
Mahdi Jafari Siavoshani
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2021
- [i22]Mahdi Jafari Siavoshani, Seyed Pooya Shariatpanahi:
Intelligent Reflecting Surfaces for Compute-and-Forward. CoRR abs/2101.05607 (2021) - 2020
- [j7]Mohammad Lotfollahi
, Mahdi Jafari Siavoshani
, Ramin Shirali Hossein Zade, Mohammdsadegh Saberian:
Deep packet: a novel approach for encrypted traffic classification using deep learning. Soft Comput. 24(3): 1999-2012 (2020) - [j6]Mahdi Jafari Siavoshani
, Farzad Parvaresh
, Ali Pourmiri
, Seyed Pooya Shariatpanahi
:
Coded Load Balancing in Cache Networks. IEEE Trans. Parallel Distributed Syst. 31(2): 347-358 (2020) - [i21]Mahdi Soltani, Mahdi Jafari Siavoshani, Amir Hossein Jahangir:
A Content-Based Deep Intrusion Detection System. CoRR abs/2001.05009 (2020) - [i20]Aida Ramezani, Amirhossein Khajehpour, Mahdi Jafari Siavoshani:
On Multi-Session Website Fingerprinting over TLS Handshake. CoRR abs/2009.09284 (2020) - [i19]Amir Hossein Estiri, Mohammad Reza Sabramooz, Ali Banaei, Amir Hossein Dehghan, Benyamin Jamialahmadi, Mahdi Jafari Siavoshani:
A Variational Auto-Encoder Approach for Image Transmission in Wireless Channel. CoRR abs/2010.03967 (2020) - [i18]Mahdi Jafari Siavoshani, Amirhossein Khajepour, Amirmohammad Ziaei, Amir Ali Gatmiri, Ali Taheri:
Machine Learning Interpretability Meets TLS Fingerprinting. CoRR abs/2011.06304 (2020)
2010 – 2019
- 2019
- [i17]Hamid Ghasemi, Mahdi Jafari Siavoshani, Saeed Hadadan:
A Novel Communication Cost Aware Load Balancing in Content Delivery Networks using Honeybee Algorithm. CoRR abs/1902.04463 (2019) - [i16]Saeed Masoudian
, Ali Arabzadeh, Mahdi Jafari Siavoshani, Milad Jalal, Alireza Amouzad:
Adaptive Online Learning for Gradient-Based Optimizers. CoRR abs/1906.00290 (2019) - 2018
- [j5]Mahdi Jafari Siavoshani
, Ali Pourmiri
, Seyed Pooya Shariatpanahi
:
Storage, Communication, and Load Balancing Trade-off in Distributed Cache Networks. IEEE Trans. Parallel Distributed Syst. 29(4): 943-957 (2018) - [c19]Seyed Pooya Shariatpanahi, Mahdi Jafari Siavoshani, Mohammad Ali Maddah-Ali:
Multi-Message Private Information Retrieval with Private Side Information. ITW 2018: 1-5 - [c18]Mohammad H. Amerimehr, Seyed Pooya Shariatpanahi, Mahdi Jafari Siavoshani, Farid Ashtiani
, Mojtaba Mazoochi:
Performance analysis of network coding-based content delivery in dual interface cellular networks. IWCIT 2018: 1-6 - [i15]Seyed Pooya Shariatpanahi, Mahdi Jafari Siavoshani, Mohammad Ali Maddah-Ali:
Multi-Message Private Information Retrieval with Private Side Information. CoRR abs/1805.11892 (2018) - 2017
- [j4]Mahdi Jafari Siavoshani
, Shaunak Mishra, Christina Fragouli, Suhas N. Diggavi:
Multi-Party Secret Key Agreement Over State-Dependent Wireless Broadcast Channels. IEEE Trans. Inf. Forensics Secur. 12(2): 323-337 (2017) - [c17]Ali Pourmiri
, Mahdi Jafari Siavoshani, Seyed Pooya Shariatpanahi:
Proximity-Aware Balanced Allocations in Cache Networks. IPDPS 2017: 1068-1077 - [c16]Mahdi Jafari Siavoshani, Seyed Pooya Shariatpanahi, Hamid Ghasemi, Ali Pourmiri
:
On communication cost vs. load balancing in Content Delivery Networks. ISCC 2017: 651-656 - [i14]Mahdi Jafari Siavoshani, Ali Pourmiri, Seyed Pooya Shariatpanahi:
Storage, Communication, and Load Balancing Trade-off in Distributed Cache Networks. CoRR abs/1706.10209 (2017) - [i13]Mahdi Jafari Siavoshani, Farzad Parvaresh, Ali Pourmiri, Seyed Pooya Shariatpanahi:
Coded Load Balancing in Cache Networks. CoRR abs/1707.09757 (2017) - [i12]Mohammad Lotfollahi, Ramin Shirali Hossein Zade, Mahdi Jafari Siavoshani, Mohammdsadegh Saberian:
Deep Packet: A Novel Approach For Encrypted Traffic Classification Using Deep Learning. CoRR abs/1709.02656 (2017) - 2016
- [c15]Farzin Haddadpour, Mahdi Jafari Siavoshani, Morteza Noshad:
Low-complexity stochastic Generalized Belief Propagation. ISIT 2016: 785-789 - [i11]Mahdi Jafari Siavoshani, Shaunak Mishra, Christina Fragouli, Suhas N. Diggavi:
Group secret key agreement over state-dependent wireless broadcast channels. CoRR abs/1604.02380 (2016) - [i10]Farzin Haddadpour, Mahdi Jafari Siavoshani, Morteza Noshad:
Low-Complexity Stochastic Generalized Belief Propagation. CoRR abs/1605.02046 (2016) - [i9]Mahdi Jafari Siavoshani, Seyed Pooya Shariatpanahi, Hamid Ghasemi, Ali Pourmiri:
On Communication Cost vs. Load Balancing in Content Delivery Networks. CoRR abs/1610.04513 (2016) - [i8]Ali Pourmiri, Mahdi Jafari Siavoshani, Seyed Pooya Shariatpanahi:
Proximity-Aware Balanced Allocations in Cache Networks. CoRR abs/1610.05961 (2016) - 2015
- [c14]Chun Lam Chan, Mahdi Jafari Siavoshani, Sidharth Jaggi, Navin Kashyap, Pascal O. Vontobel:
Generalized belief propagation for estimating the partition function of the 2D Ising model. ISIT 2015: 2261-2265 - [c13]Javad B. Ebrahimi, Mahdi Jafari Siavoshani:
On linear index coding from graph homomorphism perspective. ITA 2015: 220-229 - 2014
- [c12]Javad B. Ebrahimi, Mahdi Jafari Siavoshani:
Linear index coding via graph homomorphism. CoDIT 2014: 158-163 - [c11]Javad B. Ebrahimi, Mahdi Jafari Siavoshani:
On index coding and graph homomorphism. ITW 2014: 541-545 - [i7]Javad B. Ebrahimi, Mahdi Jafari Siavoshani:
On Index Coding and Graph Homomorphism. CoRR abs/1408.7019 (2014) - [i6]Javad B. Ebrahimi, Mahdi Jafari Siavoshani:
Linear Index Coding via Graph Homomorphism. CoRR abs/1410.1371 (2014) - 2013
- [c10]Farzin Haddadpour, Mahdi Jafari Siavoshani, Mayank Bakshi
, Sidharth Jaggi:
On AVCs with quadratic constraints. ISIT 2013: 271-275 - [i5]Farzin Haddadpour, Mahdi Jafari Siavoshani, Mayank Bakshi, Sidharth Jaggi:
On AVCs with Quadratic Constraints. CoRR abs/1301.6345 (2013) - 2012
- [j3]Mahdi Jafari Siavoshani, Christina Fragouli, Suhas N. Diggavi:
Subspace Properties of Network Coding and Their Applications. IEEE Trans. Inf. Theory 58(5): 2599-2619 (2012) - [c9]Mahdi Jafari Siavoshani, Shenghao Yang, Raymond W. Yeung:
Non-coherent network coding: An arbitrarily varying channel approach. ISIT 2012: 1672-1676 - [c8]Mahdi Jafari Siavoshani, Christina Fragouli:
Multi-terminal secrecy in a linear non-coherent packetized networks. NetCod 2012: 85-90 - [i4]Mahdi Jafari Siavoshani, Christina Fragouli:
Multi-terminal Secrecy in a Linear Non-coherent Packetized Networks. CoRR abs/1206.3133 (2012) - 2011
- [j2]Mahdi Jafari Siavoshani, Soheil Mohajer, Christina Fragouli, Suhas N. Diggavi:
On the Capacity of Noncoherent Network Coding. IEEE Trans. Inf. Theory 57(2): 1046-1066 (2011) - [c7]Mahdi Jafari Siavoshani, Shaunak Mishra, Suhas N. Diggavi, Christina Fragouli:
Group secret key agreement over state-dependent wireless broadcast channels. ISIT 2011: 1960-1964 - [i3]Mahdi Jafari Siavoshani, U. Pulleti, Emre Atsan, Iris Safaka, Christina Fragouli, Katerina J. Argyraki, Suhas N. Diggavi:
Exchanging Secrets without Using Cryptography. CoRR abs/1105.4991 (2011) - [i2]Mahdi Jafari Siavoshani, Christina Fragouli, Suhas N. Diggavi:
Subspace Properties of Network Coding and their Applications. CoRR abs/1106.5387 (2011) - 2010
- [j1]Lorenzo Keller, Mahdi Jafari Siavoshani, Christina Fragouli, Katerina J. Argyraki, Suhas N. Diggavi:
Joint identity-message coding. IEEE J. Sel. Areas Commun. 28(7): 1083-1093 (2010) - [i1]Mahdi Jafari Siavoshani, Soheil Mohajer, Christina Fragouli, Suhas N. Diggavi:
On the Capacity of Non-Coherent Network Coding. CoRR abs/1001.1658 (2010)
2000 – 2009
- 2009
- [c6]Lorenzo Keller, Mahdi Jafari Siavoshani, Christina Fragouli, Katerina J. Argyraki, Suhas N. Diggavi:
Identity Aware Sensor Networks. INFOCOM 2009: 2177-2185 - [c5]Mahdi Jafari Siavoshani, Lorenzo Keller, Christina Fragouli, Katerina J. Argyraki:
Compressed network coding vectors. ISIT 2009: 109-113 - [c4]Mahdi Jafari Siavoshani, Soheil Mohajer, Christina Fragouli, Suhas N. Diggavi:
On the capacity of non-coherent network coding. ISIT 2009: 273-277 - [c3]Soheil Mohajer, Mahdi Jafari Siavoshani, Suhas N. Diggavi, Christina Fragouli:
On the capacity of multisource non-coherent network coding. ITW 2009: 130-134 - 2008
- [c2]Mahdi Jafari Siavoshani, Christina Fragouli, Suhas N. Diggavi:
Noncoherent multisource network coding. ISIT 2008: 817-821 - 2007
- [c1]Mahdi Jafari Siavoshani, Christina Fragouli, Suhas N. Diggavi:
Subspace Properties of Randomized Network Coding. ITW 2007: 1-5
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
load content from web.archive.org
Privacy notice: By enabling the option above, your browser will contact the API of web.archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
Tweets on dblp homepage
Show tweets from on the dblp homepage.
Privacy notice: By enabling the option above, your browser will contact twitter.com and twimg.com to load tweets curated by our Twitter account. At the same time, Twitter will persistently store several cookies with your web browser. While we did signal Twitter to not track our users by setting the "dnt" flag, we do not have any control over how Twitter uses your data. So please proceed with care and consider checking the Twitter privacy policy.
last updated on 2021-01-25 00:09 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint