


default search action
M. H. R. Khouzani
Person information
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2022
- [j16]Arthur Américo, M. H. R. Khouzani, Pasquale Malacaria:
Channel-Supermodular Entropies: Order Theory and an Application to Query Anonymization. Entropy 24(1): 39 (2022) - 2020
- [j15]Arthur Américo
, M. H. R. Khouzani, Pasquale Malacaria
:
Conditional Entropy and Data Processing: An Axiomatic Approach Based on Core-Concavity. IEEE Trans. Inf. Theory 66(9): 5537-5547 (2020)
2010 – 2019
- 2019
- [j14]M. H. R. Khouzani, Zhengliang Liu, Pasquale Malacaria:
Scalable min-max multi-objective cyber-security optimisation over probabilistic attack graphs. Eur. J. Oper. Res. 278(3): 894-903 (2019) - [j13]M. H. R. Khouzani, Pasquale Malacaria:
Generalized Entropies and Metric-Invariant Optimal Countermeasures for Information Leakage Under Symmetric Constraints. IEEE Trans. Inf. Theory 65(2): 888-901 (2019) - [c25]Arthur Américo, M. H. R. Khouzani, Pasquale Malacaria:
Core-concavity, Gain Functions and Axioms for Information Leakage. The Art of Modelling Computational Systems 2019: 261-275 - [c24]Arthur Américo, M. H. R. Khouzani, Pasquale Malacaria:
Deterministic Channel Design for Minimum Leakage. CSF 2019: 428-441 - [c23]Arindam Sharma, Pasquale Malacaria, M. H. R. Khouzani:
Malware Detection Using 1-Dimensional Convolutional Neural Networks. EuroS&P Workshops 2019: 247-256 - [c22]Arthur Américo, Pasquale Malacaria, M. H. R. Khouzani:
Channel Ordering and Supermodularity. ITW 2019: 1-5 - 2018
- [j12]M. H. R. Khouzani, Pasquale Malacaria:
Optimal Channel Design: A Game Theoretical Analysis. Entropy 20(9): 675 (2018) - [j11]M. H. R. Khouzani, Pasquale Malacaria:
Information Theory in Game Theory. Entropy 20(11): 817 (2018) - [c21]Pasquale Malacaria, M. H. R. Khouzani, Corina S. Pasareanu, Quoc-Sang Phan
, Kasper Søe Luckow:
Symbolic Side-Channel Analysis for Probabilistic Programs. CSF 2018: 313-327 - [c20]Marcello De Bernardi, M. H. R. Khouzani, Pasquale Malacaria:
Pseudo-Random Number Generation Using Generative Adversarial Networks. Nemesis/UrbReas/SoGood/IWAISe/GDM@PKDD/ECML 2018: 191-200 - [i9]Marcello De Bernardi, M. H. R. Khouzani, Pasquale Malacaria:
Pseudo-Random Number Generation using Generative Adversarial Networks. CoRR abs/1810.00378 (2018) - [i8]M. H. R. Khouzani, Pasquale Malacaria:
Generalised Entropies and Metric-Invariant Optimal Countermeasures for Information Leakage under Symmetric Constraints. CoRR abs/1811.09652 (2018) - [i7]Pasquale Malacaria, M. H. R. Khouzani, Corina S. Pasareanu, Quoc-Sang Phan, Kasper Søe Luckow:
Symbolic Side-Channel Analysis for Probabilistic Programs. IACR Cryptol. ePrint Arch. 2018: 329 (2018) - 2017
- [j10]Emmanouil A. Panaousis
, Eirini D. Karapistoli, Hadeer Elsemary
, Tansu Alpcan, M. H. R. Khouzani, Anastasios A. Economides
:
Game theoretic path selection to support security in device-to-device communications. Ad Hoc Networks 56: 28-42 (2017) - [c19]M. H. R. Khouzani, Pasquale Malacaria:
Leakage-Minimal Design: Universality, Limitations, and Applications. CSF 2017: 305-317 - [i6]Emmanouil Panaousis, Eirini D. Karapistoli, Hadeer Elsemary, Tansu Alpcan, M. H. R. Khouzani, Anastasios A. Economides:
Game theoretic path selection to support security in device-to-device communications. CoRR abs/1711.01447 (2017) - 2016
- [j9]Soheil Eshghi
, M. H. R. Khouzani, Saswati Sarkar, Santosh S. Venkatesh:
Optimal Patching in Clustered Malware Epidemics. IEEE/ACM Trans. Netw. 24(1): 283-298 (2016) - [c18]M. H. R. Khouzani, Pasquale Malacaria:
Relative Perfect Secrecy: Universally Optimal Strategies and Channel Design. CSF 2016: 61-76 - [c17]M. H. R. Khouzani, Pasquale Malacaria, Chris Hankin
, Andrew Fielder, Fabrizio Smeraldi:
Efficient Numerical Frameworks for Multi-objective Cyber Security Planning. ESORICS (2) 2016: 179-197 - 2015
- [j8]Soheil Eshghi
, M. H. R. Khouzani, Saswati Sarkar, Ness B. Shroff, Santosh S. Venkatesh:
Optimal Energy-Aware Epidemic Routing in DTNs. IEEE Trans. Autom. Control. 60(6): 1554-1569 (2015) - [c16]Shangxing Wang, M. H. R. Khouzani, Bhaskar Krishnamachari, Fan Bai:
Optimal control for epidemic routing of two files with different priorities in Delay Tolerant Networks. ACC 2015: 1387-1392 - [c15]M. H. R. Khouzani, Piotr Mardziel, Carlos Cid, Mudhakar Srivatsa:
Picking vs. Guessing Secrets: A Game-Theoretic Analysis. CSF 2015: 243-257 - [e1]M. H. R. Khouzani, Emmanouil A. Panaousis, George Theodorakopoulos
:
Decision and Game Theory for Security - 6th International Conference, GameSec 2015, London, UK, November 4-5, 2015, Proceedings. Lecture Notes in Computer Science 9406, Springer 2015, ISBN 978-3-319-25593-4 [contents] - [i5]M. H. R. Khouzani, Piotr Mardziel, Carlos Cid, Mudhakar Srivatsa:
Picking vs. Guessing Secrets: A Game-Theoretic Analysis (Technical Report). CoRR abs/1505.02325 (2015) - 2014
- [c14]M. H. R. Khouzani, Viet Pham
, Carlos Cid:
Strategic Discovery and Sharing of Vulnerabilities in Competitive Environments. GameSec 2014: 59-78 - [c13]Viet Pham
, M. H. R. Khouzani, Carlos Cid:
Optimal Contracts for Outsourced Computation. GameSec 2014: 79-98 - [i4]Soheil Eshghi, M. H. R. Khouzani, Saswati Sarkar, Santosh S. Venkatesh:
Optimal Patching in Clustered Malware Epidemics. CoRR abs/1403.1639 (2014) - [i3]Soheil Eshghi, M. H. R. Khouzani, Saswati Sarkar, Ness B. Shroff, Santosh S. Venkatesh:
Optimal Energy-Aware Epidemic Routing in DTNs. CoRR abs/1403.1642 (2014) - [i2]Viet Pham, M. H. R. Khouzani, Carlos Cid:
Optimal Contracts for Outsourced Computation. IACR Cryptol. ePrint Arch. 2014: 374 (2014) - 2013
- [j7]Saswati Sarkar, M. H. R. Khouzani, Koushik Kar
:
Optimal Routing and Scheduling in Multihop Wireless Renewable Energy Networks. IEEE Trans. Autom. Control. 58(7): 1792-1798 (2013) - [c12]Saswati Sarkar, M. H. R. Khouzani, Koushik Kar
:
Optimal routing and scheduling in wireless networks with nodes powered by renewable and traditional energy sources. BlackSeaCom 2013: 186-190 - [c11]M. H. R. Khouzani, Soumya Sen, Ness B. Shroff:
An economic analysis of regulating security investments in the Internet. INFOCOM 2013: 818-826 - 2012
- [j6]M. H. R. Khouzani, Saswati Sarkar, Eitan Altman:
Saddle-Point Strategies in Malware Attack. IEEE J. Sel. Areas Commun. 30(1): 31-43 (2012) - [j5]M. H. R. Khouzani, Eitan Altman, Saswati Sarkar:
Optimal Quarantining of Wireless Malware Through Reception Gain Control. IEEE Trans. Autom. Control. 57(1): 49-61 (2012) - [j4]M. H. R. Khouzani, Saswati Sarkar, Eitan Altman:
Optimal Dissemination of Security Patches in Mobile Wireless Networks. IEEE Trans. Inf. Theory 58(7): 4714-4732 (2012) - [j3]M. H. R. Khouzani, Saswati Sarkar, Eitan Altman:
Maximum Damage Malware Attack in Mobile Wireless Networks. IEEE/ACM Trans. Netw. 20(5): 1347-1360 (2012) - [c10]M. H. R. Khouzani, Soumya Sen, Ness B. Shroff:
Managing the adoption of asymmetric bidirectional firewalls: Seeding and mandating. GLOBECOM 2012: 911-916 - [c9]M. H. R. Khouzani, Soheil Eshghi
, Saswati Sarkar, Ness B. Shroff, Santosh S. Venkatesh:
Optimal energy-aware epidemic routing in DTNs. MobiHoc 2012: 175-182 - [i1]M. H. R. Khouzani, Soumya Sen, Ness B. Shroff:
An Analytical Approach to the Adoption of Asymmetric Bidirectional Firewalls: Need for Regulation? CoRR abs/1203.1687 (2012) - 2011
- [j2]M. H. R. Khouzani, Saswati Sarkar:
Maximum Damage Battery Depletion Attack in Mobile Sensor Networks. IEEE Trans. Autom. Control. 56(10): 2358-2368 (2011) - [c8]M. H. R. Khouzani, Santosh S. Venkatesh, Saswati Sarkar:
Market-based control of epidemics. Allerton 2011: 314-320 - [c7]M. H. R. Khouzani, Saswati Sarkar, Eitan Altman:
Optimal control of epidemic evolution. INFOCOM 2011: 1683-1691 - [c6]M. H. R. Khouzani, Saswati Sarkar, Eitan Altman:
A dynamic game solution to malware attack. INFOCOM 2011: 2138-2146 - 2010
- [j1]M. H. R. Khouzani, Saswati Sarkar:
Economy of Spectrum Access in Time Varying Multichannel Networks. IEEE Trans. Mob. Comput. 9(10): 1361-1376 (2010) - [c5]M. H. R. Khouzani, Saswati Sarkar, Eitan Altman:
Dispatch then stop: Optimal dissemination of security patches in mobile wireless networks. CDC 2010: 2354-2359 - [c4]M. H. R. Khouzani, Saswati Sarkar, Eitan Altman:
Maximum Damage Malware Attack in Mobile Wireless Networks. INFOCOM 2010: 749-757 - [c3]M. H. R. Khouzani, Saswati Sarkar:
Dynamic malware attack in energy-constrained mobile wireless networks. ITA 2010: 408-418 - [c2]M. H. R. Khouzani, Saswati Sarkar, Eitan Altman:
Optimal propagation of security patches in mobile wireless networks: extended abstract. SIGMETRICS 2010: 355-356
2000 – 2009
- 2008
- [c1]A. Aaram, M. H. R. Khouzani, Saswati Sarkar, Leandros Tassiulas:
A fair scheduling policy for wireless channels with intermittent connectivity. CISS 2008: 503-508
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-01-20 23:03 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint