Skip to the content
- B. Guan, N. Takbiri, D. Goeckel, A. Houmansadr and H. Pishro-Nik, “Superstring-Based Sequence Obfuscation to Thwart Pattern Matching Attacks,” in IEEE Internet of Things Journal, vol. 9, no. 23, pp. 23348-23365, 1 Dec.1, 2022, doi: 10.1109/JIOT.2022.3203995.
- M. Khosravi, R.Arura, S. Enayati, H. Pishro-Nik, A Search and Detection Autonomous Drone System: from Design to Implementation, arXiv preprint arXiv:2211.15866, Nov.2022.
- S. Enayati, D. Goeckel, A. Houmansadr, and H. Pishro-Nik, “Privacy-Preserving Path Planning for UAVs,” International Symposium on Networks, Computers, and Communications, July 2022, Shenzhen, China.
- S. Enayati, D. Goeckel, A. Houmansadr, and H. Pishro-Nik, “Constrained obfuscation to thwart pattern matching attacks,” IEEE International Symposium in Information Theory, June 2022, Helsinki, Finland.
- Shao, X., Pishro-Nik, H., Gao, L. (2022). Path-Preserving Anonymization for Inter-domain Routing Policies. In: Luo, B., Mosbah, M., Cuppens, F., Ben Othmane, L., Cuppens, N., Kallel, S. (eds) Risks and Security of Internet and Systems. CRiSIS 2021. Lecture Notes in Computer Science, vol 13204. Springer, Cham. https://doi.org/10.1007/978-3-031-02067-4_8
- S. Enayati and H. Pishro-Nik, “Asymmetric Change-of-Probability Measures for Tail Risk Management,” IEEE International Systems Conference (SysCon), Apr. 2022, Montreal, QC, Canada.
- S. Enayati and H. Pishro-Nik, “Quantization rate and AoI-induced distortion trade-off analysis with application to remote agents,” IEEE Wireless Communications and Networking Conference (WCNC), April. 2022, Austin, TX, USA
- B. Jafari, H. Saeedi, S. Enayati, and H. Pishro-Nik, “Energy-Optimized Path Planning for Moving Aerial Base Stations: A Non User-Oriented Framework,” IEEE Communications Letters, vol. 26, no. 3, pp. 672-676, March 2022.
- M. Khosravi, S. Enayati, H. Saeedi and H. Pishro-Nik, “Multi-Purpose Drones for Coverage and Transport Applications,” in IEEE Transactions on Wireless Communications, vol. 20, no. 6, pp. 3974-3987, June 2021, doi: 10.1109/TWC.2021.3054748.
- S. Enayati and H. Pishro-Nik, “UAV trajectories for uniform coverage in convex regions,” in IEEE 93rd Vehicular Technology Conference (VTC2021-Spring), Helsinki, Finland, April 2021, pp. 1-5.
- N. Takbiri, M. Chen, D. L. Goeckel, A. Houmansadr and H. Pishro-Nik, “Asymptotic Privacy Loss Due to Time Series Matching of Dependent Users,” in IEEE Communications Letters, vol. 25, no. 4, pp. 1079-1083, April 2021, doi: 10.1109/LCOMM.2020.3043722.
- Mohammadjavad Khosravi, Hamid Saeedi, Hossein Pishro-Nik, “Multi-Purpose Aerial Drones for Network Coverage and Package Delivery.” submitted to IEEE Transactions on Wireless Communications, 2020.
- N. Takbiri, V. Shejwalkar, A. Houmansadr, D. Goeckel, and H. Pishro-Nik, “Leveraging Prior Knowledge Asymmetries in the Design of Location Privacy-Preserving Mechanisms.”, IEEE Wireless Communications Letters, 2020.
- S. Enayati and H. Pishro-Nik, “A Framework for Probabilistic Decision-Making Using Change-of-Probability Measures.”, IEEE Access, 2020.
- N. Takbiri, A. Houmansadr, D. Goeckel, and H. Pishro-Nik, “Privacy of Dependent Users Against Statistical Matching.”IEEE Transactions on Information Theory, 2020.
- Saeede Enayati, Hamid Saeedi, Hossein Pishro-Nik, and H. Yanikomeroglu, “Optimal altitude selection of aerial base stations to maximize coverage and energy harvesting probabilities: A stochastic geometry analysis” IEEE Transactions on Vehicular Technology, 2020.
- Saeede Enayati, Hamid Saeedi, Hossein Pishro-Nik, and H. Yanikomeroglu, “Moving Aerial Base Station Networks: Stochastic Geometry Analysis and Design Perspective.” IEEE Transactions on Wireless Communications, Vol. 18 , No. 6 , June 2019.
- N. Takbiri, A. Houmansadr, D.L. Goeckel, and H. Pishro-Nik, “Matching Anonymized and Obfuscated Time Series to Users’ Profiles.”IEEE Transactions on Information Theory, Vol. 65, No. 2, pp. 724-741, 2019.
- A. Sheikholeslami, M. Ghaderi, H. Pishro-Nik and D. Goeckel, “Energy-Efficient Secrecy in Wireless Networks Based on Random Jamming,” IEEE Transactions on Communications, Vol. 65, No. 6, pp. 2522-2533, 2017.
- Z. Montazeri, A. Houmansadr, H. Pishro-Nik, “Achieving Perfect Location Privacy in Wireless Devices Using Anonymization,” in IEEE Transactions on Information Forensics and Security, Vol. 12, No. 11, pp. 2683-2698, 2017.
- A. Rakhshan and H. Pishro-Nik, “Improving Safety on Highways by Customizing Vehicular Ad Hoc Networks,” in IEEE Transactions on Wireless Communications, Vol. 16, No. 3, pp. 2017-2026, 2017.
- M. Moltafet, N. Mokari, M. R. Javan, H. Saeedi and H. Pishro-Nik, “A New Multiple Access Technique for 5G: Power Domain Sparse Code Multiple Access (PSMA),” in IEEE Access, 2017.
- A. Sheikholeslami, H. Pishro-Nik, M. Ghaderi, D. Goeckel, “Energy-Efficient Routing in Wireless Networks in the Presence of Jamming,” IEEE Transactions on Wireless Communications, Vol. 15, No. 10, pp. 6828-6842, 2016.
- A. Sheikholeslami, D. Goeckel, H. Pishro-Nik, “Jamming Based on an Ephemeral Key to Obtain Everlasting Security in Wireless Environments,” IEEE Transactions on Wireless Communications, Vol. 14, No. 11, pp. 6072-6081, 2015.
- M. Nekoui, H. Pishro-Nik, “Analytic Design of Active Safety Systems for Vehicular Ad Hoc Networks,” IEEE Journal on Selected Areas in Communications, Vol. 31, No. 9, Sept. 2013.
- A. Eslami, M. Nekoui, H. Pishro-Nik, F. Fekri, “Results on Finite Wireless Sensor Networks: Connectivity and Coverage,” ACM Transactions on Sensor Networks, Vol. 9, No. 4, July 2013.
- A. Eslami, H. Pishro-Nik, “On Finite-Length Performance of Polar Codes: Stopping Sets, Error Floor, and Concatenated Design,” IEEE Transactions on Communications, Vol. 61, No. 3, pp. 919-929, 2013.
- A. Eslami, H. Pishro-Nik, “On Finite-Length Performance of Polar Codes: Stopping Sets, Error Floor, and Concatenated Design,” IEEE Transactions on Communications, Vol. 61, No. 3, pp. 919-929, 2013.
- A. Sheikholeslami, D. Goeckel, H. Pishro-Nik, “Everlasting Secrecy by Exploiting Non-Idealities of the Eavesdropper’s Receiver,” IEEE Journal of Selected Areas in Communications, Vol. 31, No. 9, pp. 1828-1839, 2013.
- M. Nekoui, H. Pishro-Nik, “Throughput Scaling Laws for Vehicular Ad Hoc Networks,” IEEE Transactions on Wireless Communications, Vol. 11, No. 8, pp. 2895-2905, 2012.
- M. Nekoui, H. Pishro-Nik, “Throughput-optimal number of relays in delay-bounded multi-hop ALOHA Networks,” IET Electronics Letters, Volume 47, Issue 23, Nov. 2011.
- H. Saeedi, A. Banihashemi, and H. Pishro-Nik, “Successive maximization for the systematic design of universally capacity approaching rate-compatible sequences of LDPC code ensembles over binary-input output-symmetric memoryless channels,” IEEE Transactions on Wireless Communications, VOL. 59, NO. 7, JULY 2011.
- M. Nekoui, H. Pishro-Nik, Daiheng Ni, “The Effect of IntelliDrive on the Efficiency of Highway Transportation Systems,“ International Journal of Vehicular Technology, Article ID 653542, Volume 2011.
- A. Eslami, S. Vangala and H. Pishro-Nik, “Hybrid channel codes for highly efficient FSO/RF communication systems,” IEEE Transactions on Communications, Vol. 58, No. 10, Oct 2010.
- A. Eslami, M. Nekoui, Pishro-Nik, “Results on Finite Wireless Networks on a Line”, IEEE Transactions on Communications, Vol. 58, No. 8, 2010.
- M. Nekoui, D. Ni, Hossein Pishro-Nik, Richa Prasad, Mohammed Kanjee, Hui Zhu, Thai Nguyen, “Development of a VII-enabled prototype intersection collision warning system,” International Journal of Internet Protocol Technology, Volume 4, Number 3, p.p. 173 – 181, 2009.
- H. Pishro-Nik, K. Chan, and F. Fekri, “Connectivity properties of large-scale sensor networks,“ Wireless Networks Springer, PP 945-964, 2009.
- W. L. Leow, D. Ni, and Hossein Pishro-Nik, “A Sampling Theorem Approach to Traffic Sensor Optimization,” IEEE Transactions on Intelligent Transportation Systems. Vol. 9, No. 2, pp. 369-374. 2008.
- N. Rahnavard, H. Pishro-Nik, F. Fekri, “Unequal error protection using LDPC codes,” IEEE Trans. Commun., Vol. 55 , Page(s): 387 – 391, 2007.
- H. Pishro-Nik and F. Fekri, “Results on punctured low-density parity-check codes and improved iterative decoding techniques,” IEEE Trans. Inform. Theory. Vol. 53, No. 2, pp. 599-614, February 2007.
- H. Pishro-Nik and F. Fekri, “Performance of low-density parity-check codes with linear minimum distance,” IEEE Trans. Inform. Theory, Vol. 52, No. 1, pp. 292-300, Jan 2006.
- H. Pishro-Nik, N. Rahnavard, and F. Fekri, “Non-uniform error correction using low-density parity check codes,” IEEE Trans. Inform. Theory, Vol. 51, No. 7, pp. 2702-2714, July 2005.
- H. Pishro-Nik and F. Fekri, “Irregular repeat-accumulate codes for volume holographic memory systems,” Journal of Applied Optics, Vol. 43 No.27, pp. 5222-5227, September 2004.
- H. Pishro-Nik and F. Fekri, “On decoding of LDPC codes over the erasure channel,” IEEE Trans. Inform. Theory. Vol. 50, No. 3, pp. 439-454, March 2004.
- H. Pishro-Nik, N. Rahnavard, J. Ha, F. Fekri, and A. Adibi, “Low-density parity-check codes for volume holographic memory systems,” Journal of Applied Optics, Vol. 42 No.5 pp. 861-870, February 2003.