Hadi Ahmadi

Orcid: 0000-0002-9641-0033

According to our database1, Hadi Ahmadi authored at least 20 papers between 2009 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Flash: A Comprehensive Approach to Intrusion Detection via Provenance Graph Representation Learning.
Proceedings of the IEEE Symposium on Security and Privacy, 2024

2020
A learning-based metaheuristic for a multi-objective agile inspection planning model under uncertainty.
Eur. J. Oper. Res., 2020

2019
Graph Model Implementation of Attribute-Based Access Control Policies.
CoRR, 2019

A bio-inspired vestibular system using MEMS sensors and 3D printing technology.
Proceedings of the 13th International Conference on Sensing Technology, 2019

2014
Multipath Private Communication: An Information Theoretic Approach.
CoRR, 2014

Distance Lower Bounding.
Proceedings of the Information and Communications Security - 16th International Conference, 2014

Private Message Transmission Using Disjoint Paths.
Proceedings of the Applied Cryptography and Network Security, 2014

2013
Message transmission and key establishment: General equality for weak and strong capacities.
J. Inf. Secur. Appl., 2013

Secure Distance Bounding Verification using Physical-Channel Properties
CoRR, 2013

Detection of Algebraic Manipulation in the Presence of Leakage.
Proceedings of the Information Theoretic Security - 7th International Conference, 2013

2012
Information Theoretic Security over Physical-Layer Channels.
PhD thesis, 2012

Message Transmission and Key Establishment: Conditions for Equality of Weak and Strong Capacities.
Proceedings of the Foundations and Practice of Security - 5th International Symposium, 2012

2011
Common Randomness and Secret Key Capacities of Two-Way Channels.
Proceedings of the Information Theoretic Security - 5th International Conference, 2011

Secret Key Establishment over Noisy Channels.
Proceedings of the Foundations and Practice of Security, 2011

Secret Keys from Channel Noise.
Proceedings of the Advances in Cryptology - EUROCRYPT 2011, 2011

2010
Secret Key Agreement over a Pair of Independent Broadcast Channels
CoRR, 2010

New results on Secret Key Establishment over a pair of broadcast channels.
Proceedings of the International Symposium on Information Theory and its Applications, 2010

Secret key establishment over a pair of independent broadcast channels.
Proceedings of the International Symposium on Information Theory and its Applications, 2010

2009
The Formal Design Model of a Lift Dispatching System (LDS).
Int. J. Softw. Sci. Comput. Intell., 2009

Heuristic guess-and-determine attacks on stream ciphers.
IET Inf. Secur., 2009


  Loading...