Follow
Mohsen Imani
Mohsen Imani
Anomali Inc.
Verified email at mavs.uta.edu
Title
Cited by
Cited by
Year
Deep fingerprinting: Undermining website fingerprinting defenses with deep learning
P Sirinam, M Imani, M Juarez, M Wright
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications …, 2018
3212018
Toward an efficient website fingerprinting defense
M Juarez, M Imani, M Perry, C Diaz, M Wright
Computer Security–ESORICS 2016: 21st European Symposium on Research in …, 2016
2302016
Mockingbird: Defending Against Deep-Learning-Based Website Fingerprinting Attacks with Adversarial Traces
M Imani, MS Rahman, N Matthews, M Wright
IEEE Transactions on Information Forensics and Security, 2019
582019
Security enhanced routing protocol for ad hoc networks
M Imani, M Taheri, M Naderi
J Converg I (1) 3542, 2010
392010
Towards predicting efficient and anonymous Tor circuits
A Barton, M Imani, M Wright, J Ming
27th {USENIX} Security Symposium ({USENIX} Security 18), 429-444, 2018
172018
Adversarial traces for website fingerprinting defense
M Imani, MS Rahman, M Wright
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications …, 2018
162018
Modified relay selection and circuit selection for faster Tor
M Imani, M Amirabadi, M Wright
IET Communications 13 (17), 2723-2734, 2019
142019
Guard Sets in Tor using AS Relationships.
M Imani, A Barton, M Wright
Proc. Priv. Enhancing Technol. 2018 (1), 145-165, 2018
14*2018
Refinement of AODV routing algorithm for wireless mesh networks (WMNs)
M Imani, B Hassanabadi, M Naderi
2011 19th Iranian Conference on Electrical Engineering, 1-6, 2011
72011
Vulnerabilities in network layer at wireless mesh networks (WMNs)
M Imani, M Taheri, ME Rajabi, M Naderi
2010 International Conference on Educational and Network Technology, 487-492, 2010
62010
A Novel Approach to Combine Misuse Detection and Anomaly Detection Using POMDP in Mobile Ad-Hoc Networks
ME Rajabi, M Imani, M Taheri, M Naderi
International Journal of Information and Electronics Engineering 5 (4), 245, 2015
22015
A secure method on a routing protocol for ad hoc networks
M Imani, M Taheri, ME Rajabi, M Naderi
2010 International Conference on Educational and Network Technology, 482-486, 2010
22010
The evaluation of circuit selection methods on tor
M Imani, M Amirabadi, M Wright
arXiv preprint arXiv:1706.06457, 2017
12017
Network data timeline
MI Wei Huang, Yizheng Zhou, Peizhou Guo
US Patent US11245711B2, 2022
2022
Improving Performance and Security in Anonymity Systems
M Imani
2018
A Secure Routing Method on Wireless Mesh Sensor Networks (WMSNs)
M Imani, HR Tavakoli, ME Rajabi, M Naderi
International Journal of Information and Electronics Engineering 5 (4), 236, 2015
2015
Secure Lightweight Routing Protocol with Confidentiality Redundancy in Wireless Ad Hoc Networks (SLRCR)
M Taheri, M Imani, MM Hajikolaei, M Naderi
International Journal of Information and Electronics Engineering 5 (4), 254, 2015
2015
Vulnerabilities in network layer at wireless mesh networks (WMNs)
M Imani, M Taheri, ME Rajabi, M Naderi
2010 International Conference on Educational and Network Technology, 0
Poster: Experimental Evaluation of Website Fingerprinting using Deep Learning
P Sirinam, M Imani, M Wright
Poster: PredicTor: Predicting Fast Circuits For A Faster User Experience in Tor
A Barton, M Imani, M Wright, J Ming
The system can't perform the operation now. Try again later.
Articles 1–20