default search action
Hossein Pishro-Nik
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
Books and Theses
- 2005
- [b1]Hossein Pishro-Nik:
Applications of Random Graphs to Design and Analysis of LDPC Codes and Sensor Networks. Georgia Institute of Technology, Atlanta, GA, USA, 2005
Journal Articles
- 2023
- [j36]Saeede Enayati, Dennis Goeckel, Amir Houmansadr, Hossein Pishro-Nik:
Location Privacy Protection for UAVs in Package Delivery and IoT Data Collection. IEEE Internet Things J. 10(23): 20586-20601 (2023) - 2022
- [j35]Bahareh Jafari, Hamid Saeedi, Saeede Enayati, Hossein Pishro-Nik:
Energy-Optimized Path Planning for Moving Aerial Base Stations: A Non User-Oriented Framework. IEEE Commun. Lett. 26(3): 672-676 (2022) - [j34]Bo Guan, Nazanin Takbiri, Dennis Goeckel, Amir Houmansadr, Hossein Pishro-Nik:
Superstring-Based Sequence Obfuscation to Thwart Pattern Matching Attacks. IEEE Internet Things J. 9(23): 23348-23365 (2022) - 2021
- [j33]Nazanin Takbiri, Minting Chen, Dennis L. Goeckel, Amir Houmansadr, Hossein Pishro-Nik:
Asymptotic Privacy Loss Due to Time Series Matching of Dependent Users. IEEE Commun. Lett. 25(4): 1079-1083 (2021) - [j32]Mohammadjavad Khosravi, Saeede Enayati, Hamid Saeedi, Hossein Pishro-Nik:
Multi-Purpose Drones for Coverage and Transport Applications. IEEE Trans. Wirel. Commun. 20(6): 3974-3987 (2021) - 2020
- [j31]Narges Gholipoor, Saeedeh Parsaeefard, Mohammad Reza Javan, Nader Mokari, Hamid Saeedi, Hossein Pishro-Nik:
Resource Management and Admission Control for Tactile Internet in Next Generation of Radio Access Network. IEEE Access 8: 136261-136277 (2020) - [j30]Saeede Enayati, Hossein Pishro-Nik:
A Framework for Probabilistic Decision-Making Using Change-of-Probability Measures. IEEE Access 8: 159331-159350 (2020) - [j29]Nazanin Takbiri, Amir Houmansadr, Dennis L. Goeckel, Hossein Pishro-Nik:
Privacy of Dependent Users Against Statistical Matching. IEEE Trans. Inf. Theory 66(9): 5842-5865 (2020) - [j28]Saeede Enayati, Hamid Saeedi, Hossein Pishro-Nik, Halim Yanikomeroglu:
Optimal Altitude Selection of Aerial Base Stations to Maximize Coverage and Energy Harvesting Probabilities: A Stochastic Geometry Analysis. IEEE Trans. Veh. Technol. 69(1): 1096-1100 (2020) - [j27]Nazanin Takbiri, Virat Shejwalkar, Amir Houmansadr, Dennis L. Goeckel, Hossein Pishro-Nik:
Leveraging Prior Knowledge Asymmetries in the Design of Location Privacy-Preserving Mechanisms. IEEE Wirel. Commun. Lett. 9(11): 2005-2009 (2020) - 2019
- [j26]Moslem Forouzesh, Paeiz Azmi, Nader Mokari, Kai-Kit Wong, Hossein Pishro-Nik:
Robust Physical Layer Security for Power Domain Non-Orthogonal Multiple Access-Based HetNets and HUDNs: SIC Avoidance at Eavesdroppers. IEEE Access 7: 107879-107896 (2019) - [j25]Nazanin Takbiri, Amir Houmansadr, Dennis L. Goeckel, Hossein Pishro-Nik:
Matching Anonymized and Obfuscated Time Series to Users' Profiles. IEEE Trans. Inf. Theory 65(2): 724-741 (2019) - [j24]Saeede Enayati, Hamid Saeedi, Hossein Pishro-Nik, Halim Yanikomeroglu:
