Follow
Negar Kiyavash
Title
Cited by
Cited by
Year
Secure smartcardbased fingerprint authentication
TC Clancy, N Kiyavash, DJ Lin
Proceedings of the 2003 ACM SIGMM workshop on Biometrics methods and …, 2003
7142003
Estimating the directed information to infer causal relationships in ensemble neural spike train recordings
CJ Quinn, TP Coleman, N Kiyavash, NG Hatsopoulos
Journal of computational neuroscience 30 (1), 17-44, 2011
2622011
RAINBOW: A Robust And Invisible Non-Blind Watermark for Network Flows.
A Houmansadr, N Kiyavash, N Borisov
NDSS 47, 406-422, 2009
1812009
Directed information graphs
C Quinn, N Kiyavash, TP Coleman
arXiv preprint arXiv:1204.2003, 2012
1532012
Trusted integrated circuits: A nondestructive hidden characteristics extraction approach
Y Alkabani, F Koushanfar, N Kiyavash, M Potkonjak
International Workshop on Information Hiding, 102-117, 2008
1132008
Multi-flow Attacks Against Network Flow Watermarking Schemes.
N Kiyavash, A Houmansadr, N Borisov
USENIX security symposium, 307-320, 2008
1112008
Improved achievability and converse bounds for erdos-renyi graph matching
D Cullina, N Kiyavash
ACM SIGMETRICS Performance Evaluation Review 44 (1), 63-72, 2016
852016
Nonasymptotic upper bounds for deletion correcting codes
AA Kulkarni, N Kiyavash
IEEE Transactions on Information Theory 59 (8), 5115-5130, 2013
812013
Website detection using remote traffic analysis
X Gong, N Borisov, N Kiyavash, N Schear
International Symposium on Privacy Enhancing Technologies Symposium, 58-78, 2012
752012
Fingerprinting websites using remote traffic analysis
X Gong, N Kiyavash, N Borisov
Proceedings of the 17th ACM conference on Computer and communications …, 2010
712010
Learning network of multivariate hawkes processes: A time series approach
J Etesami, N Kiyavash, K Zhang, K Singhal
arXiv preprint arXiv:1603.04319, 2016
652016
Sneak-peek: High speed covert channels in data center networks
R Tahir, MT Khan, X Gong, A Ahmed, A Ghassami, H Kazmi, M Caesar, ...
IEEE INFOCOM 2016-The 35th Annual IEEE International Conference on Computer …, 2016
62*2016
Directed information graphs: A generalization of linear dynamical graphs
J Etesami, N Kiyavash
American Control Conference (ACC), 2014, 2563-2568, 2014
58*2014
Low-cost side channel remote traffic analysis attack in packet networks
S Kadloor, X Gong, N Kiyavash, T Tezcan, N Borisov
2010 IEEE International Conference on Communications, 1-5, 2010
552010
A timing channel spyware for the CSMA/CA protocol
N Kiyavash, F Koushanfar, TP Coleman, M Rodrigues
IEEE Transactions on Information Forensics and Security 8 (3), 477-487, 2013
53*2013
Budgeted experiment design for causal structure learning
AE Ghassami, S Salehkaleybar, N Kiyavash, E Bareinboim
International Conference on Machine Learning, 1724-1733, 2018
502018
Delay optimal policies offer very little privacy
S Kadloor, N Kiyavash
INFOCOM, 2013 Proceedings IEEE, 2454-2462, 2013
50*2013
Fingerprinting with equiangular tight frames
DG Mixon, CJ Quinn, N Kiyavash, M Fickus
IEEE transactions on information theory 59 (3), 1855-1865, 2013
49*2013
Exact alignment recovery for correlated Erd\H {o} sR\'enyi graphs
D Cullina, N Kiyavash
arXiv preprint arXiv:1711.06783, 2017
482017
Online Learning for Multivariate Hawkes Processes
Y Yang, J Etesami, N He, N Kiyavash
Proceedings of the 31st International Conference on Neural Information …, 2017
472017
The system can't perform the operation now. Try again later.
Articles 1–20