default search action
Hosein Mohammadi Makrani
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c29]Najmeh Nazari, Chongzhou Fang, Hosein Mohammadi Makrani, Behnam Omidi, Mahdi Eslamimehr, Setareh Rafatirad, Avesta Sasan, Hossein Sayadi, Khaled N. Khasawneh, Houman Homayoun:
Architectural Whispers: Robust Machine Learning Models Fingerprinting via Frequency Throttling Side-Channels. DAC 2024: 179:1-179:6 - [c28]Najmeh Nazari, Behnam Omidi, Chongzhou Fang, Hosein Mohammadi Makrani, Setareh Rafatirad, Avesta Sasan, Houman Homayoun, Khaled N. Khasawneh:
SpecScope: Automating Discovery of Exploitable Spectre Gadgets on Black-Box Microarchitectures. DATE 2024: 1-6 - [c27]Najmeh Nazari, Furi Xiang, Chongzhou Fang, Hosein Mohammadi Makrani, Aditya Puri, Kartik Patwari, Hossein Sayadi, Setareh Rafatirad, Chen-Nee Chuah, Houman Homayoun:
LLM-FIN: Large Language Models Fingerprinting Attack on Edge Devices. ISQED 2024: 1-6 - [c26]Hossein Sayadi, Zhangying He, Hosein Mohammadi Makrani, Houman Homayoun:
Intelligent Malware Detection based on Hardware Performance Counters: A Comprehensive Survey. ISQED 2024: 1-10 - [c25]Najmeh Nazari, Hosein Mohammadi Makrani, Chongzhou Fang, Hossein Sayadi, Setareh Rafatirad, Khaled N. Khasawneh, Houman Homayoun:
Forget and Rewire: Enhancing the Resilience of Transformer-based Models against Bit-Flip Attacks. USENIX Security Symposium 2024 - 2023
- [j3]Najmeh Nazari, Hosein Mohammadi Makrani, Chongzhou Fang, Behnam Omidi, Setareh Rafatirad, Hossein Sayadi, Khaled N. Khasawneh, Houman Homayoun:
Adversarial Attacks Against Machine Learning-Based Resource Provisioning Systems. IEEE Micro 43(5): 35-44 (2023) - 2022
- [c24]Zhangying He, Hosein Mohammadi Makrani, Setareh Rafatirad, Houman Homayoun, Hossein Sayadi:
Breakthrough to Adaptive and Cost-Aware Hardware-Assisted Zero-Day Malware Detection: A Reinforcement Learning-Based Approach. ICCD 2022: 231-238 - [c23]Hosein Mohammadi Makrani, Zhangying He, Setareh Rafatirad, Hossein Sayadi:
Accelerated Machine Learning for On-Device Hardware-Assisted Cybersecurity in Edge Platforms. ISQED 2022: 77-83 - 2021
- [b1]Hosein Mohammadi Makrani:
Applied Machine Learning for Resource Provisioning of Data-Intensive Applications on Scale-Out Platforms and Its Security Challenges. University of California, Davis, USA, 2021 - [j2]Hossein Sayadi, Yifeng Gao, Hosein Mohammadi Makrani, Jessica Lin, Paulo Cesar G. da Costa, Setareh Rafatirad, Houman Homayoun:
Towards Accurate Run-Time Hardware-Assisted Stealthy Malware Detection: A Lightweight, yet Effective Time Series CNN-Based Approach. Cryptogr. 5(4): 28 (2021) - [j1]Hosein Mohammadi Makrani, Hossein Sayadi, Najmeh Nazari, Sai Manoj Pudukotai Dinakarrao, Avesta Sasan, Tinoosh Mohsenin, Setareh Rafatirad, Houman Homayoun:
Adaptive Performance Modeling of Data-intensive Workloads for Resource Provisioning in Virtualized Environment. ACM Trans. Model. Perform. Evaluation Comput. Syst. 5(4): 18:1-18:24 (2021) - [c22]Najmeh Nazari Bavarsad, Hosein Mohammadi Makrani, Hossein Sayadi, Lawrence Landis, Setareh Rafatirad, Houman Homayoun:
HosNa: A DPC++ Benchmark Suite for Heterogeneous Architectures. ICCD 2021: 509-516 - [c21]Yifeng Gao, Hosein Mohammadi Makrani, Mehrdad Aliasgari, Amin Rezaei, Jessica Lin, Houman Homayoun, Hossein Sayadi:
Adaptive-HMD: Accurate and Cost-Efficient Machine Learning-Driven Malware Detection using Microarchitectural Events. IOLTS 2021: 1-7 - [c20]Zhangying He, Tahereh Miari, Hosein Mohammadi Makrani, Mehrdad Aliasgari, Houman Homayoun, Hossein Sayadi:
When Machine Learning Meets Hardware Cybersecurity: Delving into Accurate Zero-Day Malware Detection. ISQED 2021: 85-90 - [c19]Hosein Mohammadi Makrani, Hossein Sayadi, Najmeh Nazari, Khaled N. Khasawneh, Avesta Sasan, Setareh Rafatirad, Houman Homayoun:
Cloak & Co-locate: Adversarial Railroading of Resource Sharing-based Attacks on the Cloud. SEED 2021: 1-13 - [c18]Hosein Mohammadi Makrani, Hossein Sayadi, Najmeh Nazari, Houman Homayoun:
Security Threats in Cloud Rooted from Machine Learning-Based Resource Provisioning Systems. SVCC 2021: 22-32 - 2020
- [c17]Hossein Sayadi, Yifeng Gao, Hosein Mohammadi Makrani, Tinoosh Mohsenin, Avesta Sasan, Setareh Rafatirad, Jessica Lin, Houman Homayoun:
StealthMiner: Specialized Time Series Machine Learning for Run-Time Stealthy Malware Detection based on Microarchitectural Features. ACM Great Lakes Symposium on VLSI 2020: 175-180 - [c16]Hossein Sayadi, Han Wang, Tahereh Miari, Hosein Mohammadi Makrani, Mehrdad Aliasgari, Setareh Rafatirad, Houman Homayoun:
Recent Advancements in Microarchitectural Security: Review of Machine Learning Countermeasures. MWSCAS 2020: 949-952
2010 – 2019
- 2019
- [c15]Hosein Mohammadi Makrani, Hossein Sayadi, Tinoosh Mohsenin, Setareh Rafatirad, Avesta Sasan, Houman Homayoun:
XPPE: cross-platform performance estimation of hardware accelerators using machine learning. ASP-DAC 2019: 727-732 - [c14]Hossein Sayadi, Hosein Mohammadi Makrani, Sai Manoj Pudukotai Dinakarrao, Tinoosh Mohsenin, Avesta Sasan, Setareh Rafatirad, Houman Homayoun:
2SMaRT: A Two-Stage Machine Learning-Based Approach for Run-Time Specialized Hardware-Assisted Malware Detection. DATE 2019: 728-733 - [c13]Sai Manoj Pudukotai Dinakarrao, Hossein Sayadi, Hosein Mohammadi Makrani, Cameron Nowzari, Setareh Rafatirad, Houman Homayoun:
Lightweight Node-level Malware Detection and Network-level Malware Confinement in IoT Networks. DATE 2019: 776-781 - [c12]Hosein Mohammadi Makrani, Farnoud Farahmand, Hossein Sayadi, Sara Bondi, Sai Manoj Pudukotai Dinakarrao, Houman Homayoun, Setareh Rafatirad:
Pyramid: Machine Learning Framework to Estimate the Optimal Timing and Resource Usage of a High-Level Synthesis Design. FPL 2019: 397-403 - [c11]Mahmoud Namazi, Hosein Mohammadi Makrani, Zhi Tian, Setareh Rafatirad, Mohamad Hosein Akbari, Avesta Sasan, Houman Homayoun:
Mitigating the Performance and Quality of Parallelized Compressive Sensing Reconstruction Using Image Stitching. ACM Great Lakes Symposium on VLSI 2019: 219-224 - [i2]Hosein Mohammadi Makrani, Farnoud Farahmand, Hossein Sayadi, Sara Bondi, Sai Manoj Pudukotai Dinakarrao, Liang Zhao, Avesta Sasan, Houman Homayoun, Setareh Rafatirad:
Pyramid: Machine Learning Framework to Estimate the Optimal Timing and Resource Usage of a High-Level Synthesis Design. CoRR abs/1907.12952 (2019) - 2018
- [c10]Hosein Mohammadi Makrani, Hossein Sayadi, Sai Manoj P. D., Setareh Rafatirad, Houman Homayoun:
Compressive Sensing on Storage Data: An Effective Solution to Alleviate I/0 Bottleneck in Data- Intensive Workloads. ASAP 2018: 1-8 - [c9]Hosein Mohammadi Makrani, Setareh Rafatirad, Amir Houmansadr, Houman Homayoun:
Main-Memory Requirements of Big Data Applications on Commodity Server Platform. CCGrid 2018: 653-660 - [c8]Hosein Mohammadi Makrani, Hossein Sayadi, Devang Motwani, Han Wang, Setareh Rafatirad, Houman Homayoun:
Energy-aware and Machine Learning-based Resource Provisioning of In-Memory Analytics on Cloud. SoCC 2018: 517 - [c7]Katayoun Neshatpour, Hosein Mohammadi Makrani, Avesta Sasan, Hassan Ghasemzadeh, Setareh Rafatirad, Houman Homayoun:
Design Space Exploration for Hardware Acceleration of Machine Learning Applications in MapReduce. FCCM 2018: 221 - [c6]Hosein Mohammadi Makrani, Hossein Sayadi, Sai Manoj Pudukotai Dinakarrao, Setareh Rafatirad, Houman Homayoun:
A comprehensive memory analysis of data intensive workloads on server class architecture. MEMSYS 2018: 19-30 - [c5]Katayoun Neshatpour, Hosein Mohammadi Makrani, Avesta Sasan, Hassan Ghasemzadeh, Setareh Rafatirad, Houman Homayoun:
Architectural considerations for FPGA acceleration of machine learning applications in MapReduce. SAMOS 2018: 89-96 - [c4]Hossein Sayadi, Hosein Mohammadi Makrani, Onkar Randive, Sai Manoj Pudukotai Dinakarrao, Setareh Rafatirad, Houman Homayoun:
Customized Machine Learning-Based Hardware-Assisted Malware Detection in Embedded Devices. TrustCom/BigDataSE 2018: 1685-1688 - [i1]Hosein Mohammadi Makrani:
Storage and Memory Characterization of Data Intensive Workloads for Bare Metal Cloud. CoRR abs/1805.08332 (2018) - 2017
- [c3]Hosein Mohammadi Makrani, Shahab Tabatabaei, Setareh Rafatirad, Houman Homayoun:
Understanding the role of memory subsystem on performance and energy-efficiency of Hadoop applications. IGSC 2017: 1-6 - [c2]Hosein Mohammadi Makrani, Houman Homayoun:
MeNa: A memory navigator for modern hardware in a scale-out environment. IISWC 2017: 2-11 - [c1]Hosein Mohammadi Makrani, Houman Homayoun:
Memory requirements of hadoop, spark, and MPI based big data applications on commodity server class architectures. IISWC 2017: 112-113
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-02 21:26 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint