default search action
Ali Eslami
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j19]Michael Okwori, Ali Eslami:
Feature engineering from meta-data for prediction of differentially expressed genes: An investigation of Mus musculus exposed to space-conditions. Comput. Biol. Chem. 109: 108026 (2024) - [c20]Ali Eslami, Khashayar Khorasani:
Cyber-Attack Detection and Isolation in Event-Based Cyber-Physical Systems. ACC 2024: 1-7 - [c19]Ali Eslami, MohamadGhasem Kazemi, Khashayar Khorasani:
Event-Based Covert Cyber-Attack in Switching Cyber-Physical Systems: Design and Detection Mechanisms. SysCon 2024: 1-7 - 2023
- [c18]Stephen Kotiang, Ali Eslami:
Boolean Factor Graph Modeling and Analysis of Gene Graphs: Budding Yeast Cell-Cycle. CISS 2023: 1-6 - [c17]Ali Eslami, Khashayar Khorasani:
Detection of Event-Based Covert Attacks in Cyber-Physical Systems. CoDIT 2023: 920-925 - [c16]Ali Eslami, Khashayar Khorasani:
Cyber-Attack Detection by Using Event-Based Control in Multi-Agent Cyber-Physical Systems. ECC 2023: 1-6 - 2022
- [j18]Stephen Kotiang, Ali Eslami:
Density Evolution for Noise Propagation Analysis in Biological Networks. IEEE Access 10: 4261-4270 (2022) - [j17]Ali Eslami, Farzaneh Abdollahi, Khashayar Khorasani:
Stochastic fault and cyber-attack detection and consensus control in multi-agent systems. Int. J. Control 95(9): 2379-2397 (2022) - 2021
- [j16]Stephen Kotiang, Ali Eslami:
Boolean factor graph model for biological systems: the yeast cell-cycle network. BMC Bioinform. 22(1): 442 (2021) - [c15]Michael Okwori, Ali Eslami:
CGN-MPred: Cofunctional Gene Network-based Mutation Prediction from Exposure Conditions. BIBM 2021: 2451-2455 - 2020
- [j15]Michael Okwori, Ali Behfarnia, Ali Eslami:
Towards Microscale NFC-Enabled IoT Sensors: Physical and MAC Layer Design Analysis. IEEE Access 8: 88076-88084 (2020) - [j14]Michael Okwori, Ali Eslami:
Investigating the Impact of Gene Cofunctionality in Predicting Gene Mutations of E. coli. IEEE Access 8: 167397-167410 (2020) - [j13]Stephen Kotiang, Ali Eslami:
A probabilistic graphical model for system-wide analysis of gene regulatory networks. Bioinform. 36(10): 3192-3199 (2020) - [j12]Mohammad Nekoui, Lichung Chu, Ali Eslami:
Energy-Efficient Optimal Admission Control for Body Area Networks. IEEE Trans. Green Commun. Netw. 4(4): 956-972 (2020) - [j11]Mohammad Nadji-Tehrani, Ali Eslami:
A Brain-Inspired Framework for Evolutionary Artificial General Intelligence. IEEE Trans. Neural Networks Learn. Syst. 31(12): 5257-5271 (2020) - [c14]Mohammad Nadji-Tehrani, Ali Eslami:
A Brain-Inspired Framework for Evolutionary Artificial General Intelligence. ITA 2020: 1-18
2010 – 2019
- 2019
- [j10]Ali Behfarnia, Ali Eslami:
Misbehavior Detection in Ephemeral Networks: A Local Voting Game in Presence of Uncertainty. IEEE Access 7: 184629-184642 (2019) - [c13]Ali Behfarnia, Ali Eslami:
Local Voting Games for Misbehavior Detection in VANETs in Presence of Uncertainty. Allerton 2019: 480-486 - [i8]Ali Behfarnia, Ali Eslami:
Risk Assessment of Autonomous Vehicles Using Bayesian Defense Graphs. CoRR abs/1903.02034 (2019) - [i7]Ali Behfarnia, Ali Eslami:
Local Voting Games for Misbehavior Detection in VANETs in Presence of Uncertainty. CoRR abs/1909.06693 (2019) - 2018
- [c12]Ali Behfarnia, Ali Eslami:
Risk Assessment of Autonomous Vehicles Using Bayesian Defense Graphs. VTC Fall 2018: 1-5 - [i6]Michael Okwori, Ali Behfarnia, Phanikumar Vuka, Ali Eslami:
A Micro-Scale Mobile-Enabled Implantable Medical Sensor. CoRR abs/1806.06163 (2018) - 2017
- [j9]Ali Behfarnia, Ali Eslami:
Error Correction Coding Meets Cyber-Physical Systems: Message-Passing Analysis of Self-Healing Interdependent Networks. IEEE Trans. Commun. 65(7): 2753-2768 (2017) - [j8]Dan Lv, Ali Eslami, Shuguang Cui:
Load-Dependent Cascading Failures in Finite-Size Erdös-Rényi Random Networks. IEEE Trans. Netw. Sci. Eng. 4(2): 129-139 (2017) - 2016
- [j7]Ali Eslami, Chuan Huang, Junshan Zhang, Shuguang Cui:
Cascading Failures in Load-Dependent Finite-Size Random Geometric Networks. IEEE Trans. Netw. Sci. Eng. 3(4): 183-196 (2016) - [c11]Ali Behfarnia, Ali Eslami:
Dynamics and Steady-State Behavior of Self-Healing Cyber-Physical Networks in Light of Cyber-Node Delays. GLOBECOM Workshops 2016: 1-6 - [c10]Ali Behfarnia, Ali Eslami:
Message Passing for Analysis and Resilient Design of Self-Healing Interdependent Cyber-Physical Networks. ICCCN 2016: 1-6 - [i5]Ali Behfarnia, Ali Eslami:
Error Correction Coding Meets Cyber-Physical Systems: Message-Passing Analysis of Self-Healing Interdependent Networks. CoRR abs/1609.07796 (2016) - 2015
- [c9]Ali Eslami, Alfredo Velasco, Alireza Vahid, Georgios Mappouras, A. Robert Calderbank, Daniel J. Sorin:
Writing without Disturb on Phase Change Memories by Integrating Coding and Layout Design. MEMSYS 2015: 71-77 - 2014
- [j6]Saeid Asadi, Vahid Azimirad, Ali Eslami, Saeid Karimian Eghbal:
Immune-wavelet optimization for path planning of large-scale robots. Robotica 32(1): 77-95 (2014) - [j5]Ali Eslami, Hengameh Keshavarz:
User Capacity Scaling Laws of Multi-user Fading Channels in the Presence of MMSE Channel Estimators. Wirel. Pers. Commun. 77(4): 2465-2482 (2014) - [c8]Ali Eslami, Chuan Huang, Junshan Zhang, Shuguang Cui:
An analytical approach to study cascading failures in finite-size random geometric networks. Allerton 2014: 1118-1125 - [c7]Dan Lv, Ali Eslami, Shuguang Cui:
Load-based cascading failure analysis in finite Erdös-Rényi random networks. GlobalSIP 2014: 886-890 - [c6]Armin Banaei, Ali Eslami, Costas N. Georghiades, Shuguang Cui:
Joint random spectrum sensing and access scheme for decentralized cognitive radio networks. ICC 2014: 1391-1396 - [i4]Ali Eslami, Chuan Huang, Junshan Zhang, Shuguang Cui:
Cascading Failures in Finite-Size Random Geometric Networks. CoRR abs/1410.3512 (2014) - 2013
- [j4]Ali Eslami, Hossein Pishro-Nik:
On Finite-Length Performance of Polar Codes: Stopping Sets, Error Floor, and Concatenated Design. IEEE Trans. Commun. 61(3): 919-929 (2013) - [j3]Ali Eslami, Mohammad Nekoui, Hossein Pishro-Nik, Faramarz Fekri:
Results on finite wireless sensor networks: Connectivity and coverage. ACM Trans. Sens. Networks 9(4): 51:1-51:22 (2013) - 2012
- [c5]Hosein Mamani, Hamid Saeedi, Ali Eslami, Hossein Pishro-Nik:
On Generalized EXIT charts of LDPC code ensembles over binary-input output-symmetric memoryless channels. ISIT 2012: 2336-2340 - [i3]Ali Eslami, Hossein Pishro-Nik:
On Finite-Length Performance of Polar Codes: Stopping Sets, Error Floor, and Concatenated Design. CoRR abs/1211.2187 (2012) - [i2]Ali Eslami, Mohammad Nekoui, Hossein Pishro-Nik, Faramarz Fekri:
Results on Finite Wireless Sensor Networks: Connectivity and Coverage. CoRR abs/1211.2198 (2012) - 2011
- [c4]Ali Eslami, Hossein Pishro-Nik:
A practical approach to polar codes. ISIT 2011: 16-20 - [i1]Ali Eslami, Hossein Pishro-Nik:
A Practical Approach to Polar Codes. CoRR abs/1107.5355 (2011) - 2010
- [j2]Ali Eslami, Mohammad Nekoui, Hossein Pishro-Nik:
Results on Finite Wireless Networks on a Line. IEEE Trans. Commun. 58(8): 2204-2211 (2010) - [j1]Ali Eslami, Sarma Vangala, Hossein Pishro-Nik:
Hybrid Channel Codes for Efficient FSO/RF Communication Systems. IEEE Trans. Commun. 58(10): 2926-2938 (2010) - [c3]Ali Eslami, Hossein Pishro-Nik:
On bit error rate performance of polar codes in finite regime. Allerton 2010: 188-194
2000 – 2009
- 2008
- [c2]Mohammad Nekoui, Ali Eslami, Hossein Pishro-Nik:
Scaling Laws for Distance Limited Communications in Vehicular Ad Hoc Networks. ICC 2008: 2253-2257 - [c1]Mohammad Nekoui, Ali Eslami, Hossein Pishro-Nik:
The capacity of Vehicular Ad Hoc Networks with infrastructure. WiOpt 2008: 267-272
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 22:21 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint