. 62: 114-132 (2016) - 2015
- [c8]Amin Hassanzadeh, Shimon Modi, Shaan Mulchandani:
Towards effective security control assignment in the Industrial Internet of Things. WF-IoT 2015: 795-800 - 2014
- [j3]Amin Hassanzadeh, Ala Altaweel, Radu Stoleru:
Traffic-and-resource-aware intrusion detection in wireless mesh networks. Ad Hoc Networks 21: 18-41 (2014) - [j2]Amin Hassanzadeh, Radu Stoleru, Michalis Polychronakis, Geoffrey G. Xie:
RAPID: Traffic-agnostic intrusion detection for resource-constrained wireless mesh networks. Comput. Secur. 46: 1-17 (2014) - [c7]Amin Hassanzadeh, Radu Stoleru:
On the Attack-and-Fault Tolerance of Intrusion Detection Systems in Wireless Mesh Networks. ADHOC-NOW 2014: 387-401 - 2013
- [j1]Amin Hassanzadeh, Radu Stoleru:
On the optimality of cooperative intrusion detection for resource constrained wireless networks. Comput. Secur. 34: 16-35 (2013) - [c6]Amin Hassanzadeh, Zhaoyan Xu, Radu Stoleru, Guofei Gu, Michalis Polychronakis:
PRIDE: Practical Intrusion Detection in Resource Constrained Wireless Mesh Networks. ICICS 2013: 213-228 - 2011
- [c5]Amin Hassanzadeh, Radu Stoleru, Basem Shihada:
Energy Efficient Monitoring for Intrusion Detection in Battery-Powered Wireless Mesh Networks. ADHOC-NOW 2011: 44-57 - [c4]Amin Hassanzadeh, Radu Stoleru:
Towards Optimal Monitoring in Cooperative IDS for Resource Constrained Wireless Networks. ICCCN 2011: 1-8 - [c3]Amin Hassanzadeh, Radu Stoleru, Jianer Chen:
Efficient flooding in Wireless Sensor Networks secured with neighborhood keys. WiMob 2011: 119-126
2000 – 2009
- 2009
- [c2]Arshin Rezazadeh, Mahmood Fathy, Amin Hassanzadeh:
A Performance-Enhancing Fault-Tolerant Routing Algorithm for Network-on-Chip in Uniform Traffic. Asia International Conference on Modelling and Simulation 2009: 614-619 - 2008
- [c1]Amin Hassanzadeh, Babak Sadeghian:
Intrusion Detection with Data Correlation Relation Graph. ARES 2008: 982-989
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-04 20:02 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint