Publications: Dr Mohammad Hossein Rezaei Khouzani
Américo A, Khouzani M, Malacaria P
(
2021
)
.
Channel-supermodular entropies: Order theory and an application to query anonymization
.
Entropy
vol.
24
,
(
1
)
Americo A, Khouzani M, Malacaria P
(
2020
)
.
Conditional Entropy and Data Processing: an Axiomatic Approach Based on Core-Concavity
.
IEEE Transactions on Information Theory1
-
1
.
Americo A, Malacaria P, Khouzani MHR
(
2019
)
.
Channel Ordering and Supermodularity
.
2019 IEEE Information Theory Workshop, ITW 2019
.
Americo A, Khouzani MHR, Malacaria P
(
2019
)
.
Deterministic channel design for minimum leakage
.
Proceedings - IEEE Computer Security Foundations Symposium
vol.
2019-June
,
428
-
441
.
Sharma A, Malacaria P, Khouzani MHR
(
2019
)
.
Malware detection using 1-dimensional convolutional neural networks
.
Proceedings - 4th IEEE European Symposium on Security and Privacy Workshops, EUROS and PW 2019
.
247
-
256
.
Khouzani MHR, Liu Z, Malacaria P
(
2019
)
.
Scalable min-max multi-objective cyber-security optimisation over probabilistic attack graphs
.
European Journal of Operational Research
Américo A, Khouzani MHR, Malacaria P
(
2019
)
.
Core-concavity, Gain Functions and Axioms for Information Leakage
.
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
,
vol.
11760 LNCS
,
De Bernardi M, Khouzani MHR, Malacaria P
(
2019
)
.
Pseudo-Random Number Generation Using Generative Adversarial Networks
.
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
vol.
11329 LNAI
,
191
-
200
.
MALACARIA P, KHOUZANI MHR
(
2018
)
.
Generalised Entropies and Metric-Invariant Optimal Countermeasures for Information Leakage under Symmetric Constraints
.
IEEE Transactions on Information Theory
vol.
65
,
(
2
)
888
-
901
.
Khouzani MHR, Malacaria P
(
2018
)
.
Information theory in game theory
.
Entropy
vol.
20
,
(
11
)
Khouzani MHR, Malacaria P
(
2018
)
.
Optimal channel design: A game theoretical analysis
.
Entropy
vol.
20
,
(
9
)
Malacaria P, Khouzani M, Pasareanu CS, Phan QS, Luckow K
(
2018
)
.
Symbolic side-channel analysis for probabilistic programs
.
Proceedings - IEEE Computer Security Foundations Symposium
.
Conference:
2018 IEEE Computer Security Foundations Symposium.
vol.
2018-July
,
313
-
327
.
Khouzani M, Malacaria P
(
2017
)
.
Leakage-Minimal Design: Universality, Limitations, and Applications
.
Proceedings - IEEE Computer Security Foundations Symposium
.
305
-
317
.
KHOUZANI MHR, MALACARIA P, HANKIN C, FIELDER A, SMERALDI F
(
2016
)
.
Efficient Numerical Frameworks for Multi-Objective Cyber Security Planning
.
Conference:
European Symposium on Research in Computer Security (ESORICS) 2016
(
Heraklion, Crete, Greece
)
from:
26/09/2016
to:
30/09/2016
,
Khouzani MHR, Malacaria P
(
2016
)
.
Relative perfect secrecy: Universally optimal strategies and channel design
.
Proceedings - IEEE Computer Security Foundations Symposium
.
vol.
2016-August
,
61
-
76
.
Karyotis V, Khouzani MHR
(
2016
)
.
Malware Diffusion Models for Modern Complex Networks: Theory and Applications
.
Eshghi S, Khouzani MHR, Sarkar S, Venkatesh SS
(
2016
)
.
Optimal Patching in Clustered Malware Epidemics
.
IEEE/ACM Transactions on Networking
vol.
24
,
(
1
)
283
-
298
.
Khouzani MHR, Mardziel P, Cid C, Srivatsa M
(
2015
)
.
Picking vs. Guessing Secrets: A Game-Theoretic Analysis
.
Proceedings of the Computer Security Foundations Workshop
.
vol.
2015-September
,
243
-
257
.
Wang S, Khouzani MHR, Krishnamachari B, Bai F
(
2015
)
.
Optimal control for epidemic routing of two files with different priorities in Delay Tolerant Networks
.
Proceedings of the American Control Conference
.
vol.
2015-July
,
1387
-
1392
.
Eshghi S, Khouzani MHR, Sarkar S, Shroff NB, Venkatesh SS
(
2015
)
.
Optimal energy-aware epidemic routing in DTNs
.
IEEE Transactions on Automatic Control
vol.
60
,
(
6
)
1554
-
1569
.
Khouzani MHR, Panaousis E, Theodorakopoulos G
(
2015
)
.
Preface
.
Pham V, Khouzani MHR, Cid C
(
2014
)
.
Optimal contracts for outsourced computation
.
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
.
vol.
8840
,
79
-
98
.
Khouzani MHR, Pham V, Cid C
(
2014
)
.
Strategic discovery and sharing of vulnerabilities in competitive environments
.
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
.
vol.
8840
,
59
-
78
.
Sarkar S, Khouzani MHR, Kar K
(
2013
)
.
Optimal routing and scheduling in wireless networks with nodes powered by renewable and traditional energy sources
.
2013 1st International Black Sea Conference on Communications and Networking, BlackSeaCom 2013
.
186
-
190
.
Khouzani MHR, Sen S, Shroff NB
(
2013
)
.
An economic analysis of regulating security investments in the Internet
.
Proceedings - IEEE INFOCOM
.
818
-
826
.
Sarkar S, Khouzani MHR, Kar K
(
2013
)
.
Optimal routing and scheduling in multihop wireless renewable energy networks
.
IEEE Transactions on Automatic Control
vol.
58
,
(
7
)
1792
-
1798
.
Khouzani MHR, Sen S, Shroff NB
(
2012
)
.
Managing the adoption of asymmetric bidirectional firewalls: Seeding and mandating
.
GLOBECOM - IEEE Global Telecommunications Conference
.
911
-
916
.
Khouzani MHR, Eshghi S, Sarkar S, Shroff NB, Venkatesh SS
(
2012
)
.
Optimal energy-aware epidemic routing in DTNs
.
Proceedings of the International Symposium on Mobile Ad Hoc Networking and Computing (MobiHoc)
.
175
-
184
.
Khouzani MHR, Sarkar S, Altman E
(
2012
)
.
Optimal dissemination of security patches in mobile wireless networks
.
IEEE Transactions on Information Theory
vol.
58
,
(
7
)
4714
-
4732
.
Khouzani MHR, Sarkar S, Altman E
(
2012
)
.
Maximum damage malware attack in mobile wireless networks
.
IEEE/ACM Transactions on Networking
vol.
20
,
(
5
)
1347
-
1360
.
Khouzani MHR, Altman E, Sarkar S
(
2012
)
.
Optimal quarantining of wireless malware through reception gain control
.
IEEE Transactions on Automatic Control
vol.
57
,
(
1
)
49
-
61
.
Khouzani MHR, Sarkar S, Altman E
(
2012
)
.
Saddle-point strategies in malware attack
.
IEEE Journal on Selected Areas in Communications
vol.
30
,
(
1
)
31
-
43
.
Khouzani MHR, Venkatesh SS, Sarkar S
(
2011
)
.
Market-based control of epidemics
.
2011 49th Annual Allerton Conference on Communication, Control, and Computing, Allerton 2011
.
314
-
320
.
Khouzani MHR, Sarkar S
(
2011
)
.
Maximum damage battery depletion attack in mobile sensor networks
.
IEEE Transactions on Automatic Control
vol.
56
,
(
10
)
2358
-
2368
.
Khouzani MHR, Sarkar S, Altman E
(
2011
)
.
A dynamic game solution to malware attack
.
Proceedings - IEEE INFOCOM
.
2138
-
2146
.
Khouzani MHR, Sarkar S, Altman E
(
2011
)
.
Optimal control of epidemic evolution
.
Proceedings - IEEE INFOCOM
.
1683
-
1691
.
Khouzani MHR, Sarkar S
(
2010
)
.
Economy of spectrum access in time varying multichannel networks
.
IEEE Transactions on Mobile Computing
vol.
9
,
(
10
)
1361
-
1376
.
Khouzani MHR, Sarkar S, Altman E
(
2010
)
.
Optimal propagation of security patches in mobile wireless networks
.
Performance Evaluation Review
.
vol.
38
,
355
-
356
.
Khouzani MHR, Sarkar S, Altman E
(
2010
)
.
Optimal killing of nodes in a wireless malware outbreak
.
IEEE Information Theory Workshop 2010, ITW 2010
.
Khouzani MHR, Sarkar S, Altman E
(
2010
)
.
Maximum damage malware attack in mobile wireless networks
.
Proceedings - IEEE INFOCOM
.
Khouzani MHR, Sarkar S, Altman E
(
2010
)
.
Optimal propagation of security patches in mobile wireless networks
.
ACM SIGMETRICS Performance Evaluation Review
.
vol.
38
,
355
-
356
.
Khouzani MHR, Sarkar S
(
2010
)
.
Dynamic malware attack in energy-constrained mobile wireless networks
.
2010 Information Theory and Applications Workshop, ITA 2010 - Conference Proceedings
.
408
-
418
.
Khouzani MHR, Sarkar S, Altman E
(
2010
)
.
Dispatch then stop: Optimal dissemination of security patches in mobile wireless networks
.
Proceedings of the IEEE Conference on Decision and Control
.
2354
-
2359
.
Khouzani MHR, Altman E, Sarkar S, IEEE
(
2009
)
.
Optimal Quarantining of Wireless Malware Through Power Control
.
2009 INFORMATION THEORY AND APPLICATIONS WORKSHOP
.
298
-
+
.
Aaram A, Khouzani MHR, Sarkar S, Tassiulas L
(
2008
)
.
A fair scheduling policy for wireless channels with intermittent connectivity
.
CISS 2008, The 42nd Annual Conference on Information Sciences and Systems
.
503
-
508
.