default search action
Mohammad Hashemi
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j6]Dev M. Mehta, Mohammad Hashemi, Domenic Forte, Shahin Tajik, Fatemeh Ganji:
1/0 Shades of UC: Photonic Side-Channel Analysis of Universal Circuits. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2024(3): 574-602 (2024) - [j5]Dev M. Mehta, Mohammad Hashemi, David Selasi Koblah, Domenic Forte, Fatemeh Ganji:
Bake It Till You Make It Heat-induced Power Leakage from Masked Neural Networks. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2024(4): 569-609 (2024) - [c19]Mohammad Hashemi, Domenic Forte, Fatemeh Ganji:
Time Is Money, Friend! Timing Side-Channel Attack Against Garbled Circuit Constructions. ACNS (3) 2024: 325-354 - [c18]Mohammad Hashemi, Dev M. Mehta, Kyle Mitard, Shahin Tajik, Fatemeh Ganji:
FaultyGarble: Fault Attack on Secure Multiparty Neural Network Inference. FDTC 2024: 53-64 - [c17]Mohammad Hashemi, Shengbo Gong, Juntong Ni, Wenqi Fan, B. Aditya Prakash, Wei Jin:
A Comprehensive Survey on Graph Reduction: Sparsification, Coarsening, and Condensation. IJCAI 2024: 8058-8066 - [c16]Mohammad Hashemi, Seyedeh Somayeh Salehi Komamardakhi, Mohammad Maftoun, Omid Zare, Javad Hassannataj Joloudari, Mohammad Ali Nematollahi, Roohallah Alizadehsani, Pietro Sala, Juan Manuel Górriz:
Enhancing Coronary Artery Disease Classification Using Optimized MLP Based on Genetic Algorithm. IWINAC 2024: 108-117 - [c15]Hajar Homayouni, Maryam Mary Pourebadi, Steven T. Nguyen, Mohammad Hashemi, Hossein Shirazi:
Comprehensive Functional ETL Testing Methodologies for Real-World Data. QRS Companion 2024: 11-20 - [i12]Mohammad Hashemi, Shengbo Gong, Juntong Ni, Wenqi Fan, B. Aditya Prakash, Wei Jin:
A Comprehensive Survey on Graph Reduction: Sparsification, Coarsening, and Condensation. CoRR abs/2402.03358 (2024) - [i11]Dev M. Mehta, Mohammad Hashemi, Domenic Forte, Shahin Tajik, Fatemeh Ganji:
1/0 Shades of UC: Photonic Side-Channel Analysis of Universal Circuits. IACR Cryptol. ePrint Arch. 2024: 72 (2024) - [i10]Mohammad Hashemi, Dev M. Mehta, Kyle Mitard, Shahin Tajik, Fatemeh Ganji:
FaultyGarble: Fault Attack on Secure Multiparty Neural Network Inference. IACR Cryptol. ePrint Arch. 2024: 980 (2024) - 2023
- [j4]Armin Salimi-Badr, Mohammad Hashemi, Hamidreza Saffari:
A type-2 neuro-fuzzy system with a novel learning method for Parkinson's disease diagnosis. Appl. Intell. 53(12): 15656-15682 (2023) - [j3]Mohammad J. Hashemi, Eric Keller, Saeid Tizpaz-Niari:
Detecting Unseen Anomalies in Network Systems by Leveraging Neural Networks. IEEE Trans. Netw. Serv. Manag. 20(3): 2515-2528 (2023) - [c14]Ahmad Biniaz, Mohammad Hashemi:
City Guarding with Cameras of Bounded Field of View. CCCG 2023: 71-76 - [i9]Mohammad Hashemi, Domenic Forte, Fatemeh Ganji:
Time is money, friend! Timing Side-channel Attack against Garbled Circuit Constructions. IACR Cryptol. ePrint Arch. 2023: 1 (2023) - [i8]Dev M. Mehta, Mohammad Hashemi, David Selasi Koblah, Domenic Forte, Fatemeh Ganji:
Bake It Till You Make It: Heat-induced Leakage from Masked Neural Networks. IACR Cryptol. ePrint Arch. 2023: 76 (2023) - 2022
- [c13]Mohammad Hashemi, Steffi Roy, Fatemeh Ganji, Domenic Forte:
Garbled EDA: Privacy Preserving Electronic Design Automation. ICCAD 2022: 156:1-156:9 - [c12]Mohammad Hashemi, Steffi Roy, Domenic Forte, Fatemeh Ganji:
HWGN2: Side-Channel Protected NNs Through Secure and Private Function Evaluation. SPACE 2022: 225-248 - [i7]Mohammad Hashemi, Steffi Roy, Domenic Forte, Fatemeh Ganji:
HWGN2: Side-channel Protected Neural Networks through Secure and Private Function Evaluation. CoRR abs/2208.03806 (2022) - [i6]Mohammad Hashemi, Steffi Roy, Fatemeh Ganji, Domenic Forte:
Garbled EDA: Privacy Preserving Electronic Design Automation. CoRR abs/2208.03822 (2022) - 2021
- [j2]Tahoura Mosavirik, Mohammad Hashemi, Mohammad Soleimani, Vahid Nayyeri, Omar M. Ramahi:
Accuracy-Improved and Low-Cost Material Characterization Using Power Measurement and Artificial Neural Network. IEEE Trans. Instrum. Meas. 70: 1-9 (2021) - [i5]Mohammad Hashemi, Bijan Alizadeh:
FPGA-based Implementation of a New Data Frame Correction System for Merging Units. CoRR abs/2108.11886 (2021) - [i4]Armin Salimi-Badr, Mohammad Hashemi, Hamidreza Saffari:
Parkinson's Disease Diagnosis based on Gait Cycle Analysis Through an Interpretable Interval Type-2 Neuro-Fuzzy System. CoRR abs/2109.02442 (2021) - 2020
- [j1]Hafez Razmazma, Ali Ebrahimi, Mohammad Hashemi:
Structural insights for rational design of new PIM-1 kinase inhibitors based on 3, 5-disubstituted indole derivatives: An integrative computational approach. Comput. Biol. Medicine 118: 103641 (2020) - [c11]Mohammad J. Hashemi, Eric Keller:
General Domain Adaptation Through Proportional Progressive Pseudo Labeling. IEEE BigData 2020: 155-162 - [c10]Mohammad J. Hashemi, Eric Keller:
Enhancing Robustness Against Adversarial Examples in Network Intrusion Detection Systems. NFV-SDN 2020: 37-43 - [i3]Mohammad J. Hashemi, Eric Keller:
Enhancing Robustness Against Adversarial Examples in Network Intrusion Detection Systems. CoRR abs/2008.03677 (2020) - [i2]Mohammad J. Hashemi, Eric Keller:
General Domain Adaptation Through Proportional Progressive Pseudo Labeling. CoRR abs/2012.13028 (2020)
2010 – 2019
- 2019
- [b1]Mohammad Hashemi:
Baran: a service-oriented cloud-based user monitoring and data analysis framework. University College Cork, Republic of Ireland, 2019 - [c9]Mohammad J. Hashemi, Greg Cusack, Eric Keller:
Towards Evaluation of NIDSs in Adversarial Setting. Big-DAMA@CoNEXT 2019: 14-21 - [c8]Azzam Alsudais, Mohammad Hashemi, Zhe Huang, Bharath Balasubramanian, Shankaranarayanan Puzhavakath Narayanan, Eric Keller, Kaustubh Joshi:
FOCUS: Scalable Search Over Highly Dynamic Geo-distributed State. ICDCS 2019: 2134-2144 - 2018
- [c7]Mohammad Hashemi, Greg Cusack, Eric Keller:
Stochastic Substitute Training: A Gray-box Approach to Craft Adversarial Examples Against Gradient Obfuscation Defenses. AISec@CCS 2018: 25-36 - [i1]Mohammad Hashemi, Greg Cusack, Eric Keller:
Stochastic Substitute Training: A Gray-box Approach to Craft Adversarial Examples Against Gradient Obfuscation Defenses. CoRR abs/1810.10031 (2018) - 2016
- [c6]Mohammad Hashemi, John Herbert:
Child-centred design supported by comprehensive child application use analysis. IDC 2016: 707-712 - [c5]Mohammad Hashemi, John Herbert:
A Next Application Prediction Service Using the BaranC Framework. COMPSAC 2016: 519-523 - [c4]Mohammad Hashemi, John Herbert:
A Service-Oriented User Interaction Analysis Framework Supporting Adaptive Applications. COMPSAC Workshops 2016: 546-551 - [c3]Mohammad Hashemi, John Herbert:
User interaction monitoring and analysis framework. MOBILESoft 2016: 7-8 - [c2]Mohammad Hashemi, John Herbert:
A pro-active and dynamic prediction assistance using BaranC framework. MOBILESoft 2016: 269-270 - 2015
- [c1]Mohammad Hashemi, John Herbert:
Baran: An Interaction-centred User Monitoring Framework. PhyCS 2015: 52-60
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-10 21:45 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint