Manaar Alam
Manaar Alam
Post-Doctoral Associate, New York University Abu Dhabi
Zweryfikowany adres z nyu.edu - Strona główna
Cytowane przez
Cytowane przez
A survey on adversarial attacks and defences
A Chakraborty, M Alam, V Dey, A Chattopadhyay, D Mukhopadhyay
CAAI Transactions on Intelligence Technology 6 (1), 25-45, 2021
Performance counters to rescue: A machine learning based safeguard against micro-architectural side-channel-attacks
M Alam, S Bhattacharya, D Mukhopadhyay, S Bhattacharya
Cryptology ePrint Archive, 2017
Rapper: Ransomware prevention via performance counters
S Sinha, M Alam, S Bhattacharya, D Mukhopadhyay, A Chattopadhyay, ...
Kangacrypt 2018, Adelaide, Australia, 2018
RATAFIA: ransomware analysis using time and frequency informed autoencoders
M Alam, S Bhattacharya, S Dutta, S Sinha, D Mukhopadhyay, ...
2019 IEEE International Symposium on Hardware Oriented Security and Trust …, 2019
NN-Lock: A Lightweight Authorization to Prevent IP Threats of Deep Learning Models
M Alam, S Saha, D Mukhopadhyay, S Kundu
ACM Journal on Emerging Technologies in Computing Systems (JETC) 18 (3), 1-19, 2022
How Secure are Deep Learning Algorithms from Side-Channel based Reverse Engineering?
M Alam, D Mukhopadhyay
Proceedings of the 56th Annual Design Automation Conference, 226:1--226:2, 2019
Transca: Cross-family profiled side-channel attacks using transfer learning on deep neural networks
D Thapar, M Alam, D Mukhopadhyay
Cryptology ePrint Archive, 2020
Deep learning based diagnostics for rowhammer protection of DRAM chips
A Chakraborty, M Alam, D Mukhopadhyay
2019 IEEE 28th Asian Test Symposium (ATS), 86-865, 2019
Howkgpt: Investigating the detection of chatgpt-generated university student homework through context-aware perplexity analysis
C Vasilatos, M Alam, T Rahwan, Y Zaki, M Maniatakos
arXiv preprint arXiv:2305.18226, 2023
Victims Can Be Saviors: A Machine Learning--based Detection for Micro-Architectural Side-Channel Attacks
M Alam, S Bhattacharya, D Mukhopadhyay
ACM Journal on Emerging Technologies in Computing Systems (JETC) 17 (2), 1-31, 2021
Deep learning assisted cross-family profiled side-channel attacks using transfer learning
D Thapar, M Alam, D Mukhopadhyay
2021 22nd International Symposium on Quality Electronic Design (ISQED), 178-185, 2021
Neural Network-based Inherently Fault-tolerant Hardware Cryptographic Primitives without Explicit Redundancy Checks
M Alam, A Bag, DB Roy, D Jap, J Breier, S Bhasin, D Mukhopadhyay
ACM Journal on Emerging Technologies in Computing Systems (JETC) 17 (1), 1-30, 2020
SmashClean: A hardware level mitigation to stack smashing attacks in OpenRISC
M Alam, DB Roy, S Bhattacharya, V Govindan, RS Chakraborty, ...
2016 ACM/IEEE International Conference on Formal Methods and Models for …, 2016
Learn from your faults: leakage assessment in fault attacks using deep learning
S Saha, M Alam, A Bag, D Mukhopadhyay, P Dasgupta
Journal of Cryptology 36 (3), 19, 2023
LAMBDA: Lightweight assessment of malware for emBeddeD architectures
SP Kadiyala, M Alam, Y Shrivastava, S Patranabis, MFB Abbas, ...
ACM Transactions on Embedded Computing Systems (TECS) 19 (4), 1-31, 2020
PerDoor: Persistent Backdoors in Federated Learning using Adversarial Perturbations
M Alam, E Sarkar, M Maniatakos
2023 IEEE International Conference on Omni-layer Intelligent Systems (COINS …, 2023
Get rid of your trail: Remotely erasing backdoors in federated learning
M Alam, H Lamri, M Maniatakos
arXiv preprint arXiv:2304.10638, 2023
TransNet: Shift Invariant Transformer Network for Side Channel Analysis
S Hajra, S Saha, M Alam, D Mukhopadhyay
International Conference on Cryptology in Africa, 371-396, 2022
A 0.16 pJ/bit recurrent neural network based PUF for enhanced machine learning attack resistance
N Shah, M Alam, DP Sahoo, D Mukhopadhyay, A Basu
Proceedings of the 24th Asia and South Pacific Design Automation Conference …, 2019
Customized instructions for protection against memory integrity attacks
DB Roy, M Alam, S Bhattacharya, V Govindan, F Regazzoni, ...
IEEE Embedded Systems Letters 10 (3), 91-94, 2018
Nie można teraz wykonać tej operacji. Spróbuj ponownie później.
Prace 1–20