Moving Aerial Base Station Networks: A Stochastic Geometry Analysis and Design Perspective. IEEE Trans. Wirel. Commun. 18(6): 2977-2988 (2019) - 2018
- [j23]Mohammad Moltafet, Nader Mokari, Mohammad Reza Javan, Hamid Saeedi, Hossein Pishro-Nik:
A New Multiple Access Technique for 5G: Power Domain Sparse Code Multiple Access (PSMA). IEEE Access 6: 747-759 (2018) - 2017
- [j22]Azadeh Sheikholeslami, Majid Ghaderi, Hossein Pishro-Nik, Dennis Goeckel:
Energy-Efficient Secrecy in Wireless Networks Based on Random Jamming. IEEE Trans. Commun. 65(6): 2522-2533 (2017) - [j21]Zarrin Montazeri, Amir Houmansadr, Hossein Pishro-Nik:
Achieving Perfect Location Privacy in Wireless Devices Using Anonymization. IEEE Trans. Inf. Forensics Secur. 12(11): 2683-2698 (2017) - [j20]Ali Rakhshan, Hossein Pishro-Nik:
Improving Safety on Highways by Customizing Vehicular Ad Hoc Networks. IEEE Trans. Wirel. Commun. 16(3): 2017-2026 (2017) - 2016
- [j19]Azadeh Sheikholeslami, Majid Ghaderi, Hossein Pishro-Nik, Dennis Goeckel:
Energy-Efficient Routing in Wireless Networks in the Presence of Jamming. IEEE Trans. Wirel. Commun. 15(10): 6828-6842 (2016) - 2015
- [j18]Azadeh Sheikholeslami, Dennis Goeckel, Hossein Pishro-Nik:
Jamming Based on an Ephemeral Key to Obtain Everlasting Security in Wireless Environments. IEEE Trans. Wirel. Commun. 14(11): 6072-6081 (2015) - 2013
- [j17]Mohammad Nekoui, Hossein Pishro-Nik:
Analytic Design of Active Safety Systems for Vehicular Ad hoc Networks. IEEE J. Sel. Areas Commun. 31(9-Supplement): 491-503 (2013) - [j16]Azadeh Sheikholeslami, Dennis Goeckel, Hossein Pishro-Nik:
Everlasting Secrecy by Exploiting Non-Idealities of the Eavesdropper's Receiver. IEEE J. Sel. Areas Commun. 31(9): 1828-1839 (2013) - [j15]Ali Eslami, Hossein Pishro-Nik:
On Finite-Length Performance of Polar Codes: Stopping Sets, Error Floor, and Concatenated Design. IEEE Trans. Commun. 61(3): 919-929 (2013) - [j14]Ali Eslami, Mohammad Nekoui, Hossein Pishro-Nik, Faramarz Fekri:
Results on finite wireless sensor networks: Connectivity and coverage. ACM Trans. Sens. Networks 9(4): 51:1-51:22 (2013) - 2012
- [j13]Mohammad Nekoui, Hossein Pishro-Nik:
Throughput Scaling Laws for Vehicular Ad Hoc Networks. IEEE Trans. Wirel. Commun. 11(8): 2895-2905 (2012) - 2011
- [j12]Hamid Saeedi, Hossein Pishro-Nik, Amir H. Banihashemi:
Successive Maximization for Systematic Design of Universally Capacity Approaching Rate-Compatible Sequences of LDPC Code Ensembles over Binary-Input Output-Symmetric Memoryless Channels. IEEE Trans. Commun. 59(7): 1807-1819 (2011) - 2010
- [j11]Hossein Pishro-Nik, Shahrokh Valaee, Maziar M. Nekovee:
Vehicular Ad Hoc Networks. EURASIP J. Adv. Signal Process. 2010 (2010) - [j10]Ali Eslami, Mohammad Nekoui, Hossein Pishro-Nik:
Results on Finite Wireless Networks on a Line. IEEE Trans. Commun. 58(8): 2204-2211 (2010) - [j9]Ali Eslami, Sarma Vangala, Hossein Pishro-Nik:
Hybrid Channel Codes for Efficient FSO/RF Communication Systems. IEEE Trans. Commun. 58(10): 2926-2938 (2010) - 2009
- [j8]Mohammad Nekoui, Daiheng Ni, Hossein Pishro-Nik, Richa Prasad, Mohammed Raza Kanjee, Hui Zhu, Thai Nguyen:
Development of a VII-enabled prototype intersection collision warning system. Int. J. Internet Protoc. Technol. 4(3): 173-181 (2009) - [j7]Hossein Pishro-Nik, Kevin Sean Chan, Faramarz Fekri:
Connectivity properties of large-scale sensor networks. Wirel. Networks 15(7): 945-964 (2009) - 2008
- [j6]Woei Ling Leow, Daiheng Ni, Hossein Pishro-Nik:
A Sampling Theorem Approach to Traffic Sensor Optimization. IEEE Trans. Intell. Transp. Syst. 9(2): 369-374 (2008) - 2007
- [j5]Nazanin Rahnavard, Hossein Pishro-Nik, Faramarz Fekri:
Unequal Error Protection Using Partially Regular LDPC Codes. IEEE Trans. Commun. 55(3): 387-391 (2007) - [j4]Hossein Pishro-Nik, Faramarz Fekri:
Results on Punctured Low-Density Parity-Check Codes and Improved Iterative Decoding Techniques. IEEE Trans. Inf. Theory 53(2): 599-614 (2007) - 2006
- [j3]Hossein Pishro-Nik, Faramarz Fekri:
Performance of low-density parity-check codes with linear minimum distance. IEEE Trans. Inf. Theory 52(1): 292-300 (2006) - 2005
- [j2]Hossein Pishro-Nik, Nazanin Rahnavard, Faramarz Fekri:
Nonuniform error correction using low-density parity-check codes. IEEE Trans. Inf. Theory 51(7): 2702-2714 (2005) - 2004
- [j1]Hossein Pishro-Nik, Faramarz Fekri:
On decoding of low-density parity-check codes over the binary erasure channel. IEEE Trans. Inf. Theory 50(3): 439-454 (2004)
Conference and Workshop Papers
- 2024
- [c77]Bo Guan, Shuangqing Wei, Amir Houmansadr, Hossein Pishro-Nik, Dennis Goeckel:
Optimal Obfuscation to Protect Client Privacy in Federated Learning. CISS 2024: 1-6 - [c76]Ahmad Ghasemi, Majid Moradikia, Seyed Reza Zekavat, Hossein Pishro-Nik:
Adversarial Attacks Targeting Point-to-Point Wireless Networks. VTC Spring 2024: 1-6 - [c75]Bahareh Jafari, Hamid Saeedi, Hossein Pishro-Nik:
UAV Path Planning for Surveillance Applications: Rotary-Wing vs. Fixed-Wing UAVs. VTC Spring 2024: 1-6 - 2023
- [c74]Benjamin Fenelon, Saeede Enayati, Hossein Pishro-Nik:
Private UAV-Assisted IoT Data Collection: An Energy-Privacy Trade-off. PST 2023: 1-5 - [c73]Rushiv Arora, Mohammadjavad Khosravi, Saeede Enayati, Hossein Pishro-Nik:
Deployment of a UAV-Based Fire Detection System. VTC2023-Spring 2023: 1-6 - [c72]Bahareh Jafari, Hamid Saeedi, Saeede Enayati, Hossein Pishro-Nik:
Path Planning for Unmanned Aerial Vehicles: Peak Power Minimization. VTC2023-Spring 2023: 1-5 - 2022
- [c71]Saeede Enayati, Dennis L. Goeckel, Amir Houmansadr, Hossein Pishro-Nik:
Constrained Obfuscation to Thwart Pattern Matching Attacks. ISIT 2022: 643-648 - [c70]Saeede Enayati, Dennis L. Goeckel, Amir Houmansadr, Hossein Pishro-Nik:
Privacy-Preserving Path-Planning for UAVs. ISNCC 2022: 1-6 - [c69]Saeede Enayati, Hossein Pishro-Nik:
Asymmetric Change-of-Probability Measures for Tail Risk Management. SysCon 2022: 1-7 - [c68]Saeede Enayati, Hossein Pishro-Nik:
Quantization Rate and AoI-Induced Distortion Trade-off Analysis with Application to Remote Agents. WCNC 2022: 782-787 - 2021
- [c67]Xiaozhe Shao, Hossein Pishro-Nik, Lixin Gao:
Path-Preserving Anonymization for Inter-domain Routing Policies. CRiSIS 2021: 121-136 - [c66]Saeede Enayati, Hossein Pishro-Nik:
UAV Trajectories for Uniform Coverage in Convex Regions. VTC Spring 2021: 1-5 - 2020
- [c65]Bo Guan, Nazanin Takbiri, Dennis L. Goeckel, Amir Houmansadr, Hossein Pishro-Nik:
Sequence Obfuscation to Thwart Pattern Matching Attacks. ISIT 2020: 884-889 - [c64]Narges Gholipoor, Saeedeh Parsaeefard, Mohammad Reza Javan, Nader Mokari, Hamid Saeedi, Hossein Pishro-Nik:
Cloud-based Queuing Model for Tactile Internet in Next Generation of RAN. VTC Spring 2020: 1-6 - [c63]Mohammadjavad Khosravi, Hossein Pishro-Nik:
Unmanned Aerial Vehicles for Package Delivery and Network Coverage. VTC Spring 2020: 1-5 - 2019
- [c62]Virat Shejwalkar, Amir Houmansadr, Hossein Pishro-Nik, Dennis Goeckel:
Revisiting utility metrics for location privacy-preserving mechanisms. ACSAC 2019: 313-327 - [c61]Nazanin Takbiri, Xiaozhe Shao, Lixin Gao, Hossein Pishro-Nik:
Improving Privacy in Graphs Through Node Addition. Allerton 2019: 487-494 - [c60]Nazanin Takbiri, Dennis L. Goeckel, Amir Houmansadr, Hossein Pishro-Nik:
Asymptotic Limits of Privacy in Bayesian Time Series Matching. CISS 2019: 1-6 - [c59]Nazanin Takbiri, Ramin Soltani, Dennis L. Goeckel, Amir Houmansadr, Hossein Pishro-Nik:
Asymptotic Loss in Privacy due to Dependency in Gaussian Traces. WCNC 2019: 1-6 - 2018
- [c58]Ke Li, Hossein Pishro-Nik, Dennis L. Goeckel:
Fundamental Limits in Detecting Whether a Signal Has Been Quantized. ACSSC 2018: 1699-1703 - [c57]Ke Li, Hossein Pishro-Nik, Dennis L. Goeckel:
Privacy against matching under anonymization and obfuscation in the Gaussian case. CISS 2018: 1-6 - [c56]Nazanin Takbiri, Ke Li, Hossein Pishro-Nik, Dennis L. Goeckel:
Statistical matching in the presence of anonymization and obfuscation: Non-asymptotic results in the discrete case. CISS 2018: 1-6 - [c55]Saeede Enayati, Hamid Saeedi, Hossein Pishro-Nik:
Trajectory Processes that Preserve Uniformity: A Stochastic Geometry Perspective. ISIT 2018: 51-55 - [c54]Nazanin Takbiri, Amir Houmansadr, Dennis L. Goeckel, Hossein Pishro-Nik:
Privacy Against Statistical Matching: Inter-User Correlation. ISIT 2018: 1036-1040 - [c53]Arman Azizi, Nader Mokari, Saeede Enayati, Hossein Pishro-Nik, Hamid Saeedi:
Stochastic geometry based pricing for infrastructure sharing in IoT networks. WCNC 2018: 1-5 - 2017
- [c52]Ke Li, Hossein Pishro-Nik, Dennis L. Goeckel:
Bayesian time series matching and privacy. ACSSC 2017: 1677-1681 - [c51]Nazanin Takbiri, Amir Houmansadr, Dennis L. Goeckel, Hossein Pishro-Nik:
Fundamental limits of location privacy using anonymization. CISS 2017: 1-6 - [c50]Nazanin Takbiri, Amir Houmansadr, Dennis L. Goeckel, Hossein Pishro-Nik:
Limits of location privacy under anonymization and obfuscation. ISIT 2017: 764-768 - [c49]Mohammad Moltafet, Nader Mokari, Mohammad R. Javan, Hamid Saeedi, Hossein Pishro-Nik:
PSMA for 5G: Network throughput analysis. PIMRC 2017: 1-6 - [c48]Ali Rakhshan, Hossein Pishro-Nik:
Acceptable range of spatial density in an ad hoc network of UAVs. PIMRC 2017: 1-5 - 2016
- [c47]Zarrin Montazeri, Amir Houmansadr, Hossein Pishro-Nik:
Defining perfect location privacy using anonymization. CISS 2016: 204-209 - [c46]Ali Rakhshan, Hossein Pishro-Nik:
Packet success probability derivation in a vehicular ad hoc network for a highway scenario. CISS 2016: 210-215 - [c45]Ali Rakhshan, Hossein Pishro-Nik:
A new approach to customization of accident warning systems to individual drivers. CogSIMA 2016: 219-225 - [c44]Ali Rakhshan, Hossein Pishro-Nik:
Characterizing successful packet transmission in a Vehicular Ad Hoc Network. INFOCOM Workshops 2016: 636-641 - [c43]Zarrin Montazeri, Amir Houmansadr, Hossein Pishro-Nik:
Achieving perfect location privacy in Markov models using anonymization. ISITA 2016: 355-359 - 2015
- [c42]Ali Rakhshan, Hossein Pishro-Nik, Mohammad Nekoui:
Driver-based adaptation of Vehicular Ad Hoc Networks for design of active safety systems. CISS 2015: 1-6 - 2014
- [c41]Azadeh Sheikholeslami, Dennis Goeckel, Hossein Pishro-Nik:
Everlasting secrecy in disadvantaged wireless environments against sophisticated eavesdroppers. ACSSC 2014: 1994-1998 - [c40]Azadeh Sheikholeslami, Hossein Pishro-Nik, Majid Ghaderi, Dennis Goeckel:
On the impact of dynamic jamming on end-to-end delay in linear wireless networks. CISS 2014: 1-6 - [c39]Azadeh Sheikholeslami, Majid Ghaderi, Hossein Pishro-Nik, Dennis Goeckel:
Jamming-aware minimum energy routing in wireless networks. ICC 2014: 2313-2318 - [c38]Ali Rakhshan, Hossein Pishro-Nik, Evan Ray:
Real-time estimation of the distribution of brake response times for an individual driver using Vehicular Ad Hoc Network. Intelligent Vehicles Symposium 2014: 1181-1186 - 2013
- [c37]Ali Rakhshan, Hossein Pishro-Nik, Donald L. Fisher, Mohammad Nekoui:
Tuning collision warning algorithms to individual drivers for design of active safety systems. GLOBECOM Workshops 2013: 1333-1337 - [c36]Azadeh Sheikholeslami, Dennis Goeckel, Hossein Pishro-Nik:
Artificial intersymbol interference (ISI) to exploit receiver imperfections for secrecy. ISIT 2013: 2950-2954 - 2012
- [c35]Azadeh Sheikholeslami, Dennis Goeckel, Hossein Pishro-Nik:
Exploiting the non-commutativity of nonlinear operators for information-theoretic security in disadvantaged wireless environments. Allerton Conference 2012: 233-240 - [c34]Daiheng Ni, Hong Liu, Wei Ding, Yuanchang Xie, Honggang Wang, Hossein Pishro-Nik, Qian Yu:
