Publications: Dr Mohammad Hossein Rezaei Khouzani
Americo A, Malacaria P, Khouzani MHR (2019).
Channel Ordering and Supermodularity. 2019 IEEE Information Theory Workshop, ITW 2019.
Americo A, Khouzani MHR, Malacaria P(2019).
Deterministic channel design for minimum leakage. Proceedings - IEEE Computer Security Foundations Symposium
vol. 2019-June,
428-441.
Sharma A, Malacaria P, Khouzani MHR (2019).
Malware detection using 1-dimensional convolutional neural networks. Proceedings - 4th IEEE European Symposium on Security and Privacy Workshops, EUROS and PW 2019.
247-256.
Khouzani MHR, Liu Z, Malacaria P(2019).
Scalable min-max multi-objective cyber-security optimisation over probabilistic attack graphs. European Journal of Operational Research
Américo A, Khouzani MHR, Malacaria P(2019).
Core-concavity, Gain Functions and Axioms for Information Leakage. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics),
vol. 11760 LNCS,
De Bernardi M, Khouzani MHR, Malacaria P(2019).
Pseudo-Random Number Generation Using Generative Adversarial Networks. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
vol. 11329 LNAI,
191-200.
MALACARIA P, KHOUZANI MHR(2018).
Generalised Entropies and Metric-Invariant Optimal Countermeasures for Information Leakage under Symmetric Constraints. IEEE Transactions on Information Theory
Khouzani MHR, Malacaria P(2018).
Information theory in game theory. Entropy
vol. 20,
(11)
Khouzani MHR, Malacaria P(2018).
Optimal channel design: A game theoretical analysis. Entropy
vol. 20,
(9)
Malacaria P, Khouzani M, Pasareanu CS, Phan QS, Luckow K (2018).
Symbolic side-channel analysis for probabilistic programs. Proceedings - IEEE Computer Security Foundations Symposium.
Conference: 2018 IEEE Computer Security Foundations Symposium.
vol. 2018-July,
313-327.
Khouzani M, Malacaria P (2017).
Leakage-Minimal Design: Universality, Limitations, and Applications. Proceedings - IEEE Computer Security Foundations Symposium.
305-317.
KHOUZANI MHR, MALACARIA P, HANKIN C, FIELDER A, SMERALDI F (2016).
Efficient Numerical Frameworks for Multi-Objective Cyber Security Planning.
Conference: European Symposium on Research in Computer Security (ESORICS) 2016
(Heraklion, Crete, Greece)
from: 26/09/2016
to: 30/09/2016,
Khouzani MHR, Malacaria P (2016).
Relative perfect secrecy: Universally optimal strategies and channel design. Proceedings - IEEE Computer Security Foundations Symposium.
vol. 2016-August,
61-76.
Karyotis V, Khouzani MHR(2016).
Malware Diffusion Models for Modern Complex Networks: Theory and Applications.
Eshghi S, Khouzani MHR, Sarkar S, Venkatesh SS(2016).
Optimal Patching in Clustered Malware Epidemics. IEEE/ACM Transactions on Networking
vol. 24,
(1)
283-298.
Khouzani MHR, Mardziel P, Cid C, Srivatsa M (2015).
Picking vs. Guessing Secrets: A Game-Theoretic Analysis. Proceedings of the Computer Security Foundations Workshop.
vol. 2015-September,
243-257.
Eshghi S, Khouzani MHR, Sarkar S, Shroff NB, Venkatesh SS(2015).
Optimal energy-aware epidemic routing in DTNs. IEEE Transactions on Automatic Control
vol. 60,
(6)
1554-1569.
Wang S, Khouzani MHR, Krishnamachari B, Bai F (2015).
Optimal control for epidemic routing of two files with different priorities in Delay Tolerant Networks. Proceedings of the American Control Conference.
vol. 2015-July,
1387-1392.
Khouzani MHR, Panaousis E, Theodorakopoulos G(2015).
Preface.
Pham V, Khouzani MHR, Cid C (2014).
Optimal contracts for outsourced computation. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics).
vol. 8840,
79-98.
Khouzani MHR, Pham V, Cid C (2014).
Strategic discovery and sharing of vulnerabilities in competitive environments. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics).
vol. 8840,
59-78.
Sarkar S, Khouzani MHR, Kar K (2013).
Optimal routing and scheduling in wireless networks with nodes powered by renewable and traditional energy sources. 2013 1st International Black Sea Conference on Communications and Networking, BlackSeaCom 2013.
186-190.
Khouzani MHR, Sen S, Shroff NB (2013).
An economic analysis of regulating security investments in the Internet. Proceedings - IEEE INFOCOM.
818-826.
Sarkar S, Khouzani MHR, Kar K(2013).
Optimal routing and scheduling in multihop wireless renewable energy networks. IEEE Transactions on Automatic Control
vol. 58,
(7)
1792-1798.
Khouzani MHR, Sen S, Shroff NB (2012).
Managing the adoption of asymmetric bidirectional firewalls: Seeding and mandating. GLOBECOM - IEEE Global Telecommunications Conference.
911-916.
Khouzani MHR, Eshghi S, Sarkar S, Shroff NB, Venkatesh SS (2012).
Optimal energy-aware epidemic routing in DTNs. Proceedings of the International Symposium on Mobile Ad Hoc Networking and Computing (MobiHoc).
175-184.
Khouzani MHR, Sarkar S, Altman E(2012).
Optimal dissemination of security patches in mobile wireless networks. IEEE Transactions on Information Theory
vol. 58,
(7)
4714-4732.
Khouzani MHR, Sarkar S, Altman E(2012).
Maximum damage malware attack in mobile wireless networks. IEEE/ACM Transactions on Networking
vol. 20,
(5)
1347-1360.
Khouzani MHR, Altman E, Sarkar S(2012).
Optimal quarantining of wireless malware through reception gain control. IEEE Transactions on Automatic Control
vol. 57,
(1)
49-61.
Khouzani MHR, Sarkar S, Altman E(2012).
Saddle-point strategies in malware attack. IEEE Journal on Selected Areas in Communications
vol. 30,
(1)
31-43.
Khouzani MHR, Venkatesh SS, Sarkar S (2011).
Market-based control of epidemics. 2011 49th Annual Allerton Conference on Communication, Control, and Computing, Allerton 2011.
314-320.
Khouzani MHR, Sarkar S(2011).
Maximum damage battery depletion attack in mobile sensor networks. IEEE Transactions on Automatic Control
vol. 56,
(10)
2358-2368.
Khouzani MHR, Sarkar S, Altman E (2011).
A dynamic game solution to malware attack. Proceedings - IEEE INFOCOM.
2138-2146.
Khouzani MHR, Sarkar S, Altman E (2011).
Optimal control of epidemic evolution. Proceedings - IEEE INFOCOM.
1683-1691.
Khouzani MHR, Sarkar S(2010).
Economy of spectrum access in time varying multichannel networks. IEEE Transactions on Mobile Computing
vol. 9,
(10)
1361-1376.
Khouzani MHR, Sarkar S, Altman E (2010).
Optimal propagation of security patches in mobile wireless networks. Performance Evaluation Review.
vol. 38,
355-356.
Khouzani MHR, Sarkar S, Altman E (2010).
Optimal killing of nodes in a wireless malware outbreak. IEEE Information Theory Workshop 2010, ITW 2010.
Khouzani MHR, Sarkar S, Altman E (2010).
Maximum damage malware attack in mobile wireless networks. Proceedings - IEEE INFOCOM.
Khouzani MHR, Sarkar S (2010).
Dynamic malware attack in energy-constrained mobile wireless networks. 2010 Information Theory and Applications Workshop, ITA 2010 - Conference Proceedings.
408-418.
Khouzani MHR, Sarkar S, Altman E (2010).
Dispatch then stop: Optimal dissemination of security patches in mobile wireless networks. Proceedings of the IEEE Conference on Decision and Control.
2354-2359.
Khouzani MHR, Sarkar S, Altman E, ACM (2010).
Optimal Propagation of Security Patches in Mobile Wireless Networks. SIGMETRICS 2010: PROCEEDINGS OF THE 2010 ACM SIGMETRICS INTERNATIONAL CONFERENCE ON MEASUREMENT AND MODELING OF COMPUTER SYSTEMS.
vol. 38,
355-356.
Khouzani MHR, Altman E, Sarkar S, IEEE (2009).
Optimal Quarantining of Wireless Malware Through Power Control. 2009 INFORMATION THEORY AND APPLICATIONS WORKSHOP.
298-+.
Aaram A, Khouzani MHR, Sarkar S, Tassiulas L (2008).
A fair scheduling policy for wireless channels with intermittent connectivity. CISS 2008, The 42nd Annual Conference on Information Sciences and Systems.
503-508.