Secure smartcardbased fingerprint authentication TC Clancy, N Kiyavash, DJ Lin Proceedings of the 2003 ACM SIGMM workshop on Biometrics methods and …, 2003 | 669 | 2003 |
Estimating the directed information to infer causal relationships in ensemble neural spike train recordings CJ Quinn, TP Coleman, N Kiyavash, NG Hatsopoulos Journal of computational neuroscience 30 (1), 17-44, 2011 | 231 | 2011 |
RAINBOW: A Robust And Invisible Non-Blind Watermark for Network Flows. A Houmansadr, N Kiyavash, N Borisov NDSS 47, 406-422, 2009 | 161 | 2009 |
Directed information graphs C Quinn, N Kiyavash, TP Coleman arXiv preprint arXiv:1204.2003, 2012 | 122 | 2012 |
Multi-flow Attacks Against Network Flow Watermarking Schemes. N Kiyavash, A Houmansadr, N Borisov USENIX security symposium, 307-320, 2008 | 113 | 2008 |
Trusted integrated circuits: A nondestructive hidden characteristics extraction approach Y Alkabani, F Koushanfar, N Kiyavash, M Potkonjak International Workshop on Information Hiding, 102-117, 2008 | 106 | 2008 |
Nonasymptotic upper bounds for deletion correcting codes AA Kulkarni, N Kiyavash IEEE Transactions on Information Theory 59 (8), 5115-5130, 2013 | 74 | 2013 |
Website detection using remote traffic analysis X Gong, N Borisov, N Kiyavash, N Schear International Symposium on Privacy Enhancing Technologies Symposium, 58-78, 2012 | 65 | 2012 |
Learning network of multivariate hawkes processes: A time series approach J Etesami, N Kiyavash, K Zhang, K Singhal arXiv preprint arXiv:1603.04319, 2016 | 64* | 2016 |
Fingerprinting websites using remote traffic analysis X Gong, N Kiyavash, N Borisov Proceedings of the 17th ACM conference on Computer and communications …, 2010 | 62 | 2010 |
Improved achievability and converse bounds for erdos-renyi graph matching D Cullina, N Kiyavash ACM SIGMETRICS Performance Evaluation Review 44 (1), 63-72, 2016 | 60 | 2016 |
Directed information graphs: A generalization of linear dynamical graphs J Etesami, N Kiyavash American Control Conference (ACC), 2014, 2563-2568, 2014 | 54* | 2014 |
Sneak-peek: High speed covert channels in data center networks R Tahir, MT Khan, X Gong, A Ahmed, A Ghassami, H Kazmi, M Caesar, ... IEEE INFOCOM 2016-The 35th Annual IEEE International Conference on Computer …, 2016 | 50* | 2016 |
Low-cost side channel remote traffic analysis attack in packet networks S Kadloor, X Gong, N Kiyavash, T Tezcan, N Borisov 2010 IEEE International Conference on Communications, 1-5, 2010 | 46 | 2010 |
Multi-flow attack resistant watermarks for network flows A Houmansadr, N Kiyavash, N Borisov Acoustics, Speech and Signal Processing, 2009. ICASSP 2009. IEEE …, 2009 | 45 | 2009 |
Delay optimal policies offer very little privacy S Kadloor, N Kiyavash INFOCOM, 2013 Proceedings IEEE, 2454-2462, 2013 | 44* | 2013 |
Covert timing channels codes for communication over interactive traffic N Kiyavash, T Coleman 2009 IEEE International Conference on Acoustics, Speech and Signal …, 2009 | 43* | 2009 |
A timing channel spyware for the CSMA/CA protocol N Kiyavash, F Koushanfar, TP Coleman, M Rodrigues IEEE Transactions on Information Forensics and Security 8 (3), 477-487, 2013 | 42* | 2013 |
Efficient methods to compute optimal tree approximations of directed information graphs CJ Quinn, N Kiyavash, TP Coleman Signal Processing, IEEE Transactions on 61 (12), 3173-3182, 2013 | 41* | 2013 |
Fingerprinting with equiangular tight frames DG Mixon, CJ Quinn, N Kiyavash, M Fickus IEEE transactions on information theory 59 (3), 1855-1865, 2013 | 41* | 2013 |