Maede Ashouri-Talouki
University of Isfahan
H-index: 11
Asia-Iran
Top articles of Maede Ashouri-Talouki
Title | Journal | Author(s) | Publication Date |
---|---|---|---|
Privacy in Generative Models: Attacks and Defense Mechanisms | Maryam Azadmanesh Behrouz Shahgholi Ghahfarokhi Maede Ashouri Talouki | 2024/3/6 | |
An Auto-Encoder based Membership Inference Attack against Generative Adversarial Network. | ISeCure | Maryam Azadmanesh Behrouz Shahgholi Ghahfarokhi Maede Ashouri Talouki | 2023/7/1 |
ADAM-DPGAN: a differential private mechanism for generative adversarial network | Applied Intelligence | Maryam Azadmanesh Behrouz Sahgholi Ghahfarokhi Maede Ashouri Talouki | 2023/5 |
Hierarchical Deterministic Wallets for Secure Steganography in Blockchain. | ISeCure | Omid Torki Maede Ashouri-Talouki Mojtaba Mahdavi | 2023/1/1 |
Privacy, reputation, and incentive provision for vehicular social networks | Journal of Reliable Intelligent Environments | Sanaz Zamani Behrouz Tork Ladani Maede Ashouri Talouki | 2023/12 |
Privacy-Preserving Attribute-Based Access Control with Non-Monotonic Access Structure | IEEE Access | Kwangsoo Seol Young-Gab Kim Euijong Lee Young-Duk Seo Doo-Kwon Baik | 2018/2/5 |
On the local convergence of GANs with differential Privacy: Gradient clipping and noise perturbation | Expert Systems with Applications | Maryam Azadmanesh Behrouz Shahgholi Ghahfarokhi Maede Ashouri Talouki Hussein Eliasi | 2023/8/15 |
Optimal black-box traceability in decentralized attribute-based encryption | IEEE Transactions on Cloud Computing | Hassan Nasiraee Maede Ashouri-Talouki Ximeng Liu | 2022/9/28 |
Fully Verifiable Outsourcing of Single and Composite Modular Exponentiation with Single Untrusted Cloud Server | Omid Torki Hamid Mala Maede Ashouri-Talouki Hoda Alkhzaimi | 2022/8/24 | |
A white-box generator membership inference attack against generative models | Maryam Azadmanesh Behrouz Shahgholi Ghahfarokhi Maede Ashouri Talouki | 2021/9/1 | |
Privacy-preserving distributed data access control for cloudiot | IEEE Transactions on Dependable and Secure Computing | Hassan Nasiraee Maede Ashouri-Talouki | 2021/2/18 |
Blockchain for steganography: advantages, new algorithms and open challenges | Omid Torki Maede Ashouri-Talouki Mojtaba Mahdavi | 2021 | |
ISeCure | Bahram Rashidi Reza Rezaeian Farashahi Sayed Masoud Sayedi | 2015 | |
Multi-keyword ranked searchable encryption scheme with access control for cloud storage | Peer-to-Peer Networking and Applications | Maryam Zarezadeh Hamid Mala Maede Ashouri-Talouki | 2020/1 |
Anonymous decentralized attribute-based access control for cloud-assisted IoT | Future Generation Computer Systems | Hassan Nasiraee Maede Ashouri-Talouki | 2020/9/1 |
Attribute-based Access Control for Cloud-based Electronic Health Record (EHR) Systems. | ISeCure | Maryam Zarezadeh Maede Ashouri Taluki Mohammad Siavashi | 2020/6/1 |