H-Index & Metrics Top Publications
Ahmad-Reza Sadeghi

Ahmad-Reza Sadeghi

H-Index & Metrics

Discipline name H-index Citations Publications World Ranking National Ranking
Computer Science H-index 80 Citations 25,407 396 World Ranking 446 National Ranking 19

Overview

What is he best known for?

The fields of study he is best known for:

  • Operating system
  • Computer security
  • The Internet

His scientific interests lie mostly in Computer security, Embedded system, Cryptography, Software and Exploit. In his work, Access control and Internet privacy is strongly intertwined with Android, which is a subfield of Computer security. Ahmad-Reza Sadeghi combines subjects such as Scalability, Industrial control system, Isolation, Hardware security module and Enterprise information security architecture with his study of Embedded system.

The various areas that Ahmad-Reza Sadeghi examines in his Cryptography study include Physical unclonable function and Encryption. His Software research includes themes of Code injection, Scheme, Protocol and Direct Anonymous Attestation. Ahmad-Reza Sadeghi has researched Exploit in several fields, including Control flow, Mobile device and Code reuse.

His most cited work include:

  • Security and privacy challenges in industrial internet of things (462 citations)
  • Return-oriented programming without returns (401 citations)
  • Unsafe exposure analysis of mobile in-app advertisements (392 citations)

What are the main themes of his work throughout his whole career to date?

His primary areas of study are Computer security, Cryptography, Software, Embedded system and Computer network. As part of his studies on Computer security, Ahmad-Reza Sadeghi frequently links adjacent subjects like Internet privacy. His work deals with themes such as Theoretical computer science and Encryption, which intersect with Cryptography.

As part of his studies on Software, Ahmad-Reza Sadeghi often connects relevant areas like Exploit. His Trusted Computing study frequently draws connections between adjacent fields such as Trusted Platform Module. Access control and Android are frequently intertwined in his study.

He most often published in these fields:

  • Computer security (55.54%)
  • Cryptography (17.32%)
  • Software (11.61%)

What were the highlights of his more recent work (between 2017-2021)?

  • Computer security (55.54%)
  • Software (11.61%)
  • Computer network (11.43%)

In recent papers he was focusing on the following fields of study:

Ahmad-Reza Sadeghi mainly focuses on Computer security, Software, Computer network, Malware and Home automation. His Computer security study frequently links to adjacent areas such as Botnet. The Software study combines topics in areas such as Computer hardware, Threat model, State, Embedded system and Server.

The Cache research Ahmad-Reza Sadeghi does as part of his general Computer network study is frequently linked to other disciplines of science, such as Service provider, therefore creating a link between diverse domains of science. His Malware study also includes

  • Cyber-physical system, Industrial control system and Critical infrastructure most often made with reference to Testbed,
  • Security service that intertwine with fields like Scheme and Exploit. His Home automation research is multidisciplinary, incorporating elements of Detector, Transmission, The Internet and Multimedia.

Between 2017 and 2021, his most popular works were:

  • DÏoT: A Federated Self-learning Anomaly Detection System for IoT (90 citations)
  • DÏoT: A Crowdsourced Self-learning Approach for Detecting Compromised IoT Devices (37 citations)
  • Peek-a-Boo: I see your smart home activities, even encrypted! (35 citations)

In his most recent research, the most cited papers focused on:

  • Operating system
  • Computer security
  • The Internet

His primary scientific interests are in Computer security, Software, Malware, Home automation and Embedded system. The study incorporates disciplines such as User space, Variety and Profiling in addition to Computer security. His Software research is multidisciplinary, relying on both Overhead, Guard, Code, Hardware security module and Firmware.

The concepts of his Malware study are interwoven with issues in Security service, Scalability, Software deployment, Anomaly detection and Intrusion detection system. His research in Home automation intersects with topics in Proprietary protocol and Encryption. His Embedded system research incorporates elements of Dram, Cryptographic protocol, Denial-of-service attack and State.

