M. H. R. Khouzani

According to our database1, M. H. R. Khouzani authored at least 42 papers between 2008 and 2022.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2022
Channel-Supermodular Entropies: Order Theory and an Application to Query Anonymization.
Entropy, 2022

2020
Conditional Entropy and Data Processing: An Axiomatic Approach Based on Core-Concavity.
IEEE Trans. Inf. Theory, 2020

2019
Generalized Entropies and Metric-Invariant Optimal Countermeasures for Information Leakage Under Symmetric Constraints.
IEEE Trans. Inf. Theory, 2019

Scalable min-max multi-objective cyber-security optimisation over probabilistic attack graphs.
Eur. J. Oper. Res., 2019

Channel Ordering and Supermodularity.
Proceedings of the 2019 IEEE Information Theory Workshop, 2019

Malware Detection Using 1-Dimensional Convolutional Neural Networks.
Proceedings of the 2019 IEEE European Symposium on Security and Privacy Workshops, 2019

Deterministic Channel Design for Minimum Leakage.
Proceedings of the 32nd IEEE Computer Security Foundations Symposium, 2019

Core-concavity, Gain Functions and Axioms for Information Leakage.
Proceedings of the Art of Modelling Computational Systems: A Journey from Logic and Concurrency to Security and Privacy, 2019

2018
Symbolic Side-Channel Analysis for Probabilistic Programs.
IACR Cryptol. ePrint Arch., 2018

Information Theory in Game Theory.
Entropy, 2018

Optimal Channel Design: A Game Theoretical Analysis.
Entropy, 2018

Generalised Entropies and Metric-Invariant Optimal Countermeasures for Information Leakage under Symmetric Constraints.
CoRR, 2018

Pseudo-Random Number Generation Using Generative Adversarial Networks.
Proceedings of the ECML PKDD 2018 Workshops, 2018

2017
Game theoretic path selection to support security in device-to-device communications.
Ad Hoc Networks, 2017

Leakage-Minimal Design: Universality, Limitations, and Applications.
Proceedings of the 30th IEEE Computer Security Foundations Symposium, 2017

2016
Optimal Patching in Clustered Malware Epidemics.
IEEE/ACM Trans. Netw., 2016

Efficient Numerical Frameworks for Multi-objective Cyber Security Planning.
Proceedings of the Computer Security - ESORICS 2016, 2016

Relative Perfect Secrecy: Universally Optimal Strategies and Channel Design.
Proceedings of the IEEE 29th Computer Security Foundations Symposium, 2016

2015
Optimal Energy-Aware Epidemic Routing in DTNs.
IEEE Trans. Autom. Control., 2015

Picking vs. Guessing Secrets: A Game-Theoretic Analysis (Technical Report).
CoRR, 2015

Picking vs. Guessing Secrets: A Game-Theoretic Analysis.
Proceedings of the IEEE 28th Computer Security Foundations Symposium, 2015

Optimal control for epidemic routing of two files with different priorities in Delay Tolerant Networks.
Proceedings of the American Control Conference, 2015

2014
Optimal Contracts for Outsourced Computation.
IACR Cryptol. ePrint Arch., 2014

Strategic Discovery and Sharing of Vulnerabilities in Competitive Environments.
Proceedings of the Decision and Game Theory for Security - 5th International Conference, 2014

2013
Optimal Routing and Scheduling in Multihop Wireless Renewable Energy Networks.
IEEE Trans. Autom. Control., 2013

An economic analysis of regulating security investments in the Internet.
Proceedings of the IEEE INFOCOM 2013, Turin, Italy, April 14-19, 2013, 2013

Optimal routing and scheduling in wireless networks with nodes powered by renewable and traditional energy sources.
Proceedings of the First International Black Sea Conference on Communications and Networking, 2013

2012
Maximum Damage Malware Attack in Mobile Wireless Networks.
IEEE/ACM Trans. Netw., 2012

Optimal Dissemination of Security Patches in Mobile Wireless Networks.
IEEE Trans. Inf. Theory, 2012

Optimal Quarantining of Wireless Malware Through Reception Gain Control.
IEEE Trans. Autom. Control., 2012

Saddle-Point Strategies in Malware Attack.
IEEE J. Sel. Areas Commun., 2012

An Analytical Approach to the Adoption of Asymmetric Bidirectional Firewalls: Need for Regulation?
CoRR, 2012

Managing the adoption of asymmetric bidirectional firewalls: Seeding and mandating.
Proceedings of the 2012 IEEE Global Communications Conference, 2012

2011
Maximum Damage Battery Depletion Attack in Mobile Sensor Networks.
IEEE Trans. Autom. Control., 2011

A dynamic game solution to malware attack.
Proceedings of the INFOCOM 2011. 30th IEEE International Conference on Computer Communications, 2011

Optimal control of epidemic evolution.
Proceedings of the INFOCOM 2011. 30th IEEE International Conference on Computer Communications, 2011

Market-based control of epidemics.
Proceedings of the 49th Annual Allerton Conference on Communication, 2011

2010
Economy of Spectrum Access in Time Varying Multichannel Networks.
IEEE Trans. Mob. Comput., 2010

Optimal propagation of security patches in mobile wireless networks: extended abstract.
Proceedings of the SIGMETRICS 2010, 2010

Dynamic malware attack in energy-constrained mobile wireless networks.
Proceedings of the Information Theory and Applications Workshop, 2010

Dispatch then stop: Optimal dissemination of security patches in mobile wireless networks.
Proceedings of the 49th IEEE Conference on Decision and Control, 2010

2008
A fair scheduling policy for wireless channels with intermittent connectivity.
Proceedings of the 42nd Annual Conference on Information Sciences and Systems, 2008


  Loading...