Hossein Pishro-Nik

Orcid: 0000-0002-7249-2548

According to our database1, Hossein Pishro-Nik authored at least 116 papers between 2002 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Tiny Graph Neural Networks for Radio Resource Management.
CoRR, 2024

Optimal Obfuscation to Protect Client Privacy in Federated Learning.
Proceedings of the 58th Annual Conference on Information Sciences and Systems, 2024

2023
Location Privacy Protection for UAVs in Package Delivery and IoT Data Collection.
IEEE Internet Things J., 2023

Path Planning for Unmanned Aerial Vehicles: Peak Power Minimization.
Proceedings of the 97th IEEE Vehicular Technology Conference, 2023

Deployment of a UAV-Based Fire Detection System.
Proceedings of the 97th IEEE Vehicular Technology Conference, 2023

Private UAV-Assisted IoT Data Collection: An Energy-Privacy Trade-off.
Proceedings of the 20th Annual International Conference on Privacy, Security and Trust, 2023

2022
Superstring-Based Sequence Obfuscation to Thwart Pattern Matching Attacks.
IEEE Internet Things J., 2022

Energy-Optimized Path Planning for Moving Aerial Base Stations: A Non User-Oriented Framework.
IEEE Commun. Lett., 2022

A Search and Detection Autonomous Drone System: from Design to Implementation.
CoRR, 2022

Quantization Rate and AoI-Induced Distortion Trade-off Analysis with Application to Remote Agents.
Proceedings of the IEEE Wireless Communications and Networking Conference, 2022

Asymmetric Change-of-Probability Measures for Tail Risk Management.
Proceedings of the IEEE International Systems Conference, 2022

Privacy-Preserving Path-Planning for UAVs.
Proceedings of the International Symposium on Networks, Computers and Communications, 2022

Constrained Obfuscation to Thwart Pattern Matching Attacks.
Proceedings of the IEEE International Symposium on Information Theory, 2022

2021
Multi-Purpose Drones for Coverage and Transport Applications.
IEEE Trans. Wirel. Commun., 2021

Asymptotic Privacy Loss Due to Time Series Matching of Dependent Users.
IEEE Commun. Lett., 2021

UAV Trajectories for Uniform Coverage in Convex Regions.
Proceedings of the 93rd IEEE Vehicular Technology Conference, 2021

Path-Preserving Anonymization for Inter-domain Routing Policies.
Proceedings of the Risks and Security of Internet and Systems, 2021

2020
Leveraging Prior Knowledge Asymmetries in the Design of Location Privacy-Preserving Mechanisms.
IEEE Wirel. Commun. Lett., 2020

Optimal Altitude Selection of Aerial Base Stations to Maximize Coverage and Energy Harvesting Probabilities: A Stochastic Geometry Analysis.
IEEE Trans. Veh. Technol., 2020

Privacy of Dependent Users Against Statistical Matching.
IEEE Trans. Inf. Theory, 2020

Resource Management and Admission Control for Tactile Internet in Next Generation of Radio Access Network.
IEEE Access, 2020

A Framework for Probabilistic Decision-Making Using Change-of-Probability Measures.
IEEE Access, 2020

Unmanned Aerial Vehicles for Package Delivery and Network Coverage.
Proceedings of the 91st IEEE Vehicular Technology Conference, 2020

Cloud-based Queuing Model for Tactile Internet in Next Generation of RAN.
Proceedings of the 91st IEEE Vehicular Technology Conference, 2020

Sequence Obfuscation to Thwart Pattern Matching Attacks.
Proceedings of the IEEE International Symposium on Information Theory, 2020

2019
Moving Aerial Base Station Networks: A Stochastic Geometry Analysis and Design Perspective.
IEEE Trans. Wirel. Commun., 2019

Matching Anonymized and Obfuscated Time Series to Users' Profiles.
IEEE Trans. Inf. Theory, 2019

Multi-Purpose Aerial Drones for Network Coverage and Package Delivery.
CoRR, 2019

Resource Management and Admission Control for Tactile Internet in Next Generation of RAN.
CoRR, 2019

Joint Dynamic Pricing and Radio Resource Allocation Framework for IoT Services.
CoRR, 2019

Robust Physical Layer Security for Power Domain Non-Orthogonal Multiple Access-Based HetNets and HUDNs: SIC Avoidance at Eavesdroppers.
IEEE Access, 2019

Asymptotic Loss in Privacy due to Dependency in Gaussian Traces.
Proceedings of the 2019 IEEE Wireless Communications and Networking Conference, 2019

Asymptotic Limits of Privacy in Bayesian Time Series Matching.
Proceedings of the 53rd Annual Conference on Information Sciences and Systems, 2019

Improving Privacy in Graphs Through Node Addition.
Proceedings of the 57th Annual Allerton Conference on Communication, 2019

Revisiting utility metrics for location privacy-preserving mechanisms.
Proceedings of the 35th Annual Computer Security Applications Conference, 2019

2018
A New Multiple Access Technique for 5G: Power Domain Sparse Code Multiple Access (PSMA).
IEEE Access, 2018

Stochastic geometry based pricing for infrastructure sharing in IoT networks.
Proceedings of the 2018 IEEE Wireless Communications and Networking Conference, 2018

Privacy Against Statistical Matching: Inter-User Correlation.
Proceedings of the 2018 IEEE International Symposium on Information Theory, 2018

Trajectory Processes that Preserve Uniformity: A Stochastic Geometry Perspective.
Proceedings of the 2018 IEEE International Symposium on Information Theory, 2018

Statistical matching in the presence of anonymization and obfuscation: Non-asymptotic results in the discrete case.
Proceedings of the 52nd Annual Conference on Information Sciences and Systems, 2018

Privacy against matching under anonymization and obfuscation in the Gaussian case.
Proceedings of the 52nd Annual Conference on Information Sciences and Systems, 2018

Fundamental Limits in Detecting Whether a Signal Has Been Quantized.
Proceedings of the 52nd Asilomar Conference on Signals, Systems, and Computers, 2018

2017
Improving Safety on Highways by Customizing Vehicular Ad Hoc Networks.
IEEE Trans. Wirel. Commun., 2017

Achieving Perfect Location Privacy in Wireless Devices Using Anonymization.
IEEE Trans. Inf. Forensics Secur., 2017

Energy-Efficient Secrecy in Wireless Networks Based on Random Jamming.
IEEE Trans. Commun., 2017

Acceptable range of spatial density in an ad hoc network of UAVs.
Proceedings of the 28th IEEE Annual International Symposium on Personal, 2017

PSMA for 5G: Network throughput analysis.
Proceedings of the 28th IEEE Annual International Symposium on Personal, 2017

Limits of location privacy under anonymization and obfuscation.
Proceedings of the 2017 IEEE International Symposium on Information Theory, 2017

Fundamental limits of location privacy using anonymization.
Proceedings of the 51st Annual Conference on Information Sciences and Systems, 2017

Bayesian time series matching and privacy.
Proceedings of the 51st Asilomar Conference on Signals, Systems, and Computers, 2017

2016
Energy-Efficient Routing in Wireless Networks in the Presence of Jamming.
IEEE Trans. Wirel. Commun., 2016

Achieving perfect location privacy in Markov models using anonymization.
Proceedings of the 2016 International Symposium on Information Theory and Its Applications, 2016

Characterizing successful packet transmission in a Vehicular Ad Hoc Network.
Proceedings of the IEEE Conference on Computer Communications Workshops, 2016

A new approach to customization of accident warning systems to individual drivers.
Proceedings of the IEEE Conference on Cognitive and Computational Aspects of Situation Management, 2016

Packet success probability derivation in a vehicular ad hoc network for a highway scenario.
Proceedings of the 2016 Annual Conference on Information Science and Systems, 2016

Defining perfect location privacy using anonymization.
Proceedings of the 2016 Annual Conference on Information Science and Systems, 2016

2015
Jamming Based on an Ephemeral Key to Obtain Everlasting Security in Wireless Environments.
IEEE Trans. Wirel. Commun., 2015

Driver-based adaptation of Vehicular Ad Hoc Networks for design of active safety systems.
Proceedings of the 49th Annual Conference on Information Sciences and Systems, 2015

2014
Minimum Energy Routing in Wireless Networks in the Presence of Jamming.
CoRR, 2014

A New Approach to Customization of Collision Warning Systems to Individual Drivers.
CoRR, 2014

Real-time estimation of the distribution of brake response times for an individual driver using Vehicular Ad Hoc Network.
Proceedings of the 2014 IEEE Intelligent Vehicles Symposium Proceedings, 2014

Jamming-aware minimum energy routing in wireless networks.
Proceedings of the IEEE International Conference on Communications, 2014

On the impact of dynamic jamming on end-to-end delay in linear wireless networks.
Proceedings of the 48th Annual Conference on Information Sciences and Systems, 2014

Everlasting secrecy in disadvantaged wireless environments against sophisticated eavesdroppers.
Proceedings of the 48th Asilomar Conference on Signals, Systems and Computers, 2014

2013
Results on finite wireless sensor networks: Connectivity and coverage.
ACM Trans. Sens. Networks, 2013

On Finite-Length Performance of Polar Codes: Stopping Sets, Error Floor, and Concatenated Design.
IEEE Trans. Commun., 2013

Everlasting Secrecy by Exploiting Non-Idealities of the Eavesdropper's Receiver.
IEEE J. Sel. Areas Commun., 2013

Analytic Design of Active Safety Systems for Vehicular Ad hoc Networks.
IEEE J. Sel. Areas Commun., 2013

Artificial intersymbol interference (ISI) to exploit receiver imperfections for secrecy.
Proceedings of the 2013 IEEE International Symposium on Information Theory, 2013

Tuning collision warning algorithms to individual drivers for design of active safety systems.
Proceedings of the Workshops Proceedings of the Global Communications Conference, 2013

2012
Throughput Scaling Laws for Vehicular Ad Hoc Networks.
IEEE Trans. Wirel. Commun., 2012

On Generalized EXIT charts of LDPC code ensembles over binary-input output-symmetric memoryless channels.
Proceedings of the 2012 IEEE International Symposium on Information Theory, 2012

Physical layer security from inter-session interference in large wireless networks.
Proceedings of the IEEE INFOCOM 2012, Orlando, FL, USA, March 25-30, 2012, 2012

Cyber-Physical Integration to Connect Vehicles for Transformed Transportation Safety and Efficiency.
Proceedings of the Advanced Research in Applied Artificial Intelligence, 2012

Exploiting the non-commutativity of nonlinear operators for information-theoretic security in disadvantaged wireless environments.
Proceedings of the 50th Annual Allerton Conference on Communication, 2012

2011
Successive Maximization for Systematic Design of Universally Capacity Approaching Rate-Compatible Sequences of LDPC Code Ensembles over Binary-Input Output-Symmetric Memoryless Channels.
IEEE Trans. Commun., 2011

Analytical Design of Inter-Vehicular Communications for Collision Avoidance.
Proceedings of the 74th IEEE Vehicular Technology Conference, 2011

Evaluation of the Universal Geocast Scheme for VANETs.
Proceedings of the 74th IEEE Vehicular Technology Conference, 2011

Analytic design of active vehicular safety systems in sparse traffic.
Proceedings of the Eighth International Workshop on Vehicular Ad Hoc Networks, 2011

A practical approach to polar codes.
Proceedings of the 2011 IEEE International Symposium on Information Theory Proceedings, 2011

2010
Hybrid Channel Codes for Efficient FSO/RF Communication Systems.
IEEE Trans. Commun., 2010

Results on Finite Wireless Networks on a Line.
IEEE Trans. Commun., 2010

Vehicular Ad Hoc Networks.
EURASIP J. Adv. Signal Process., 2010

Fundamental tradeoffs in vehicular ad hoc networks.
Proceedings of the Seventh International Workshop on Vehicular Ad Hoc Networks, 2010

A Universal Geocast Scheme for Vehicular Ad Hoc Networks.
Proceedings of the 7th IEEE Consumer Communications and Networking Conference, 2010

On bit error rate performance of polar codes in finite regime.
Proceedings of the 48th Annual Allerton Conference on Communication, 2010

2009
Connectivity properties of large-scale sensor networks.
Wirel. Networks, 2009

Development of a VII-enabled prototype intersection collision warning system.
Int. J. Internet Protoc. Technol., 2009

On LDPC codes over symmetric channels.
Proceedings of the 2009 IEEE Information Theory Workshop, 2009

On systematic design of universally capacity approaching rate-compatible sequences of LDPC code ensembles over binary-input output-symmetric memoryless channels.
Proceedings of the 47th Annual Allerton Conference on Communication, 2009

2008
A Sampling Theorem Approach to Traffic Sensor Optimization.
IEEE Trans. Intell. Transp. Syst., 2008

The capacity of Vehicular Ad Hoc Networks with infrastructure.
Proceedings of the 6th International Symposium on Modeling and Optimization in Mobile, 2008

Reliable inter-vehicle communications for vehicular ad hoc networks.
Proceedings of the 4th Annual International Conference on Wireless Internet, 2008

Analysis of Wireless Ad-Hoc and Sensor Networks in Finite Regime.
Proceedings of the Fifth Annual IEEE Communications Society Conference on Sensor, 2008

Scaling Laws for Distance Limited Communications in Vehicular Ad Hoc Networks.
Proceedings of IEEE International Conference on Communications, 2008

VANET capacity scaling under the Physical Model.
Proceedings of the 42nd Annual Conference on Information Sciences and Systems, 2008

A geometrical analysis of Vehicular Ad-Hoc Networks for safety applications.
Proceedings of the 46th Annual Allerton Conference on Communication, 2008

2007
Results on Punctured Low-Density Parity-Check Codes and Improved Iterative Decoding Techniques.
IEEE Trans. Inf. Theory, 2007

Unequal Error Protection Using Partially Regular LDPC Codes.
IEEE Trans. Commun., 2007

Improving Application Performance Over Error Prone Routes in Internet: Joint Impact of Coding, Interleaving, and ARQ.
Proceedings of the IEEE Wireless Communications and Networking Conference, 2007

Results on coverage for finite wireless networks.
Proceedings of the International Conference on Wireless Communications and Mobile Computing, 2007

Dense Parity Check Based Secrecy Sharing in Wireless Communications.
Proceedings of the Global Communications Conference, 2007

A Highly Reliable FSO/RF Communication System Using Efficient Codes.
Proceedings of the Global Communications Conference, 2007

Delay and Energy Tradeoff in Multi-State Wireless Sensor Networks.
Proceedings of the Global Communications Conference, 2007

Optimal Hybrid RF-Wireless Optical Communication for Maximum Efficiency and Reliability.
Proceedings of the 41st Annual Conference on Information Sciences and Systems, 2007

2006
Performance of low-density parity-check codes with linear minimum distance.
IEEE Trans. Inf. Theory, 2006

Analysis of finite unreliable sensor grids.
Proceedings of the 4th International Symposium on Modeling and Optimization in Mobile, 2006

On Raptor Codes.
Proceedings of IEEE International Conference on Communications, 2006

2005
Applications of Random Graphs to Design and Analysis of LDPC Codes and Sensor Networks.
PhD thesis, 2005

Nonuniform error correction using low-density parity-check codes.
IEEE Trans. Inf. Theory, 2005

Analysis of hierarchical algorithms for wireless sensor network routing protocols.
Proceedings of the IEEE Wireless Communications and Networking Conference, 2005

Clustering-based correlation aware data aggregation for distributed sensor networks.
Proceedings of the Global Telecommunications Conference, 2005. GLOBECOM '05, St. Louis, Missouri, USA, 28 November, 2005

2004
On decoding of low-density parity-check codes over the binary erasure channel.
IEEE Trans. Inf. Theory, 2004

Results on punctured LDPC codes.
Proceedings of the 2004 IEEE Information Theory Workshop, 2004

2003
Results on non-uniform error correction using low-density parity-check codes.
Proceedings of the Global Telecommunications Conference, 2003

2002
Results on minimal tail-biting trellis representation of double-circulant wavelet codes.
Proceedings of the IEEE International Conference on Acoustics, 2002


  Loading...