This overview was generated by a machine learning system which analysed the scientist’s body of work. If you have any feedback, you can contact us here.

Top Publications

Security and privacy challenges in industrial internet of things

Ahmad-Reza Sadeghi;Christian Wachsmann;Michael Waidner.
design automation conference (2015)

616 Citations

Privilege escalation attacks on android

Lucas Davi;Alexandra Dmitrienko;Ahmad-Reza Sadeghi;Marcel Winandy.
international conference on information security (2010)

586 Citations

Return-oriented programming without returns

Stephen Checkoway;Lucas Davi;Alexandra Dmitrienko;Ahmad-Reza Sadeghi.
computer and communications security (2010)

576 Citations

Property-based attestation for computing platforms: caring about properties, not mechanisms

Ahmad-Reza Sadeghi;Christian Stüble.
new security paradigms workshop (2004)

558 Citations

Unsafe exposure analysis of mobile in-app advertisements

Michael C. Grace;Wu Zhou;Xuxian Jiang;Ahmad-Reza Sadeghi.
wireless network security (2012)

549 Citations

Just-In-Time Code Reuse: On the Effectiveness of Fine-Grained Address Space Layout Randomization

K. Z. Snow;F. Monrose;L. Davi;A. Dmitrienko.
ieee symposium on security and privacy (2013)

495 Citations

Towards Taming Privilege-Escalation Attacks on Android

Sven Bugiel;Lucas Davi;Alexandra Dmitrienko;Thomas Fischer.
network and distributed system security symposium (2012)

489 Citations

TASTY: tool for automating secure two-party computations

Wilko Henecka;Stefan K ögl;Ahmad-Reza Sadeghi;Thomas Schneider.
computer and communications security (2010)

410 Citations

Efficient privacy-preserving face recognition

Ahmad-Reza Sadeghi;Thomas Schneider;Immo Wehrenberg.
international conference on information security and cryptology (2009)

364 Citations

XManDroid: A New Android Evolution to Mitigate Privilege Escalation Attacks

Sven Bugiel;Lucas Davi;Alexandra Dmitrienko;Thomas Fischer.
(2011)

347 Citations

Profile was last updated on December 6th, 2021.
Research.com Ranking is based on data retrieved from the Microsoft Academic Graph (MAG).
The ranking h-index is inferred from publications deemed to belong to the considered discipline.

If you think any of the details on this page are incorrect, let us know.

Contact us

Top Scientists Citing Ahmad-Reza Sadeghi

Stefan Katzenbeisser

Stefan Katzenbeisser

University of Passau

Publications: 72

Mauro Conti

Mauro Conti

University of Padua

Publications: 52

Herbert Bos

Herbert Bos

Vrije Universiteit Amsterdam

Publications: 41

Nadarajah Asokan

Nadarajah Asokan

University of Waterloo

Publications: 40

Thomas Schneider

Thomas Schneider

TU Darmstadt

Publications: 37

Farinaz Koushanfar

Farinaz Koushanfar

University of California, San Diego

Publications: 36

Cristiano Giuffrida

Cristiano Giuffrida

Vrije Universiteit Amsterdam

Publications: 31

Robert H. Deng

Robert H. Deng

Singapore Management University

Publications: 30

Peng Liu

Peng Liu

Chinese Academy of Sciences

Publications: 30

Frank Piessens

Frank Piessens

KU Leuven

Publications: 29

Gene Tsudik

Gene Tsudik

University of California, Irvine

Publications: 29

Thorsten Holz

Thorsten Holz

Ruhr University Bochum

Publications: 29

Mauro Barni

Mauro Barni

University of Siena

Publications: 29

Ingrid Verbauwhede

Ingrid Verbauwhede

KU Leuven

Publications: 28

Elisa Bertino

Elisa Bertino

Purdue University West Lafayette

Publications: 27

Something went wrong. Please try again later.