default search action
Aidin Ferdowsi
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j13]Aidin Ferdowsi, Walid Saad:
Brainstorming Generative Adversarial Network (BGAN): Toward Multiagent Generative Models With Distributed Data Sets. IEEE Internet Things J. 11(5): 7828-7840 (2024) - [j12]Tengchan Zeng, Aidin Ferdowsi, Omid Semiari, Walid Saad, Choong Seon Hong:
Convergence of Communications, Control, and Machine Learning for Secure and Autonomous Vehicle Navigation. IEEE Wirel. Commun. 31(4): 132-138 (2024) - 2023
- [i24]Tengchan Zeng, Aidin Ferdowsi, Omid Semiari, Walid Saad, Choong Seon Hong:
Convergence of Communications, Control, and Machine Learning for Secure and Autonomous Vehicle Navigation. CoRR abs/2307.02663 (2023) - 2022
- [j11]Qianqian Zhang, Aidin Ferdowsi, Walid Saad, Mehdi Bennis:
Distributed Conditional Generative Adversarial Networks (GANs) for Data-Driven Millimeter Wave Communications in UAV Networks. IEEE Trans. Wirel. Commun. 21(3): 1438-1452 (2022) - 2021
- [j10]Aidin Ferdowsi, Walid Saad, Narayan B. Mandayam:
Colonel Blotto Game for Sensor Protection in Interdependent Critical Infrastructure. IEEE Internet Things J. 8(4): 2857-2874 (2021) - [j9]Aidin Ferdowsi, AbdelRahman Eldosouky, Walid Saad:
Interdependence-Aware Game-Theoretic Framework for Secure Intelligent Transportation Systems. IEEE Internet Things J. 8(22): 16395-16405 (2021) - [j8]Aidin Ferdowsi, Mohamed A. Abd-Elmagid, Walid Saad, Harpreet S. Dhillon:
Neural Combinatorial Deep Reinforcement Learning for Age-Optimal Joint Trajectory and Scheduling Design in UAV-Assisted Networks. IEEE J. Sel. Areas Commun. 39(5): 1250-1265 (2021) - [j7]Ali Pourranjbar, Georges Kaddoum, Aidin Ferdowsi, Walid Saad:
Reinforcement Learning for Deceiving Reactive Jammers in Wireless Networks. IEEE Trans. Commun. 69(6): 3682-3697 (2021) - [c10]Aidin Ferdowsi, David Whitefield:
Deep Learning for Rain Fade Prediction in Satellite Communications. GLOBECOM (Workshops) 2021: 1-6 - [c9]Qianqian Zhang, Aidin Ferdowsi, Walid Saad:
Distributed Generative Adversarial Networks for mmWave Channel Modeling in Wireless UAV Networks. ICC 2021: 1-6 - [c8]Biplav Choudhury, Vijay K. Shah, Aidin Ferdowsi, Jeffrey H. Reed, Y. Thomas Hou:
AoI-minimizing Scheduling in UAV-relayed IoT Networks. MASS 2021: 117-126 - [i23]Qianqian Zhang, Aidin Ferdowsi, Walid Saad, Mehdi Bennis:
Distributed Conditional Generative Adversarial Networks (GANs) for Data-Driven Millimeter Wave Communications in UAV Networks. CoRR abs/2102.01751 (2021) - [i22]Qianqian Zhang, Aidin Ferdowsi, Walid Saad:
Distributed Generative Adversarial Networks for mmWaveChannel Modeling in Wireless UAV Networks. CoRR abs/2102.10836 (2021) - [i21]Ali Pourranjbar, Georges Kaddoum, Aidin Ferdowsi, Walid Saad:
Reinforcement Learning for Deceiving Reactive Jammers in Wireless Networks. CoRR abs/2103.14056 (2021) - [i20]Biplav Choudhury, Vijay K. Shah, Aidin Ferdowsi, Jeffrey H. Reed, Y. Thomas Hou:
AoI-minimizing Scheduling in UAV-relayed IoT Networks. CoRR abs/2107.05181 (2021) - [i19]Aidin Ferdowsi, David Whitefield:
Deep Learning for Rain Fade Prediction in Satellite Communications. CoRR abs/2110.00695 (2021) - [i18]Mohammad Aghapour, Aidin Ferdowsi, Walid Saad:
Two-Bit Aggregation for Communication Efficient and Differentially Private Federated Learning. CoRR abs/2110.03017 (2021) - 2020
- [j6]AbdelRahman Eldosouky, Aidin Ferdowsi, Walid Saad:
Drones in Distress: A Game-Theoretic Countermeasure for Protecting UAVs Against GPS Spoofing. IEEE Internet Things J. 7(4): 2840-2854 (2020) - [j5]Samad Ali, Aidin Ferdowsi, Walid Saad, Nandana Rajatheva, Jussi Haapola:
Sleeping Multi-Armed Bandit Learning for Fast Uplink Grant Allocation in Machine Type Communications. IEEE Trans. Commun. 68(8): 5072-5086 (2020) - [i17]Aidin Ferdowsi, Walid Saad:
Brainstorming Generative Adversarial Networks (BGANs): Towards Multi-Agent Generative Models with Distributed Private Datasets. CoRR abs/2002.00306 (2020) - [i16]Aidin Ferdowsi, Mohamed A. Abd-Elmagid, Walid Saad, Harpreet S. Dhillon:
Neural Combinatorial Deep Reinforcement Learning for Age-optimal Joint Trajectory and Scheduling Design in UAV-assisted Networks. CoRR abs/2006.15863 (2020) - [i15]Aidin Ferdowsi, AbdelRahman Eldosouky, Walid Saad:
Interdependence-Aware Game-Theoretic Framework for Secure Intelligent Transportation Systems. CoRR abs/2007.05904 (2020)
2010 – 2019
- 2019
- [j4]Aidin Ferdowsi, Walid Saad:
Deep Learning for Signal Authentication and Security in Massive Internet-of-Things Systems. IEEE Trans. Commun. 67(2): 1371-1387 (2019) - [j3]Aidin Ferdowsi, Samad Ali, Walid Saad, Narayan B. Mandayam:
Cyber-Physical Security and Safety of Autonomous Connected Vehicles: Optimal Control Meets Multi-Armed Bandit Learning. IEEE Trans. Commun. 67(10): 7228-7244 (2019) - [j2]Aidin Ferdowsi, Ursula Challita, Walid Saad:
Deep Learning for Reliable Mobile Edge Analytics in Intelligent Transportation Systems: An Overview. IEEE Veh. Technol. Mag. 14(1): 62-70 (2019) - [j1]Ursula Challita, Aidin Ferdowsi, Mingzhe Chen, Walid Saad:
Machine Learning for Wireless Connectivity and Security of Cellular-Connected UAVs. IEEE Wirel. Commun. 26(1): 28-35 (2019) - [c7]Mohamed A. Abd-Elmagid, Aidin Ferdowsi, Harpreet S. Dhillon, Walid Saad:
Deep Reinforcement Learning for Minimizing Age-of-Information in UAV-Assisted Networks. GLOBECOM 2019: 1-6 - [c6]Aidin Ferdowsi, Walid Saad:
Generative Adversarial Networks for Distributed Intrusion Detection in the Internet of Things. GLOBECOM 2019: 1-6 - [i14]AbdelRahman Eldosouky, Aidin Ferdowsi, Walid Saad:
Drones in Distress: A Game-Theoretic Countermeasure for Protecting UAVs Against GPS Spoofing. CoRR abs/1904.11568 (2019) - [i13]Mohamed A. Abd-Elmagid, Aidin Ferdowsi, Harpreet S. Dhillon, Walid Saad:
Deep Reinforcement Learning for Minimizing Age-of-Information in UAV-assisted Networks. CoRR abs/1905.02993 (2019) - [i12]Aidin Ferdowsi, Walid Saad:
