


default search action
Meisam Mohammady
Person information
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2025
- [j7]Gnanakumar Thedchanamoorthy, Michael Bewong, Meisam Mohammady, Tanveer A. Zia, Md Zahidul Islam:
UD-LDP: A Technique for optimally catalyzing user driven Local Differential Privacy. Future Gener. Comput. Syst. 166: 107712 (2025) - 2024
- [j6]Kane Walter
, Meisam Mohammady
, Surya Nepal
, Salil S. Kanhere
:
Optimally Mitigating Backdoor Attacks in Federated Learning. IEEE Trans. Dependable Secur. Comput. 21(4): 2949-2963 (2024) - [c11]Thirasara Ariyarathna
, Meisam Mohammady
, Hye-Young Paik
, Salil S. Kanhere
:
VLIA: Navigating Shadows with Proximity for Highly Accurate Visited Location Inference Attack against Federated Recommendation Models. AsiaCCS 2024 - [c10]Kane Walter
, Meisam Mohammady
, Surya Nepal
, Salil S. Kanhere
:
Mitigating Distributed Backdoor Attack in Federated Learning Through Mode Connectivity. AsiaCCS 2024 - [c9]Gnanakumar Thedchanamoorthy
, Michael Bewong
, Meisam Mohammady, Tanveer A. Zia
, Md Zahidul Islam
:
Optimization of UD-LDP with statistical prior knowledge. PerCom Workshops 2024: 25-30 - [c8]Shuya Feng, Meisam Mohammady, Han Wang, Xiaochen Li, Zhan Qin, Yuan Hong:
DPI: Ensuring Strict Differential Privacy for Infinite Data Streaming. SP 2024: 1009-1027 - [c7]Gnanakumar Thedchanamoorthy
, Michael Bewong
, Meisam Mohammady
, Tanveer A. Zia
, Md Zahidul Islam
:
FUD-LDP: Fully User Driven Local Differential Privacy. WISE (5) 2024: 74-83 - [i10]Qin Yang, Meisam Mohammady, Han Wang, Ali Payani, Ashish Kundu, Kai Shu, Yan Yan, Yuan Hong:
LMO-DP: Optimizing the Randomization Mechanism for Differentially Private Fine-Tuning (Large) Language Models. CoRR abs/2405.18776 (2024) - [i9]Shuya Feng, Meisam Mohammady, Hanbin Hong, Shenao Yan, Ashish Kundu, Binghui Wang, Yuan Hong:
Universally Harmonizing Differential Privacy Mechanisms for Federated Learning: Boosting Accuracy and Convergence. CoRR abs/2407.14710 (2024) - 2023
- [j5]Shangyu Xie
, Meisam Mohammady
, Han Wang
, Lingyu Wang
, Jaideep Vaidya
, Yuan Hong
:
A Generalized Framework for Preserving Both Privacy and Utility in Data Outsourcing. IEEE Trans. Knowl. Data Eng. 35(1): 1-15 (2023) - [i8]Meisam Mohammady, Reza Arablouei:
Efficient Privacy-Preserved Processing of Multimodal Data for Vehicular Traffic Analysis. CoRR abs/2302.09783 (2023) - [i7]M. A. P. Chamikara, Seung Ick Jang, Ian J. Oppermann, Dongxi Liu, Musotto Roberto, Sushmita Ruj, Arindam Pal, Meisam Mohammady, Seyit Camtepe, Sylvia Young, Chris Dorrian, Nasir David:
OptimShare: A Unified Framework for Privacy Preserving Data Sharing - Towards the Practical Utility of Data with Privacy. CoRR abs/2306.03379 (2023) - [i6]Shuya Feng, Meisam Mohammady, Han Wang, Xiaochen Li, Zhan Qin, Yuan Hong:
DPI: Ensuring Strict Differential Privacy for Infinite Data Streaming. CoRR abs/2312.04738 (2023) - 2022
- [c6]Shangyu Xie, Meisam Mohammady, Han Wang, Lingyu Wang, Jaideep Vaidya, Yuan Hong:
A Generalized Framework for Preserving Both Privacy and Utility in Data Outsourcing (Extended Abstract). ICDE 2022: 1549-1550 - [i5]Meisam Mohammady, Han Wang, Lingyu Wang, Mengyuan Zhang, Yosr Jarraya, Suryadipta Majumdar, Makan Pourzandi, Mourad Debbabi
