1 code implementation • 18 Sep 2023 • Alireza Bahramali, Ardavan Bozorgi, Amir Houmansadr
Our extensive open-world and close-world experiments demonstrate that under practical evaluation settings, our WF attacks provide superior performances compared to the state-of-the-art; this is due to their use of augmented network traces for training, which allows them to learn the features of target traffic in unobserved settings.
1 code implementation • 24 Jan 2023 • Mariyam Amir, Murchana Baruah, Mahsa Eslamialishah, Sina Ehsani, Alireza Bahramali, Sadra Naddaf-sh, Saman Zarandioon
In this paper, a new perspective is suggested for unsupervised Ontology Matching (OM) or Ontology Alignment (OA) by treating it as a translation task.
no code implementations • 1 Feb 2021 • Alireza Bahramali, Milad Nasr, Amir Houmansadr, Dennis Goeckel, Don Towsley
We show that in the presence of defense mechanisms deployed by the communicating parties, our attack performs significantly better compared to existing attacks against DNN-based wireless systems.
Adversarial Attack Cryptography and Security
1 code implementation • 16 Feb 2020 • Milad Nasr, Alireza Bahramali, Amir Houmansadr
Deep Neural Networks (DNNs) are commonly used for various traffic analysis problems, such as website fingerprinting and flow correlation, as they outperform traditional (e. g., statistical) techniques by large margins.
no code implementations • 22 Aug 2018 • Milad Nasr, Alireza Bahramali, Amir Houmansadr
Flow correlation is the core technique used in a multitude of deanonymization attacks on Tor.