Negar Kiyavash, Ph.D. - Publications

Affiliations: 
2006 University of Illinois, Urbana-Champaign, Urbana-Champaign, IL 
Area:
Electronics and Electrical Engineering

32 high-probability publications. We are testing a new system for linking publications to authors. You can help! If you notice any inaccuracies, please sign in and mark papers as correct or incorrect matches. If you identify any major omissions or other inaccuracies in the publication list, please let us know.

Year Citation  Score
2018 Ghassami A, Kiyavash N. A Covert Queueing Channel in FCFS Schedulers Ieee Transactions On Information Forensics and Security. 13: 1551-1563. DOI: 10.1109/Tifs.2018.2797953  0.567
2018 Truong A, Etesami SR, Etesami J, Kiyavash N. Optimal Attack Strategies Against Predictors - Learning From Expert Advice Ieee Transactions On Information Forensics and Security. 13: 6-19. DOI: 10.1109/Tifs.2017.2718488  0.387
2017 Heuser S, Reaves B, Pendyala PK, Carter H, Dmitrienko A, Enck W, Kiyavash N, Sadeghi A, Traynor P. Phonion: Practical Protection of Metadata in Telephony Networks Proceedings On Privacy Enhancing Technologies. 2017: 170-187. DOI: 10.1515/popets-2017-0011  0.308
2017 Quinn CJ, Pinar A, Kiyavash N. Bounded-Degree Connected Approximations of Stochastic Networks Ieee Transactions On Molecular, Biological and Multi-Scale Communications. 3: 79-88. DOI: 10.1109/Tmbmc.2017.2686387  0.379
2016 Etesami J, Kiyavash N, Coleman T. Learning Minimal Latent Directed Information Polytrees. Neural Computation. 1-42. PMID 27391682 DOI: 10.1162/Neco_A_00874  0.302
2016 Kadloor S, Kiyavash N, Venkitasubramaniam P. Mitigating Timing Side Channel in Shared Schedulers Ieee/Acm Transactions On Networking. 24: 1562-1573. DOI: 10.1109/Tnet.2015.2418194  0.805
2015 Gong X, Kiyavash N. Quantifying the Information Leakage in Timing Side Channels in Deterministic Work-Conserving Schedulers Ieee/Acm Transactions On Networking. DOI: 10.1109/Tnet.2015.2438860  0.688
2015 Quinn CJ, Kiyavash N, Coleman TP. Directed Information Graphs Ieee Transactions On Information Theory. 61: 6887-6909. DOI: 10.1109/Tit.2015.2478440  0.378
2015 Kadloor S, Kiyavash N. Delay-Privacy Tradeoff in the Design of Scheduling Policies Ieee Transactions On Information Theory. 61: 2557-2573. DOI: 10.1109/Tit.2015.2406317  0.803
2015 Ghassami A, Gong X, Kiyavash N. Capacity limit of queueing timing channel in shared FCFS schedulers Ieee International Symposium On Information Theory - Proceedings. 2015: 789-793. DOI: 10.1109/ISIT.2015.7282563  0.406
2014 Houmansadr A, Kiyavash N, Borisov N. Non-blind watermarking of network flows Ieee/Acm Transactions On Networking. 22: 1232-1244. DOI: 10.1109/Tnet.2013.2272740  0.364
2014 Kadloor S, Kiyavash N. Exploiting timing side channel in secure cloud scheduling High Performance Cloud Auditing and Applications. 2147483647: 147-168. DOI: 10.1007/978-1-4614-3296-8_6  0.814
2013 Quinn CJ, Kiyavash N, Coleman TP. Efficient methods to compute optimal tree approximations of directed information graphs Ieee Transactions On Signal Processing. 61: 3173-3182. DOI: 10.1109/Tsp.2013.2259161  0.345
2013 Mixon DG, Quinn CJ, Kiyavash N, Fickus M. Fingerprinting with equiangular tight frames Ieee Transactions On Information Theory. 59: 1855-1865. DOI: 10.1109/Tit.2012.2229781  0.449
2013 Gong X, Rodrigues M, Kiyavash N. Invisible flow watermarks for channels with dependent substitution, deletion, and bursty insertion errors Ieee Transactions On Information Forensics and Security. 8: 1850-1859. DOI: 10.1109/Tifs.2013.2279794  0.511
