Publications

Quantum Federated Learning for Adaptive Intrusion Detection Systems in Software-Defined Networks
Competition-style Sorting Networks (CSN): A Framework for Hardware-based Sorting Operations
Vulnerability of Deep Forest to Adversarial Attacks
Evaluating the adversarial robustness of Arabic spam classifiers
Enhancing adversarial robustness with randomized interlayer processing
Evaluating Adversarial Robustness of Secret Key-Based Defenses
Deep forest model for diagnosing COVID-19 from routine blood tests
Incremental Deployment of Hybrid IP/SDN Network with Optimized Traffic Engineering
Ensemble learning model for diagnosing COVID-19 from routine blood tests
Fair and Privacy-Respecting Bitcoin Payments for Smart Grid Data
Universal Multi-party Poisoning Attacks
The Computational Complexity of Program Obfuscation
When does Functional Encryption Imply Obfuscation?
Lower Bounds on Indistinguishability Obfuscation from All-or-Nothing Encryption Primitives
On the Power of Hierarchical Identity-based Encryption
Lower Bounds on Assumptions Behind Indistinguishability Obfuscation
On the Impossibility of Virtual Black-Box Obfuscation in Idealized Models
Cryptographic Applications of Learning with Errors