Menu
 
Research menu
Jump to menu

Publications:  Dr Mohammad Hossein Rezaei Khouzani

Americo A, Malacaria P, Khouzani MHR (2019). Channel Ordering and Supermodularity. 2019 IEEE Information Theory Workshop, ITW 2019.
10.1109/ITW44776.2019.8989409
https://qmro.qmul.ac.uk/xmlui/handle/123456789/59171
Americo A, Khouzani MHR, Malacaria P(2019). Deterministic channel design for minimum leakage. Proceedings - IEEE Computer Security Foundations Symposium vol. 2019-June, 428-441.
10.1109/CSF.2019.00036
https://qmro.qmul.ac.uk/xmlui/handle/123456789/59173
Sharma A, Malacaria P, Khouzani MHR (2019). Malware detection using 1-dimensional convolutional neural networks. Proceedings - 4th IEEE European Symposium on Security and Privacy Workshops, EUROS and PW 2019. 247-256.
10.1109/EuroSPW.2019.00034
https://qmro.qmul.ac.uk/xmlui/handle/123456789/59174
Khouzani MHR, Liu Z, Malacaria P(2019). Scalable min-max multi-objective cyber-security optimisation over probabilistic attack graphs. European Journal of Operational Research
10.1016/j.ejor.2019.04.035
https://qmro.qmul.ac.uk/xmlui/handle/123456789/57877
Américo A, Khouzani MHR, Malacaria P(2019). Core-concavity, Gain Functions and Axioms for Information Leakage. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), vol. 11760 LNCS,
De Bernardi M, Khouzani MHR, Malacaria P(2019). Pseudo-Random Number Generation Using Generative Adversarial Networks. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) vol. 11329 LNAI, 191-200.
10.1007/978-3-030-13453-2_15
https://qmro.qmul.ac.uk/xmlui/handle/123456789/53439
MALACARIA P, KHOUZANI MHR(2018). Generalised Entropies and Metric-Invariant Optimal Countermeasures for Information Leakage under Symmetric Constraints. IEEE Transactions on Information Theory
10.1109/TIT.2018.2883705
https://qmro.qmul.ac.uk/xmlui/handle/123456789/54950
Khouzani MHR, Malacaria P(2018). Information theory in game theory. Entropy vol. 20, (11)
10.3390/e20110817
https://qmro.qmul.ac.uk/xmlui/handle/123456789/54685
Khouzani MHR, Malacaria P(2018). Optimal channel design: A game theoretical analysis. Entropy vol. 20, (9)
10.3390/e20090675
https://qmro.qmul.ac.uk/xmlui/handle/123456789/48263
Malacaria P, Khouzani M, Pasareanu CS, Phan QS, Luckow K (2018). Symbolic side-channel analysis for probabilistic programs. Proceedings - IEEE Computer Security Foundations Symposium. Conference: 2018 IEEE Computer Security Foundations Symposium. vol. 2018-July, 313-327.
10.1109/CSF.2018.00030
https://qmro.qmul.ac.uk/xmlui/handle/123456789/38004
Khouzani M, Malacaria P (2017). Leakage-Minimal Design: Universality, Limitations, and Applications. Proceedings - IEEE Computer Security Foundations Symposium. 305-317.
10.1109/CSF.2017.40
https://qmro.qmul.ac.uk/xmlui/handle/123456789/24948
KHOUZANI MHR, MALACARIA P, HANKIN C, FIELDER A, SMERALDI F (2016). Efficient Numerical Frameworks for Multi-Objective Cyber Security Planning. Conference: European Symposium on Research in Computer Security (ESORICS) 2016 (Heraklion, Crete, Greece) from: 26/09/2016 to: 30/09/2016,
10.1007/978-3-319-45741-3_10
https://qmro.qmul.ac.uk/xmlui/handle/123456789/13487
Khouzani MHR, Malacaria P (2016). Relative perfect secrecy: Universally optimal strategies and channel design. Proceedings - IEEE Computer Security Foundations Symposium. vol. 2016-August, 61-76.
10.1109/CSF.2016.12
https://qmro.qmul.ac.uk/xmlui/handle/123456789/12477
Karyotis V, Khouzani MHR(2016). Malware Diffusion Models for Modern Complex Networks: Theory and Applications.
Eshghi S, Khouzani MHR, Sarkar S, Venkatesh SS(2016). Optimal Patching in Clustered Malware Epidemics. IEEE/ACM Transactions on Networking vol. 24, (1) 283-298.
10.1109/TNET.2014.2364034
Khouzani MHR, Mardziel P, Cid C, Srivatsa M (2015). Picking vs. Guessing Secrets: A Game-Theoretic Analysis. Proceedings of the Computer Security Foundations Workshop. vol. 2015-September, 243-257.
10.1109/CSF.2015.24
Eshghi S, Khouzani MHR, Sarkar S, Shroff NB, Venkatesh SS(2015). Optimal energy-aware epidemic routing in DTNs. IEEE Transactions on Automatic Control vol. 60, (6) 1554-1569.
10.1109/TAC.2015.2396641
Wang S, Khouzani MHR, Krishnamachari B, Bai F (2015). Optimal control for epidemic routing of two files with different priorities in Delay Tolerant Networks. Proceedings of the American Control Conference. vol. 2015-July, 1387-1392.
10.1109/ACC.2015.7170927
Khouzani MHR, Panaousis E, Theodorakopoulos G(2015). Preface.
Pham V, Khouzani MHR, Cid C (2014). Optimal contracts for outsourced computation. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). vol. 8840, 79-98.
10.1007/978-3-319-12601-2_5
Khouzani MHR, Pham V, Cid C (2014). Strategic discovery and sharing of vulnerabilities in competitive environments. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). vol. 8840, 59-78.
Sarkar S, Khouzani MHR, Kar K (2013). Optimal routing and scheduling in wireless networks with nodes powered by renewable and traditional energy sources. 2013 1st International Black Sea Conference on Communications and Networking, BlackSeaCom 2013. 186-190.
10.1109/BlackSeaCom.2013.6623407
Khouzani MHR, Sen S, Shroff NB (2013). An economic analysis of regulating security investments in the Internet. Proceedings - IEEE INFOCOM. 818-826.
10.1109/INFCOM.2013.6566869
Sarkar S, Khouzani MHR, Kar K(2013). Optimal routing and scheduling in multihop wireless renewable energy networks. IEEE Transactions on Automatic Control vol. 58, (7) 1792-1798.
10.1109/TAC.2013.2250074
Khouzani MHR, Sen S, Shroff NB (2012). Managing the adoption of asymmetric bidirectional firewalls: Seeding and mandating. GLOBECOM - IEEE Global Telecommunications Conference. 911-916.
10.1109/GLOCOM.2012.6503229
Khouzani MHR, Eshghi S, Sarkar S, Shroff NB, Venkatesh SS (2012). Optimal energy-aware epidemic routing in DTNs. Proceedings of the International Symposium on Mobile Ad Hoc Networking and Computing (MobiHoc). 175-184.
10.1145/2248371.2248397
Khouzani MHR, Sarkar S, Altman E(2012). Optimal dissemination of security patches in mobile wireless networks. IEEE Transactions on Information Theory vol. 58, (7) 4714-4732.
10.1109/TIT.2012.2195295
Khouzani MHR, Sarkar S, Altman E(2012). Maximum damage malware attack in mobile wireless networks. IEEE/ACM Transactions on Networking vol. 20, (5) 1347-1360.
10.1109/TNET.2012.2183642
Khouzani MHR, Altman E, Sarkar S(2012). Optimal quarantining of wireless malware through reception gain control. IEEE Transactions on Automatic Control vol. 57, (1) 49-61.
10.1109/TAC.2011.2150350
Khouzani MHR, Sarkar S, Altman E(2012). Saddle-point strategies in malware attack. IEEE Journal on Selected Areas in Communications vol. 30, (1) 31-43.
10.1109/JSAC.2012.120104
Khouzani MHR, Venkatesh SS, Sarkar S (2011). Market-based control of epidemics. 2011 49th Annual Allerton Conference on Communication, Control, and Computing, Allerton 2011. 314-320.
10.1109/Allerton.2011.6120184
Khouzani MHR, Sarkar S(2011). Maximum damage battery depletion attack in mobile sensor networks. IEEE Transactions on Automatic Control vol. 56, (10) 2358-2368.
10.1109/TAC.2011.2163881
Khouzani MHR, Sarkar S, Altman E (2011). A dynamic game solution to malware attack. Proceedings - IEEE INFOCOM. 2138-2146.
10.1109/INFCOM.2011.5935025
Khouzani MHR, Sarkar S, Altman E (2011). Optimal control of epidemic evolution. Proceedings - IEEE INFOCOM. 1683-1691.
10.1109/INFCOM.2011.5934963
Khouzani MHR, Sarkar S(2010). Economy of spectrum access in time varying multichannel networks. IEEE Transactions on Mobile Computing vol. 9, (10) 1361-1376.
10.1109/TMC.2010.90
Khouzani MHR, Sarkar S, Altman E (2010). Optimal propagation of security patches in mobile wireless networks. Performance Evaluation Review. vol. 38, 355-356.
10.1145/1811099.1811084
Khouzani MHR, Sarkar S, Altman E (2010). Optimal killing of nodes in a wireless malware outbreak. IEEE Information Theory Workshop 2010, ITW 2010.
10.1109/ITWKSPS.2010.5503225
Khouzani MHR, Sarkar S, Altman E (2010). Maximum damage malware attack in mobile wireless networks. Proceedings - IEEE INFOCOM.
10.1109/INFCOM.2010.5462150
Khouzani MHR, Sarkar S (2010). Dynamic malware attack in energy-constrained mobile wireless networks. 2010 Information Theory and Applications Workshop, ITA 2010 - Conference Proceedings. 408-418.
10.1109/ITA.2010.5454093
Khouzani MHR, Sarkar S, Altman E (2010). Dispatch then stop: Optimal dissemination of security patches in mobile wireless networks. Proceedings of the IEEE Conference on Decision and Control. 2354-2359.
10.1109/CDC.2010.5717273
Khouzani MHR, Sarkar S, Altman E, ACM (2010). Optimal Propagation of Security Patches in Mobile Wireless Networks. SIGMETRICS 2010: PROCEEDINGS OF THE 2010 ACM SIGMETRICS INTERNATIONAL CONFERENCE ON MEASUREMENT AND MODELING OF COMPUTER SYSTEMS. vol. 38, 355-356.
Khouzani MHR, Altman E, Sarkar S, IEEE (2009). Optimal Quarantining of Wireless Malware Through Power Control. 2009 INFORMATION THEORY AND APPLICATIONS WORKSHOP. 298-+.
Aaram A, Khouzani MHR, Sarkar S, Tassiulas L (2008). A fair scheduling policy for wireless channels with intermittent connectivity. CISS 2008, The 42nd Annual Conference on Information Sciences and Systems. 503-508.
10.1109/CISS.2008.4558578
Return to top