Generative Adversarial Networks for Distributed Intrusion Detection in the Internet of Things. CoRR abs/1906.00567 (2019) - 2018
- [c5]Aidin Ferdowsi, Anibal Sanjab, Walid Saad, Tamer Basar:
Generalized Colonel Blotto Game. ACC 2018: 5744-5749 - [c4]Samad Ali, Aidin Ferdowsi, Walid Saad, Nandana Rajatheva:
Sleeping Multi-Armed Bandits for Fast Uplink Grant Allocation in Machine Type Communications. GLOBECOM Workshops 2018: 1-6 - [c3]Aidin Ferdowsi, Walid Saad:
Deep Learning-Based Dynamic Watermarking for Secure Signal Authentication in the Internet of Things. ICC 2018: 1-6 - [c2]Aidin Ferdowsi, Ursula Challita, Walid Saad, Narayan B. Mandayam:
Robust Deep Reinforcement Learning for Security and Safety in Autonomous Vehicle Systems. ITSC 2018: 307-312 - [i11]Aidin Ferdowsi, Walid Saad:
Deep Learning for Signal Authentication and Security in Massive Internet of Things Systems. CoRR abs/1803.00916 (2018) - [i10]Ursula Challita, Aidin Ferdowsi, Mingzhe Chen, Walid Saad:
Artificial Intelligence for Wireless Connectivity and Security of Cellular-Connected UAVs. CoRR abs/1804.05348 (2018) - [i9]Aidin Ferdowsi, Ursula Challita, Walid Saad, Narayan B. Mandayam:
Robust Deep Reinforcement Learning for Security and Safety in Autonomous Vehicle Systems. CoRR abs/1805.00983 (2018) - [i8]Samad Ali, Aidin Ferdowsi, Walid Saad, Nandana Rajatheva, Jussi Haapola:
Sleeping Multi-Armed Bandit Learning for Fast Uplink Grant Allocation in Machine Type Communications. CoRR abs/1810.12983 (2018) - [i7]Aidin Ferdowsi, Samad Ali, Walid Saad, Narayan B. Mandayam:
Cyber-Physical Security and Safety of Autonomous Connected Vehicles: Optimal Control Meets Multi-Armed Bandit Learning. CoRR abs/1812.05298 (2018) - 2017
- [c1]Aidin Ferdowsi, Walid Saad, Behrouz Maham, Narayan B. Mandayam:
A colonel blotto game for interdependence-aware cyber-physical systems security in smart cities. SCOPE@CPSWeek 2017: 7-12 - [i6]Aidin Ferdowsi, Walid Saad, Behrouz Maham, Narayan B. Mandayam:
A Colonel Blotto Game for Interdependence-Aware Cyber-Physical Systems Security in Smart Cities. CoRR abs/1705.08338 (2017) - [i5]Aidin Ferdowsi, Anibal Sanjab, Walid Saad, Narayan B. Mandayam:
Game Theory for Secure Critical Interdependent Gas-Power-Water Infrastructure. CoRR abs/1707.04589 (2017) - [i4]Aidin Ferdowsi, Walid Saad, Narayan B. Mandayam:
Colonel Blotto Game for Secure State Estimation in Interdependent Critical Infrastructure. CoRR abs/1709.09768 (2017) - [i3]Aidin Ferdowsi, Anibal Sanjab, Walid Saad, Tamer Basar:
Generalized Colonel Blotto Game. CoRR abs/1710.01381 (2017) - [i2]Aidin Ferdowsi, Walid Saad:
Deep Learning-Based Dynamic Watermarking for Secure Signal Authentication in the Internet of Things. CoRR abs/1711.01306 (2017) - [i1]Aidin Ferdowsi, Ursula Challita, Walid Saad:
Deep Learning for Reliable Mobile Edge Analytics in Intelligent Transportation Systems. CoRR abs/1712.04135 (2017)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-08-13 21:44 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint