Publications

Visibility-Aware GHOST: Mitigating Visibility Asymmetry in Subtree-Based Proof-of-Work Consensus
Time-Delayed Publicly Verifiable Quantum Computation with Classical Verifiers
Anonymous Command Authorization for IoT Devices Using Zero-Knowledge Proofs
Evaluating the Effectiveness of Q-Learning in Ant Colony Optimization for the Traveling Salesman Problem
An Empirical Eye-Tracking Study of Cross-Lingual Program Comprehension and Debugging
Quantum Federated Learning for Adaptive Intrusion Detection Systems in Software-Defined Networks
Competition-style Sorting Networks (CSN): A Framework for Hardware-based Sorting Operations
Vulnerability of Deep Forest to Adversarial Attacks
Evaluating the adversarial robustness of Arabic spam classifiers
Enhancing adversarial robustness with randomized interlayer processing
Evaluating Adversarial Robustness of Secret Key-Based Defenses
Deep forest model for diagnosing COVID-19 from routine blood tests
Incremental Deployment of Hybrid IP/SDN Network with Optimized Traffic Engineering
Ensemble learning model for diagnosing COVID-19 from routine blood tests
Fair and Privacy-Respecting Bitcoin Payments for Smart Grid Data
Universal Multi-party Poisoning Attacks
The Computational Complexity of Program Obfuscation
When does Functional Encryption Imply Obfuscation?
Lower Bounds on Indistinguishability Obfuscation from All-or-Nothing Encryption Primitives
On the Power of Hierarchical Identity-based Encryption
Cryptographic Applications of Learning with Errors