Follow
Mohsen Imani
Mohsen Imani
Anomali Inc.
Verified email at mavs.uta.edu
Title
Cited by
Cited by
Year
Deep fingerprinting: Undermining website fingerprinting defenses with deep learning
P Sirinam, M Imani, M Juarez, M Wright
Proceedings of the 2018 ACM SIGSAC conference on computer and communications …, 2018
5142018
Toward an efficient website fingerprinting defense
M Juarez, M Imani, M Perry, C Diaz, M Wright
Computer Security–ESORICS 2016: 21st European Symposium on Research in …, 2016
3172016
Mockingbird: Defending Against Deep-Learning-Based Website Fingerprinting Attacks with Adversarial Traces
M Imani, MS Rahman, N Matthews, M Wright
IEEE Transactions on Information Forensics and Security, 2019
1042019
Security enhanced routing protocol for ad hoc networks
M Imani, M Taheri, M Naderi
J Converg I (1) 3542, 2010
352010
Towards predicting efficient and anonymous Tor circuits
A Barton, M Imani, M Wright, J Ming
27th {USENIX} Security Symposium ({USENIX} Security 18), 429-444, 2018
232018
The relationship between weight-efficacy of life style and overweight and obesity
A Navidian, F Kermansaravi, M Imani
IRANIAN JOURNAL OF ENDOCRINOLOGY AND METABOLISM (IJEM) 14 (666), 556-563, 2012
222012
Adversarial traces for website fingerprinting defense
M Imani, MS Rahman, M Wright
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications …, 2018
202018
Modified relay selection and circuit selection for faster Tor
M Imani, M Amirabadi, M Wright
IET Communications 13 (17), 2723-2734, 2019
182019
Guard sets in tor using as relationships
M Imani, A Barton, M Wright
Proceedings on Privacy Enhancing Technologies (PoPETs) 2018 (1), 2018
16*2018
Refinement of AODV routing algorithm for wireless mesh networks (WMNs)
M Imani, B Hassanabadi, M Naderi
2011 19th Iranian Conference on Electrical Engineering, 1-6, 2011
82011
Vulnerabilities in network layer at wireless mesh networks (WMNs)
M Imani, M Taheri, ME Rajabi, M Naderi
2010 International Conference on Educational and Network Technology, 487-492, 2010
62010
A Novel Approach to Combine Misuse Detection and Anomaly Detection Using POMDP in Mobile Ad-Hoc Networks
ME Rajabi, M Imani, M Taheri, M Naderi
International Journal of Information and Electronics Engineering 5 (4), 245, 2015
22015
A secure method on a routing protocol for ad hoc networks
M Imani, M Taheri, ME Rajabi, M Naderi
2010 International Conference on Educational and Network Technology, 482-486, 2010
22010
The evaluation of circuit selection methods on tor
M Imani, M Amirabadi, M Wright
arXiv preprint arXiv:1706.06457, 2017
12017
Network data timeline
MI Wei Huang, Yizheng Zhou, Peizhou Guo
US Patent US11245711B2, 2022
2022
Improving Performance and Security in Anonymity Systems
M Imani
2018
A Secure Routing Method on Wireless Mesh Sensor Networks (WMSNs)
M Imani, HR Tavakoli, ME Rajabi, M Naderi
International Journal of Information and Electronics Engineering 5 (4), 236, 2015
2015
Secure Lightweight Routing Protocol with Confidentiality Redundancy in Wireless Ad Hoc Networks (SLRCR)
M Taheri, M Imani, MM Hajikolaei, M Naderi
International Journal of Information and Electronics Engineering 5 (4), 254, 2015
2015
Vulnerabilities in network layer at wireless mesh networks (WMNs)
M Imani, M Taheri, ME Rajabi, M Naderi
2010 International Conference on Educational and Network Technology, 0
Poster: Experimental Evaluation of Website Fingerprinting using Deep Learning
P Sirinam, M Imani, M Wright
The system can't perform the operation now. Try again later.
Articles 1–20