I'm currently an Adjuncty Faculty at New York University (NYU), while working on state-of-the-art Recommender Systems at Google. I am an enthusiastic hands-on researcher/engineer with extensive experience in Machine Learning (ML) and Security & Privacy. My interests lie at the intersection of ML, Recommendation Systems, Information Security, and User Privacy.

Experience

New York University logo Adjunct Professor [2022-Present]
Department of Electrical and Computer Engineering, New York University (NYU)
Spring 2022: Advanced Machine Learning (ECE-GY 7123/CS-GY 6953: Deep Learning)

Google logo Software Engineer [2019-Present]
Google Search and Assistant, Google Inc

Princeton University logo ML Research Associate [2017-2019]
Princeton University

Purdue University logo ML Research Associate [2017-2019]
Purdue University

OpenFog Consortium (now combined with the IIC) logo Technical Advisor: ML for Distributed Applications [2016-2018 Part-time]
OpenFog Consortium (now combined with the IIC)

Princeton University logo Research Assistant (PhD Candidate): ML for Security & Privacy [2012-2016]
Princeton University

Image Processing Lab logo ML SWE/Researcher: ML for Medical Image Processing [2010-2012]
Image Processing Lab, Tehran, Iran

Education

Princeton University logoPh.D., Computer Engineering (2012-2016)
Advisor: Professor Niraj K Jha, Princeton University
Dissertation: Addressing Security and Privacy Challenges in IoT [ML for Security & Privacy]

Sharif University of Technology logoB.Sc., Computer Engineering (2008-2012)
Sharif University of Technology, Tehran

Publications   [Scholar]

  Got an award: 🎖
  Received major press coverage: 📸
  Among the journal's popular papers for 2+ years: ⭐

Books

  1. Smart Healthcare [Machine Learning and Security Challenges]   
    Hongxu Yin, Ozge Akmandor, A. Mosenia, and N. K. Jha

Journal Papers

  1. A Comprehensive Study of Security of Internet-of-Things ⭐
    A. Mosenia and N. K. Jha
    IEEE Trans. Emerging Topics in Computing (TETC)
  2. CABA: Continuous Authentication Based on BioAura 🎖 📸 ⭐
    A. Mosenia, S. Sur-Kolay, A. Raghunathan, and N. K. Jha
    IEEE Trans. Computers (TC)
  3. PinMe: Tracking a Smartphone User around the World 🎖 📸
    A. Mosenia, X. Dai, P. Mittal, and N. K. Jha
    IEEE Trans. Multi-Scale Computing Systems (TMSCS)
  4. Physiological Information Leakage: A New Frontier in Health Information Security   
    A. Mosenia, S. Sur-Kolay, A. Raghunathan, and N. K. Jha
    IEEE Trans. Emerging Topics in Computing (TETC)
  5. An Energy-efficient System for Long-term Continuous Personal Health Monitoring 🎖
    A. Mosenia, M. Mozaffari-Kermani, S. Sur-Kolay, A. Raghunathan, and N. K. Jha
    IEEE Trans. Multi-Scale Computing Systems (TMSCS)
  6. Wearable Medical Sensor-based System Design: A Survey ⭐
    A. Mosenia, S. Sur-Kolay, A. Raghunathan, and N. K. Jha
    IEEE Trans. Multi-Scale Computing Systems (TMSCS)
  7. DISASTER: Dedicated Intelligent Security Attacks against Sensor-triggered Emergency Responses
    A. Mosenia, S. Sur-Kolay, A. Raghunathan, and N. K. Jha
    IEEE Trans. Multi-Scale Computing Systems (TMSCS)
  8. OpSecure: A Secure Unidirectional Optical Channel for Implantable Medical Devices
    A. Mosenia and N. K. Jha
    IEEE Trans. Multi-Scale Computing Systems (TMSCS)

Conference Proceedings

  1. DARTS: Deceiving Autonomous Cars with Toxic Signs 📸  
    C Sitawarin, AN Bhagoji, A Mosenia, M Chiang, P Mittal
  2. OpenFog Security Requirements and Approaches  
    B. A. Martin, F. Michaud, D. Banks, A. Mosenia, R. Zolfonoon, S. Irwan, S. Schrecker, and J. K. Zao
    Fog World Congress
  3. Not All Pixels are Born Equal: An Analysis of Evasion Attacks under Locality Constraints  
    CV Sehwag, C Sitawarin, AN Bhagoji, A Mosenia, M Chiang, P Mittal
    ACM SIGSAC Conference on Computer and Communications
  4. ProCMotive: Bringing Programmability and Connectivity into Isolated Vehicles 🎖  
    A. Mosenia, J. F. Bechara, T. Zhang, P. Mittal, and M. Chiang
    ACM Int. Joint Conf. Pervasive and Ubiquitous Computing (Ubicomp'18)
  5. Artesian: Acoustic Denial of Service Attacks on HDDs 📸  
    M. Shahrad, A. Mosenia, L. Song, M. Chiang, D. Wentzlaff, and P. Mittal
    ACM Attacks and Solutions in Hardware Security
  6. Rogue Signs: Deceiving Traffic Sign Recognition with Malicious Ads and Logos 📸  
    C Sitawarin, AN Bhagoji, A Mosenia, M Chiang, P Mittal
  7. Anonymizing Masses: Practical Light-weight Anonymity at the Network Level  
    HM Moghaddam, A Mosenia

Teaching

  • Spring 2022: ECE-GY 7123: Advanced Machine Learning (Deep Learning), NYU
  • Spring 2016: ELE 464: Embedded Computing, Princeton University
  • Spring 2016: COS/ELE 432: Information Security, Princeton University
  • Fall 2013: COS 306/ELE 206: Contemporary Logic Design, Princeton University