Publications

  1. **Qin Yang$^{*}$**, *Meisam Mohammady$^{*}$*, Han Wang, Ali Payani, Ashish Kundu, Kai Shu, Yan Yan, Yuan Hong. LMO-DP: Optimizing the Randomization Mechanism for Differentially Private Fine-Tuning Language Models. To be presented at the 2024 International Conference on Machine Learning (ICML'24). *Equal Contribution (Co-First Authors).*
  2. **Shuya Feng$^{*}$**, *Meisam Mohammady$^{*}$*, Han Wang, Xiaochen Li, Zhan Qin, Yuan Hong. *DPI: Ensuring Strict Differential Privacy for Infinite Data Streaming*. The 45th IEEE Symposium on Security and Privacy (S\&P' 24). *Acceptance rate: $202/1389 \sim 14.5\%$. *Equal Contribution (Co-First Authors.*
  3. Pathum Chamikara Mahawaga Arachchige, Seung Ick Jang, Ian Oppermann, Dongxi Liu, Musotto Roberto, Sushmita Ruj, Arindam Pal, *Meisam Mohammady*, Seyit Camtepe, Sylvia Young, Chris Dorrian, Nasir David. *Towards Usability of Data with Privacy: A Unified Framework for Privacy-Preserving Data Sharing with High Utility*. The 24th Privacy Enhancing Technologies Symposium (PETS'24), *Acceptance rate: $55/284 \sim 19.1\%$.*
  4. Thirasara Ariyarathna, *Meisam Mohammady*, Hye-Young (Helen) Paik and Salil S Kanhere. *VLIA: Navigating Shadows with Proximity for Highly Accurate Visited Location Inference Attack against Federated Recommendation Models*. The 19th ACM ASIA Conference on Computer and Communications Security (ASIACCS'24). *Acceptance rate: $55/284 \sim 19\%$.*
  5. Thirasara Ariyarathna, *Meisam Mohammady*, Hye-Young (Helen) Paik and Salil S Kanhere. *User GPS Trajectory Reconstruction from Federated Route Recommendation Models*. ACM Transactions on Intelligent Systems and Technology (ACM TIST'24). *IF: 10.489.*
  6. Kane Walter, *Meisam Mohammady*, Surya Nepal, Salil S. Kanhere. *Mitigating Distributed Backdoor Attack in Federated Learning Through Mode Connectivity*. The 19th ACM ASIA Conference on Computer and Communications Security (ASIACCS'24). *Acceptance rate: $55/284 \sim 19\%$.*
  7. G Thedchanamoorthy, M Bewong, *M Mohammady*, TA Zia, MZ Islam. *Optimization of UD-LDP with statistical prior knowledge*. The 22nd International Conference on Pervasive Computing and Communications (PerCom 2024).*
  8. Kane Walter, *Meisam Mohammady*, Surya Nepal, Salil S. Kanhere. *Optimally Mitigating Backdoor Attacks in Federated Learning*. The IEEE Transactions on Dependable and Secure Computing (TDSC' 23) (IF: 7.3).*
  9. *Meisam Mohammady*, Reza Arablouei. *Efficient Privacy-Preserved Processing of Multimodal Data for Vehicular Traffic Analysis*. The 2023 Symposium on Vehicles Security and Privacy (VehicleSec'23).*
  10. *Meisam Mohammady*, Momen Oqaily, Lingyu Wang, Yuan Hong, Habib Louafi, Makan Pourzandi and Mourad Debbabi. *A Multi-view Approach to Preserve Both Privacy and Utility in Network Trace Anonymization.* ACM Transactions on Privacy and Security (TOPS) (formerly known as TISSEC), Published, 2020.*
  11. Shangyu Xie, *Meisam Mohammady*, Han Wang, Yuan Hong, Lingyu Wang, and Jaideep Vaidya. *Generalizing Prefix-Preserving Data Outsourcing: Ensuring both Privacy and Utility.* IEEE Transactions on Knowledge and Data Engineering (TKDE), Published , 2020.*
  12. *Meisam Mohammady*, Shangyu Xie, Yuan Hong, Mengyuan Zhang, Lingyu Wang, Makan Pourzandi, Mourad Debbabi. *R2DP: A Universal and Automated Approach to Optimizing the Randomization Mechanisms of Differential Privacy for Utility Metrics with No Known Optimal Distributions.* ACM Conference on Computer and Communications Security (CCS’ 20), Published, 2020 [Acceptance rate: 11\%].*
  13. Momen Oqaily, Yosr Jarrya, *Meisam Mohammady*, Suryadipta Majumdar, Lingyu Wang, Makan Pourzandi and Mourad Debbabi, *SegGuard: Protecting Audit Data Using Segmentation-based Anonymization for Multi-tenant Cloud Auditing.* IEEE Transactions on Dependable and Secure Computing (TDSC), Published, 2019 [impact factor: 6.864].*
  14. Bingyu Liu, Shangyu Xie, Han Wang, Yuan Hong, Xuegang Ban, *Meisam Mohammady*. *VTDP: Privately Sanitizing Fine-grained Vehicle Trajectory Data with Boosted Utility.* IEEE Transactions on Dependable and Secure Computing (TDSC), Published, 2019 [impact factor: 6.864].*
  15. Suryadipta Majumdar, Azadeh Tabiban, *Meisam Mohammady*, Alaa Oqaily, Yosr Jarraya, Makan Pourzandi, Lingyu Wang and Mourad Debbabi. *Proactivizer: Transforming Existing Verification Tools into Efficient Solutions for Runtime Security Enforcement.* In Proceedings of the 24th European Symposium on Research in Computer Security (ESORICS’ 19), Published, 2019, [Acceptance rate: 19.5%].*
  16. Suryadipta Majumdar, Azadeh Tabiban, *Meisam Mohammady*, Alaa Oqaily, Yosr Jarraya, Makan Pourzandi, Lingyu Wang and Mourad Debbabi. *Multi-Level Proactive Security Auditing for Clouds.* In Proceedings of the 2019 IEEE Conference on Dependable and Secure Computing (DSC’ 19), Published 2019.*
  17. *Meisam Mohammady*, Lingyu Wang, Yuan Hong, Habib Louafi, Makan Pourzandi and Mourad Debbabi. *Preserving Both Privacy and Utility in Network Trace Anonymization.* In Proceedings of the 25th ACM Conference on Computer and Communications Security (CCS’ 18), Published, 2018 [Acceptance rate: 16.5%].*
  18. Jerome Le Ny and *Meisam Mohammady*. *Differentially private MIMO filtering for event streams.* IEEE Transactions on Automatic Control, Published, 2018 [impact factor: 5.625].*
  19. Jerome Le Ny and *Meisam Mohammady*. *Differentially private MIMO filtering for event streams and spatio-temporal monitoring.* In Proceedings of the 53rd IEEE Conference on Decision and Control (CDC’ 14), Published, 2014 [H Index: 118].*

Patents

  1. Meisam Mohammady, Yosr Jarraya, Lingyu Wang, Mourad Debbabi and Makan Pourzandi. *Partition-based prefix preserving anonymization approach for network traces containing ip addresses.* US Patent App. 16/477,428, 2019, Published 2019.*
  2. Meisam Mohammady, Shangyu Xie, Yuan Hong, Mengyuan Zhang, Lingyu Wang, Makan Pourzandi and Mourad Debbabi. *R2DP: Randomizing the Randomization Parameters in Differentially Private Mechanisms.* US Patent, filed 2019.*
  3. Meisam Mohammady, Han Wang, Yuan Hong, Mengyuan Zhang, Suryaipta Majumdar, Lingyu Wang, Makan Pourzandi and Mourad Debbabi. *DPOD: Differentially Private Outsourcing of Anomaly Detection.* US Patent, Under Review, 2020.*