Year |
Citation |
Score |
2018 |
Ghassami A, Kiyavash N. A Covert Queueing Channel in FCFS Schedulers Ieee Transactions On Information Forensics and Security. 13: 1551-1563. DOI: 10.1109/Tifs.2018.2797953 |
0.567 |
|
2018 |
Truong A, Etesami SR, Etesami J, Kiyavash N. Optimal Attack Strategies Against Predictors - Learning From Expert Advice Ieee Transactions On Information Forensics and Security. 13: 6-19. DOI: 10.1109/Tifs.2017.2718488 |
0.387 |
|
2017 |
Heuser S, Reaves B, Pendyala PK, Carter H, Dmitrienko A, Enck W, Kiyavash N, Sadeghi A, Traynor P. Phonion: Practical Protection of Metadata in Telephony Networks Proceedings On Privacy Enhancing Technologies. 2017: 170-187. DOI: 10.1515/popets-2017-0011 |
0.308 |
|
2017 |
Quinn CJ, Pinar A, Kiyavash N. Bounded-Degree Connected Approximations of Stochastic Networks Ieee Transactions On Molecular, Biological and Multi-Scale Communications. 3: 79-88. DOI: 10.1109/Tmbmc.2017.2686387 |
0.379 |
|
2016 |
Etesami J, Kiyavash N, Coleman T. Learning Minimal Latent Directed Information Polytrees. Neural Computation. 1-42. PMID 27391682 DOI: 10.1162/Neco_A_00874 |
0.302 |
|
2016 |
Kadloor S, Kiyavash N, Venkitasubramaniam P. Mitigating Timing Side Channel in Shared Schedulers Ieee/Acm Transactions On Networking. 24: 1562-1573. DOI: 10.1109/Tnet.2015.2418194 |
0.805 |
|
2015 |
Gong X, Kiyavash N. Quantifying the Information Leakage in Timing Side Channels in Deterministic Work-Conserving Schedulers Ieee/Acm Transactions On Networking. DOI: 10.1109/Tnet.2015.2438860 |
0.688 |
|
2015 |
Quinn CJ, Kiyavash N, Coleman TP. Directed Information Graphs Ieee Transactions On Information Theory. 61: 6887-6909. DOI: 10.1109/Tit.2015.2478440 |
0.378 |
|
2015 |
Kadloor S, Kiyavash N. Delay-Privacy Tradeoff in the Design of Scheduling Policies Ieee Transactions On Information Theory. 61: 2557-2573. DOI: 10.1109/Tit.2015.2406317 |
0.803 |
|
2015 |
Ghassami A, Gong X, Kiyavash N. Capacity limit of queueing timing channel in shared FCFS schedulers Ieee International Symposium On Information Theory - Proceedings. 2015: 789-793. DOI: 10.1109/ISIT.2015.7282563 |
0.406 |
|
2014 |
Houmansadr A, Kiyavash N, Borisov N. Non-blind watermarking of network flows Ieee/Acm Transactions On Networking. 22: 1232-1244. DOI: 10.1109/Tnet.2013.2272740 |
0.364 |
|
2014 |
Kadloor S, Kiyavash N. Exploiting timing side channel in secure cloud scheduling High Performance Cloud Auditing and Applications. 2147483647: 147-168. DOI: 10.1007/978-1-4614-3296-8_6 |
0.814 |
|
2013 |
Quinn CJ, Kiyavash N, Coleman TP. Efficient methods to compute optimal tree approximations of directed information graphs Ieee Transactions On Signal Processing. 61: 3173-3182. DOI: 10.1109/Tsp.2013.2259161 |
0.345 |
|
2013 |
Mixon DG, Quinn CJ, Kiyavash N, Fickus M. Fingerprinting with equiangular tight frames Ieee Transactions On Information Theory. 59: 1855-1865. DOI: 10.1109/Tit.2012.2229781 |
0.449 |
|
2013 |
Gong X, Rodrigues M, Kiyavash N. Invisible flow watermarks for channels with dependent substitution, deletion, and bursty insertion errors Ieee Transactions On Information Forensics and Security. 8: 1850-1859. DOI: 10.1109/Tifs.2013.2279794 |
0.511 |
|
2013 |
Kiyavash N, Koushanfar F, Coleman TP, Rodrigues M. A timing channel spyware for the CSMA/CA protocol Ieee Transactions On Information Forensics and Security. 8: 477-487. DOI: 10.1109/Tifs.2013.2238930 |
0.337 |
|
2013 |
Kadloor S, Venkitasubramaniam P, Kiyavash N. Preventing timing analysis in networks: A statistical inference perspective Ieee Signal Processing Magazine. 30: 76-85. DOI: 10.1109/Msp.2013.2261131 |
0.785 |
|
2013 |
Kadloor S, Kiyavash N. Delay optimal policies offer very little privacy Proceedings - Ieee Infocom. 2454-2462. DOI: 10.1109/INFCOM.2013.6567051 |
0.8 |
|
2013 |
Gong X, Kiyavash N. Timing side channels for traffic analysis Icassp, Ieee International Conference On Acoustics, Speech and Signal Processing - Proceedings. 8697-8701. DOI: 10.1109/ICASSP.2013.6639364 |
0.479 |
|
2012 |
Gorantla SK, Kadloor S, Kiyavash N, Coleman TP, Moskowitz IS, Kang MH. Characterizing the efficacy of the nrl network pump in mitigating covert timing channels Ieee Transactions On Information Forensics and Security. 7: 64-75. DOI: 10.1109/Tifs.2011.2163398 |
0.764 |
|
2012 |
Kadloor S, Kiyavash N, Venkitasubramaniam P. Scheduling with privacy constraints 2012 Ieee Information Theory Workshop, Itw 2012. 40-44. DOI: 10.1109/ITW.2012.6404704 |
0.815 |
|
2012 |
Kadloor S, Kiyavash N, Venkitasubramaniam P. Mitigating timing based information leakage in shared schedulers Proceedings - Ieee Infocom. 1044-1052. DOI: 10.1109/INFCOM.2012.6195460 |
0.762 |
|
2012 |
Gong X, Borisov N, Kiyavash N, Schear N. Website detection using remote traffic analysis Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 7384: 58-78. DOI: 10.1007/978-3-642-31680-7_4 |
0.4 |
|
2011 |
Quinn CJ, Coleman TP, Kiyavash N, Hatsopoulos NG. Estimating the directed information to infer causal relationships in ensemble neural spike train recordings. Journal of Computational Neuroscience. 30: 17-44. PMID 20582566 DOI: 10.1007/S10827-010-0247-2 |
0.339 |
|
2011 |
Gong X, Kiyavash N, Venkitasubramaniam P. Information theoretic analysis of side channel information leakage in FCFS schedulers Ieee International Symposium On Information Theory - Proceedings. 1255-1259. DOI: 10.1109/ISIT.2011.6033737 |
0.316 |
|
2011 |
Kadloor S, Gong X, Kiyavash N, Venkitasubramaniam P. Designing privacy preserving router scheduling policies 2011 45th Annual Conference On Information Sciences and Systems, Ciss 2011. DOI: 10.1109/CISS.2011.5766104 |
0.811 |
|
2010 |
Gong X, Kiyavash N, Borisov N. Fingerprinting websites using remote traffic analysis Proceedings of the Acm Conference On Computer and Communications Security. 684-686. DOI: 10.1145/1866307.1866397 |
0.384 |
|
2010 |
Kadloor S, Gong X, Kiyavash N, Venkitasubramaniam P. Designing router scheduling policies: A privacy perspective Proceedings of the Acm Conference On Computer and Communications Security. 702-704. DOI: 10.1109/Tsp.2011.2182348 |
0.811 |
|
2010 |
Gorantla SK, Kadloor S, Coleman TP, Kiyavash N, Moskowitz IS, Kang MH. Directed information and the NRL network pump Isita/Isssta 2010 - 2010 International Symposium On Information Theory and Its Applications. 343-348. DOI: 10.1109/ISITA.2010.5649143 |
0.724 |
|
2010 |
Kadloor S, Gong X, Kiyavash N, Tezcan T, Borisov N. Low-cost side channel remote traffic analysis attack in packet networks Ieee International Conference On Communications. DOI: 10.1109/ICC.2010.5501972 |
0.811 |
|
2006 |
Kiyavash N, Blahut RE. On capacity of a constrained two-dimensional channel in presence of violations Ieee International Symposium On Information Theory - Proceedings. 2423-2427. DOI: 10.1109/ISIT.2006.262023 |
0.656 |
|
2005 |
Kiyavash N, Moulin P. Regular simplex fingerprints and their optimality properties Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 3710: 97-109. DOI: 10.1109/Tifs.2009.2025855 |
0.328 |
|
Show low-probability matches. |