Skip to main content
Research

Publications: Dr Mohammad Hossein Rezaei Khouzani

Américo A, Khouzani M, Malacaria P ( 2021 ) . Channel-supermodular entropies: Order theory and an application to query anonymization . Entropy vol. 24 , ( 1 )
Americo A, Khouzani M, Malacaria P ( 2020 ) . Conditional Entropy and Data Processing: an Axiomatic Approach Based on Core-Concavity . IEEE Transactions on Information Theory1 - 1 .
Americo A, Malacaria P, Khouzani MHR ( 2019 ) . Channel Ordering and Supermodularity . 2019 IEEE Information Theory Workshop, ITW 2019 .
Americo A, Khouzani MHR, Malacaria P ( 2019 ) . Deterministic channel design for minimum leakage . Proceedings - IEEE Computer Security Foundations Symposium vol. 2019-June , 428 - 441 .
Sharma A, Malacaria P, Khouzani MHR ( 2019 ) . Malware detection using 1-dimensional convolutional neural networks . Proceedings - 4th IEEE European Symposium on Security and Privacy Workshops, EUROS and PW 2019 . 247 - 256 .
Khouzani MHR, Liu Z, Malacaria P ( 2019 ) . Scalable min-max multi-objective cyber-security optimisation over probabilistic attack graphs . European Journal of Operational Research
Américo A, Khouzani MHR, Malacaria P ( 2019 ) . Core-concavity, Gain Functions and Axioms for Information Leakage . Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) , vol. 11760 LNCS ,
De Bernardi M, Khouzani MHR, Malacaria P ( 2019 ) . Pseudo-Random Number Generation Using Generative Adversarial Networks . Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) vol. 11329 LNAI , 191 - 200 .
MALACARIA P, KHOUZANI MHR ( 2018 ) . Generalised Entropies and Metric-Invariant Optimal Countermeasures for Information Leakage under Symmetric Constraints . IEEE Transactions on Information Theory vol. 65 , ( 2 ) 888 - 901 .
Khouzani MHR, Malacaria P ( 2018 ) . Information theory in game theory . Entropy vol. 20 , ( 11 )
Khouzani MHR, Malacaria P ( 2018 ) . Optimal channel design: A game theoretical analysis . Entropy vol. 20 , ( 9 )
Malacaria P, Khouzani M, Pasareanu CS, Phan QS, Luckow K ( 2018 ) . Symbolic side-channel analysis for probabilistic programs . Proceedings - IEEE Computer Security Foundations Symposium . Conference: 2018 IEEE Computer Security Foundations Symposium. vol. 2018-July , 313 - 327 .
Khouzani M, Malacaria P ( 2017 ) . Leakage-Minimal Design: Universality, Limitations, and Applications . Proceedings - IEEE Computer Security Foundations Symposium . 305 - 317 .
KHOUZANI MHR, MALACARIA P, HANKIN C, FIELDER A, SMERALDI F ( 2016 ) . Efficient Numerical Frameworks for Multi-Objective Cyber Security Planning . Conference: European Symposium on Research in Computer Security (ESORICS) 2016 ( Heraklion, Crete, Greece ) from: 26/09/2016 to: 30/09/2016 ,
Khouzani MHR, Malacaria P ( 2016 ) . Relative perfect secrecy: Universally optimal strategies and channel design . Proceedings - IEEE Computer Security Foundations Symposium . vol. 2016-August , 61 - 76 .
Karyotis V, Khouzani MHR ( 2016 ) . Malware Diffusion Models for Modern Complex Networks: Theory and Applications .
Eshghi S, Khouzani MHR, Sarkar S, Venkatesh SS ( 2016 ) . Optimal Patching in Clustered Malware Epidemics . IEEE/ACM Transactions on Networking vol. 24 , ( 1 ) 283 - 298 .
Khouzani MHR, Mardziel P, Cid C, Srivatsa M ( 2015 ) . Picking vs. Guessing Secrets: A Game-Theoretic Analysis . Proceedings of the Computer Security Foundations Workshop . vol. 2015-September , 243 - 257 .
Wang S, Khouzani MHR, Krishnamachari B, Bai F ( 2015 ) . Optimal control for epidemic routing of two files with different priorities in Delay Tolerant Networks . Proceedings of the American Control Conference . vol. 2015-July , 1387 - 1392 .
Eshghi S, Khouzani MHR, Sarkar S, Shroff NB, Venkatesh SS ( 2015 ) . Optimal energy-aware epidemic routing in DTNs . IEEE Transactions on Automatic Control vol. 60 , ( 6 ) 1554 - 1569 .
Khouzani MHR, Panaousis E, Theodorakopoulos G ( 2015 ) . Preface .
Pham V, Khouzani MHR, Cid C ( 2014 ) . Optimal contracts for outsourced computation . Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) . vol. 8840 , 79 - 98 .
Khouzani MHR, Pham V, Cid C ( 2014 ) . Strategic discovery and sharing of vulnerabilities in competitive environments . Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) . vol. 8840 , 59 - 78 .
Sarkar S, Khouzani MHR, Kar K ( 2013 ) . Optimal routing and scheduling in wireless networks with nodes powered by renewable and traditional energy sources . 2013 1st International Black Sea Conference on Communications and Networking, BlackSeaCom 2013 . 186 - 190 .
Khouzani MHR, Sen S, Shroff NB ( 2013 ) . An economic analysis of regulating security investments in the Internet . Proceedings - IEEE INFOCOM . 818 - 826 .
Sarkar S, Khouzani MHR, Kar K ( 2013 ) . Optimal routing and scheduling in multihop wireless renewable energy networks . IEEE Transactions on Automatic Control vol. 58 , ( 7 ) 1792 - 1798 .
Khouzani MHR, Sen S, Shroff NB ( 2012 ) . Managing the adoption of asymmetric bidirectional firewalls: Seeding and mandating . GLOBECOM - IEEE Global Telecommunications Conference . 911 - 916 .
Khouzani MHR, Eshghi S, Sarkar S, Shroff NB, Venkatesh SS ( 2012 ) . Optimal energy-aware epidemic routing in DTNs . Proceedings of the International Symposium on Mobile Ad Hoc Networking and Computing (MobiHoc) . 175 - 184 .
Khouzani MHR, Sarkar S, Altman E ( 2012 ) . Optimal dissemination of security patches in mobile wireless networks . IEEE Transactions on Information Theory vol. 58 , ( 7 ) 4714 - 4732 .
Khouzani MHR, Sarkar S, Altman E ( 2012 ) . Maximum damage malware attack in mobile wireless networks . IEEE/ACM Transactions on Networking vol. 20 , ( 5 ) 1347 - 1360 .
Khouzani MHR, Altman E, Sarkar S ( 2012 ) . Optimal quarantining of wireless malware through reception gain control . IEEE Transactions on Automatic Control vol. 57 , ( 1 ) 49 - 61 .
Khouzani MHR, Sarkar S, Altman E ( 2012 ) . Saddle-point strategies in malware attack . IEEE Journal on Selected Areas in Communications vol. 30 , ( 1 ) 31 - 43 .
Khouzani MHR, Venkatesh SS, Sarkar S ( 2011 ) . Market-based control of epidemics . 2011 49th Annual Allerton Conference on Communication, Control, and Computing, Allerton 2011 . 314 - 320 .
Khouzani MHR, Sarkar S ( 2011 ) . Maximum damage battery depletion attack in mobile sensor networks . IEEE Transactions on Automatic Control vol. 56 , ( 10 ) 2358 - 2368 .
Khouzani MHR, Sarkar S, Altman E ( 2011 ) . A dynamic game solution to malware attack . Proceedings - IEEE INFOCOM . 2138 - 2146 .
Khouzani MHR, Sarkar S, Altman E ( 2011 ) . Optimal control of epidemic evolution . Proceedings - IEEE INFOCOM . 1683 - 1691 .
Khouzani MHR, Sarkar S ( 2010 ) . Economy of spectrum access in time varying multichannel networks . IEEE Transactions on Mobile Computing vol. 9 , ( 10 ) 1361 - 1376 .
Khouzani MHR, Sarkar S, Altman E ( 2010 ) . Optimal propagation of security patches in mobile wireless networks . Performance Evaluation Review . vol. 38 , 355 - 356 .
Khouzani MHR, Sarkar S, Altman E ( 2010 ) . Optimal killing of nodes in a wireless malware outbreak . IEEE Information Theory Workshop 2010, ITW 2010 .
Khouzani MHR, Sarkar S, Altman E ( 2010 ) . Maximum damage malware attack in mobile wireless networks . Proceedings - IEEE INFOCOM .
Khouzani MHR, Sarkar S, Altman E ( 2010 ) . Optimal propagation of security patches in mobile wireless networks . ACM SIGMETRICS Performance Evaluation Review . vol. 38 , 355 - 356 .
Khouzani MHR, Sarkar S ( 2010 ) . Dynamic malware attack in energy-constrained mobile wireless networks . 2010 Information Theory and Applications Workshop, ITA 2010 - Conference Proceedings . 408 - 418 .
Khouzani MHR, Sarkar S, Altman E ( 2010 ) . Dispatch then stop: Optimal dissemination of security patches in mobile wireless networks . Proceedings of the IEEE Conference on Decision and Control . 2354 - 2359 .
Khouzani MHR, Altman E, Sarkar S, IEEE ( 2009 ) . Optimal Quarantining of Wireless Malware Through Power Control . 2009 INFORMATION THEORY AND APPLICATIONS WORKSHOP . 298 - + .
Aaram A, Khouzani MHR, Sarkar S, Tassiulas L ( 2008 ) . A fair scheduling policy for wireless channels with intermittent connectivity . CISS 2008, The 42nd Annual Conference on Information Sciences and Systems . 503 - 508 .