2013 Kiyavash N, Koushanfar F, Coleman TP, Rodrigues M. A timing channel spyware for the CSMA/CA protocol Ieee Transactions On Information Forensics and Security. 8: 477-487. DOI: 10.1109/Tifs.2013.2238930  0.337
2013 Kadloor S, Venkitasubramaniam P, Kiyavash N. Preventing timing analysis in networks: A statistical inference perspective Ieee Signal Processing Magazine. 30: 76-85. DOI: 10.1109/Msp.2013.2261131  0.785
2013 Kadloor S, Kiyavash N. Delay optimal policies offer very little privacy Proceedings - Ieee Infocom. 2454-2462. DOI: 10.1109/INFCOM.2013.6567051  0.8
2013 Gong X, Kiyavash N. Timing side channels for traffic analysis Icassp, Ieee International Conference On Acoustics, Speech and Signal Processing - Proceedings. 8697-8701. DOI: 10.1109/ICASSP.2013.6639364  0.479
2012 Gorantla SK, Kadloor S, Kiyavash N, Coleman TP, Moskowitz IS, Kang MH. Characterizing the efficacy of the nrl network pump in mitigating covert timing channels Ieee Transactions On Information Forensics and Security. 7: 64-75. DOI: 10.1109/Tifs.2011.2163398  0.764
2012 Kadloor S, Kiyavash N, Venkitasubramaniam P. Scheduling with privacy constraints 2012 Ieee Information Theory Workshop, Itw 2012. 40-44. DOI: 10.1109/ITW.2012.6404704  0.815
2012 Kadloor S, Kiyavash N, Venkitasubramaniam P. Mitigating timing based information leakage in shared schedulers Proceedings - Ieee Infocom. 1044-1052. DOI: 10.1109/INFCOM.2012.6195460  0.762
2012 Gong X, Borisov N, Kiyavash N, Schear N. Website detection using remote traffic analysis Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 7384: 58-78. DOI: 10.1007/978-3-642-31680-7_4  0.4
2011 Quinn CJ, Coleman TP, Kiyavash N, Hatsopoulos NG. Estimating the directed information to infer causal relationships in ensemble neural spike train recordings. Journal of Computational Neuroscience. 30: 17-44. PMID 20582566 DOI: 10.1007/S10827-010-0247-2  0.339
2011 Gong X, Kiyavash N, Venkitasubramaniam P. Information theoretic analysis of side channel information leakage in FCFS schedulers Ieee International Symposium On Information Theory - Proceedings. 1255-1259. DOI: 10.1109/ISIT.2011.6033737  0.316
2011 Kadloor S, Gong X, Kiyavash N, Venkitasubramaniam P. Designing privacy preserving router scheduling policies 2011 45th Annual Conference On Information Sciences and Systems, Ciss 2011. DOI: 10.1109/CISS.2011.5766104  0.811
2010 Gong X, Kiyavash N, Borisov N. Fingerprinting websites using remote traffic analysis Proceedings of the Acm Conference On Computer and Communications Security. 684-686. DOI: 10.1145/1866307.1866397  0.384
2010 Kadloor S, Gong X, Kiyavash N, Venkitasubramaniam P. Designing router scheduling policies: A privacy perspective Proceedings of the Acm Conference On Computer and Communications Security. 702-704. DOI: 10.1109/Tsp.2011.2182348  0.811
2010 Gorantla SK, Kadloor S, Coleman TP, Kiyavash N, Moskowitz IS, Kang MH. Directed information and the NRL network pump Isita/Isssta 2010 - 2010 International Symposium On Information Theory and Its Applications. 343-348. DOI: 10.1109/ISITA.2010.5649143  0.724
2010 Kadloor S, Gong X, Kiyavash N, Tezcan T, Borisov N. Low-cost side channel remote traffic analysis attack in packet networks Ieee International Conference On Communications. DOI: 10.1109/ICC.2010.5501972  0.811
2006 Kiyavash N, Blahut RE. On capacity of a constrained two-dimensional channel in presence of violations Ieee International Symposium On Information Theory - Proceedings. 2423-2427. DOI: 10.1109/ISIT.2006.262023  0.656
2005 Kiyavash N, Moulin P. Regular simplex fingerprints and their optimality properties Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 3710: 97-109. DOI: 10.1109/Tifs.2009.2025855  0.328
Show low-probability matches.