, Yuan Hong:
DPOAD: Differentially Private Outsourcing of Anomaly Detection through Iterative Sensitivity Learning. CoRR abs/2206.13046 (2022) - [i4]Meisam Mohammady:
Randomized Privacy Budget Differential Privacy. CoRR abs/2209.01468 (2022) - 2021
- [j4]Momen Oqaily
, Yosr Jarraya, Meisam Mohammady
, Suryadipta Majumdar
, Makan Pourzandi, Lingyu Wang
, Mourad Debbabi
:
SegGuard: Segmentation-Based Anonymization of Network Data in Clouds for Privacy-Preserving Security Auditing. IEEE Trans. Dependable Secur. Comput. 18(5): 2486-2505 (2021) - [j3]Bingyu Liu, Shangyu Xie
, Han Wang
, Yuan Hong
, Xuegang Ban
, Meisam Mohammady
:
VTDP: Privately Sanitizing Fine-Grained Vehicle Trajectory Data With Boosted Utility. IEEE Trans. Dependable Secur. Comput. 18(6): 2643-2657 (2021) - [j2]Meisam Mohammady
, Momen Oqaily, Lingyu Wang, Yuan Hong, Habib Louafi, Makan Pourzandi, Mourad Debbabi
:
A Multi-view Approach to Preserve Privacy and Utility in Network Trace Anonymization. ACM Trans. Priv. Secur. 24(3): 14:1-14:36 (2021) - 2020
- [c5]Meisam Mohammady, Shangyu Xie, Yuan Hong
, Mengyuan Zhang
, Lingyu Wang, Makan Pourzandi, Mourad Debbabi
:
R2DP: A Universal and Automated Approach to Optimizing the Randomization Mechanisms of Differential Privacy for Utility Metrics with No Known Optimal Distributions. CCS 2020: 677-696 - [i3]Meisam Mohammady, Shangyu Xie, Yuan Hong, Mengyuan Zhang, Lingyu Wang, Makan Pourzandi, Mourad Debbabi:
R2DP: A Universal and Automated Approach to Optimizing the Randomization Mechanisms of Differential Privacy for Utility Metrics with No Known Optimal Distributions. CoRR abs/2009.09451 (2020)
2010 – 2019
- 2019
- [c4]Suryadipta Majumdar, Azadeh Tabiban, Meisam Mohammady, Alaa Oqaily, Yosr Jarraya, Makan Pourzandi, Lingyu Wang, Mourad Debbabi
:
Multi-Level Proactive Security Auditing for Clouds. DSC 2019: 1-8 - [c3]Suryadipta Majumdar, Azadeh Tabiban, Meisam Mohammady, Alaa Oqaily, Yosr Jarraya, Makan Pourzandi, Lingyu Wang, Mourad Debbabi
:
Proactivizer: Transforming Existing Verification Tools into Efficient Solutions for Runtime Security Enforcement. ESORICS (2) 2019: 239-262 - 2018
- [j1]Jerome Le Ny
, Meisam Mohammady
:
Differentially Private MIMO Filtering for Event Streams. IEEE Trans. Autom. Control. 63(1): 145-157 (2018) - [c2]Meisam Mohammady, Lingyu Wang, Yuan Hong
, Habib Louafi, Makan Pourzandi, Mourad Debbabi
:
Preserving Both Privacy and Utility in Network Trace Anonymization. CCS 2018: 459-474 - [i2]Meisam Mohammady, Lingyu Wang, Yuan Hong, Habib Louafi, Makan Pourzandi, Mourad Debbabi:
Preserving Both Privacy and Utility in Network Trace Anonymization. CoRR abs/1810.10464 (2018) - 2014
- [c1]Jerome Le Ny, Meisam Mohammady:
Differentially private MIMO filtering for event streams and spatio-temporal monitoring. CDC 2014: 2148-2153 - [i1]Jerome Le Ny, Meisam Mohammady:
Differentially Private MIMO Filtering for Event Streams and Spatio-Temporal Monitoring. CoRR abs/1407.5553 (2014)
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-02-21 19:33 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint