In Journals

         W. Zhang, L. Li, V. Cheong, B. Fu, and M. Aliasgari, Deep Encoder–Decoder Neural Networks for Retinal Blood Vessels Dense Prediction, International Journal of Computational Intelligence Systems, 14(1),  March 2021
    
        V. Balali, S. Fathi, and M. Aliasgari, Vector maps mobile application for sustainable eco-driving transportation route selection, Sustainability, 12(14), July 2020

        N. Miller, and M. Aliasgari, Benchmarks for Evaluating Anomaly Based Intrusion Detection Solutions, International Journal of Network Security & Its Applications (IJNSA) Vol. 10, No.5, September 2018   

        N. Yadav, M. Aliasgari, C. Azzara, and F. Keshtkar, Secure Mobile Automation of Ecological Momentary Assessments (EMA) For Structured Querying, EAI Endorsed Transactions on Ambient Systems, Vol. 18, No. 17, March 2018  

        M. Aliasgari, M. Blanton, and F. Bayatbabolghani, Secure Computation of Hidden Markov Models and Secure Floating-Point Arithmetic in the Malicious Model, International Journal of Information Security, Vol. 16, No. 6, pp 577-601, November 2017

        M. Aliasgari, G. Chan, and M. Mozumdar, IoT-1-Pass-Security: 1(One)-Pass Authenticated Key Agreement Protocol for Energy Constraint IoT Applications, International Journal On Smart Sensing and Intelligent Systems (S2IS), Vol. 9, No. 2, June 2016

        N. Yadav, M. Aliasgari and C. Poellabauer, Mobile Healthcare in an Increasingly Connected Developing World, International Journal of Privacy and Health Information Management (IJPHIM), Vol. 4 • Issue 2 • pp. 76-97, July 2016

        M. Mozumdar, M. Aliasgari, S. Venkata, S. Renduchintala, Ensuring Authentication and Security using Zero Knowledge Protocol for Wireless Sensor Network Applications, International Journal of Computing and Digital Systems (IJCDS), Vol. 5, Issue 3, April 2016

        M. Blanton and M. Aliasgari, Analysis of Reusability of Secure Sketches and Fuzzy Extractors, IEEE Transactions on Information Forensics and Security (TIFS), Vol. 8, No. 9, pp. 1433-1445, Sep. 2013

        M. Blanton and M. Aliasgari, Secure Outsourced Computation of Iris Matching, Journal of Computer Security, Vol. 20, No. 2-3, pp. 259-305, 2012

In Conference Proceedings

 
                Z. He, T. Miari, H.M. Makrani, M. Aliasgari, H. Homayoun,and H. Sayadi, When Machine Learning Meets Hardware Cybersecurity: Delving into Accurate Zero-Day Malware Detection, 22nd International Symposium on Quality Electronic Design (ISQED), April 2021

                M. Sami, M. Ibarra, A. C. Esparza, S. Al-Jufout, M. Aliasgari, and M. Mozumdar, Rapid, Multi-vehicle and Feed-forward Neural Network based Intrusion Detection System for Controller Area Network Bus, 2020 IEEE Green Energy and Smart Systems Conference (IGESSC), Dec. 2020
 
                B. Fu, J. Chao, M. Bittner, W. Zhang, and M. Aliasgari, Improving Fitness Levels of Individuals with Autism Spectrum Disorder:A Preliminary Evaluation of Real-Time Interactive Heart Rate Visualization to Motivate Engagement in Physical Activity, 17th International Conference on Computers Helping People with Special Needs(ICCHP), Sept. 2020

                H. Sayadi, H. Wang, T. Miari, H.M. Makrani, M. Aliasgari, S. Rafatirad, and H. Homayoun, Recent advancements in microarchitectural security: Review of machine learning countermeasures, IEEE 63rd International Midwest Symposium on Circuits and Systems (MWSCAS), August 2020

        M. Aliasgari, M. Black, N. Yadav, Security Vulnerabilities in Mobile Health Applications, IEEE Conference on Applications, Information & Network Security (AINS2018), Nov. 2018

        M. Aliasgari, N. Sabol, and A. Sharma, Sesame: A Secure and Convenient Mobile Solution for Passwords, Conference on Mobile and Secure Services (MobiSecServ'15), Feb. 2015

        M. Aliasgari and M. Blanton, Secure Computation of Hidden Markov Models, International Conference on Security and Cryptography (SECRYPT'13), Jul. 2013

        M. Blanton, A. Steele, and M. Aliasgari, Data-Oblivious Graph Algorithms for Secure Computation and Outsourcing, ACM Symposium on Information, Computer and Communications Security (ASIACCS'13), May 2013

        M. Aliasgari, M. Blanton, Y. Zhang, and A. Steele, Secure Computation on Floating Point Numbers, Network and Distributed System Security Symposuim (NDSS'13), Feb. 2013

        M. Blanton and M. Aliasgari, On the (Non-)Reusability of Fuzzy Sketches and Extractors and Security in the Computational Setting, International Conference on Security and Cryptography (SECRYPT'11), Jul. 2011

        M. Blanton and M. Aliasgari, Secure Outsourcing of DNA Searching via Finite Automata, Annual IFIP WG11.3 Working Conference on Data and Applications Security (DBSec'10), Jun. 2010

 

Selected Technical Reports

        M. Aliasgari, M.Blanton, Y.Zhang and A.Steele, Secure Computation on Floating Point Numbers,
Cryptology ePrint Archive, July 2012

M. Blanton and M. Aliasgari, Secure Computation of Biometric Matching, CSE Technical Report TR 2009-03, University of Notre Dame, Apr. 2009