Negar Kiyavash
ЗаглавиеПозоваванияГодина
Secure smartcardbased fingerprint authentication
TC Clancy, N Kiyavash, DJ Lin
Proceedings of the 2003 ACM SIGMM workshop on Biometrics methods and …, 2003
6372003
Estimating the directed information to infer causal relationships in ensemble neural spike train recordings
CJ Quinn, TP Coleman, N Kiyavash, NG Hatsopoulos
Journal of computational neuroscience 30 (1), 17-44, 2011
1952011
RAINBOW: A Robust And Invisible Non-Blind Watermark for Network Flows.
A Houmansadr, N Kiyavash, N Borisov
NDSS, 2009
1402009
Multi-flow Attacks Against Network Flow Watermarking Schemes.
N Kiyavash, A Houmansadr, N Borisov
USENIX security symposium, 307-320, 2008
1042008
Trusted integrated circuits: A nondestructive hidden characteristics extraction approach
Y Alkabani, F Koushanfar, N Kiyavash, M Potkonjak
International Workshop on Information Hiding, 102-117, 2008
932008
Directed information graphs
C Quinn, N Kiyavash, TP Coleman
arXiv preprint arXiv:1204.2003, 2012
852012
Nonasymptotic upper bounds for deletion correcting codes
AA Kulkarni, N Kiyavash
IEEE Transactions on Information Theory 59 (8), 5115-5130, 2013
632013
Fingerprinting websites using remote traffic analysis
X Gong, N Kiyavash, N Borisov
Proceedings of the 17th ACM conference on Computer and communications …, 2010
582010
Website detection using remote traffic analysis
X Gong, N Borisov, N Kiyavash, N Schear
International Symposium on Privacy Enhancing Technologies Symposium, 58-78, 2012
542012
Low-cost side channel remote traffic analysis attack in packet networks
S Kadloor, X Gong, N Kiyavash, T Tezcan, N Borisov
2010 IEEE International Conference on Communications, 1-5, 2010
412010
Directed information graphs: A generalization of linear dynamical graphs
J Etesami, N Kiyavash
American Control Conference (ACC), 2014, 2563-2568, 2014
40*2014
Efficient methods to compute optimal tree approximations of directed information graphs
CJ Quinn, N Kiyavash, TP Coleman
Signal Processing, IEEE Transactions on 61 (12), 3173-3182, 2013
39*2013
Improved achievability and converse bounds for erdos-renyi graph matching
D Cullina, N Kiyavash
ACM SIGMETRICS Performance Evaluation Review 44 (1), 63-72, 2016
382016
Multi-flow attack resistant watermarks for network flows
A Houmansadr, N Kiyavash, N Borisov
Acoustics, Speech and Signal Processing, 2009. ICASSP 2009. IEEE …, 2009
382009
Fingerprinting with equiangular tight frames
DG Mixon, CJ Quinn, N Kiyavash, M Fickus
IEEE Transactions on Information Theory 59 (3), 1855-1865, 2013
37*2013
Covert timing channels codes for communication over interactive traffic
N Kiyavash, T Coleman
2009 IEEE International Conference on Acoustics, Speech and Signal …, 2009
36*2009
Sneak-peek: High speed covert channels in data center networks
R Tahir, MT Khan, X Gong, A Ahmed, A Ghassami, H Kazmi, M Caesar, ...
IEEE INFOCOM 2016-The 35th Annual IEEE International Conference on Computer …, 2016
35*2016
Delay optimal policies offer very little privacy
S Kadloor, N Kiyavash
INFOCOM, 2013 Proceedings IEEE, 2454-2462, 2013
35*2013
A timing channel spyware for the CSMA/CA protocol
N Kiyavash, F Koushanfar, TP Coleman, M Rodrigues
IEEE Transactions on Information Forensics and Security 8 (3), 477-487, 2013
35*2013
Information theoretic analysis of side channel information leakage in FCFS schedulers
X Gong, N Kiyavash, P Venkitasubramaniam
2011 IEEE International Symposium on Information Theory Proceedings, 1255-1259, 2011
34*2011
Системата не може да изпълни операцията сега. Опитайте отново по-късно.
Статии 1–20