Cyber-Physical Integration to Connect Vehicles for Transformed Transportation Safety and Efficiency. IEA/AIE 2012: 88-94 - [c33]Azadeh Sheikholeslami, Dennis Goeckel, Hossein Pishro-Nik, Don Towsley:
Physical layer security from inter-session interference in large wireless networks. INFOCOM 2012: 1179-1187 - [c32]Hosein Mamani, Hamid Saeedi, Ali Eslami, Hossein Pishro-Nik:
On Generalized EXIT charts of LDPC code ensembles over binary-input output-symmetric memoryless channels. ISIT 2012: 2336-2340 - 2011
- [c31]Ali Eslami, Hossein Pishro-Nik:
A practical approach to polar codes. ISIT 2011: 16-20 - [c30]Mohammad Nekoui, Hossein Pishro-Nik:
Analytic design of active vehicular safety systems in sparse traffic. Vehicular Ad Hoc Networks 2011: 87-88 - [c29]Ben Bovee, Mohammad Nekoui, Hossein Pishro-Nik, Russell Tessier:
Evaluation of the Universal Geocast Scheme for VANETs. VTC Fall 2011: 1-5 - [c28]Mohammad Nekoui, Hossein Pishro-Nik:
Analytical Design of Inter-Vehicular Communications for Collision Avoidance. VTC Fall 2011: 1-5 - 2010
- [c27]Ali Eslami, Hossein Pishro-Nik:
On bit error rate performance of polar codes in finite regime. Allerton 2010: 188-194 - [c26]Mohammad Nekoui, Hossein Pishro-Nik:
A Universal Geocast Scheme for Vehicular Ad Hoc Networks. CCNC 2010: 1-5 - [c25]Mohammad Nekoui, Hossein Pishro-Nik:
Fundamental tradeoffs in vehicular ad hoc networks. Vehicular Ad Hoc Networks 2010: 91-96 - 2009
- [c24]Hamid Saeedi, Hossein Pishro-Nik, Amir H. Banihashemi:
On systematic design of universally capacity approaching rate-compatible sequences of LDPC code ensembles over binary-input output-symmetric memoryless channels. Allerton 2009: 400-407 - [c23]Hamid Saeedi, Hossein Pishro-Nik:
On LDPC codes over symmetric channels. ITW 2009: 86-90 - [c22]Mohammad Nekoui, Daiheng Ni, Hossein Pishro-Nik, Richa Prasad, Mohammed Raza Kanjee, Hui Zhu, Thai Nguyen:
Development of a VII-enabled prototype intersection collision warning system. TRIDENTCOM 2009: 1-8 - 2008
- [c21]Mohammad Nekoui, Hossein Pishro-Nik:
A geometrical analysis of Vehicular Ad-Hoc Networks for safety applications. Allerton 2008: 1177-1183 - [c20]Mohammad Nekoui, Hossein Pishro-Nik:
VANET capacity scaling under the Physical Model. CISS 2008: 827-830 - [c19]Mohammad Nekoui, Ali Eslami, Hossein Pishro-Nik:
Scaling Laws for Distance Limited Communications in Vehicular Ad Hoc Networks. ICC 2008: 2253-2257 - [c18]Hossein Pishro-Nik, Faramarz Fekri:
Analysis of Wireless Ad-Hoc and Sensor Networks in Finite Regime. SECON 2008: 73-81 - [c17]Mohammad Nekoui, Hossein Pishro-Nik:
Reliable inter-vehicle communications for vehicular ad hoc networks. WICON 2008: 84 - [c16]Mohammad Nekoui, Ali Eslami, Hossein Pishro-Nik:
The capacity of Vehicular Ad Hoc Networks with infrastructure. WiOpt 2008: 267-272 - 2007
- [c15]Sarma Vangala, Hossein Pishro-Nik:
Optimal Hybrid RF-Wireless Optical Communication for Maximum Efficiency and Reliability. CISS 2007: 684-689 - [c14]Sheng Xiao, Hossein Pishro-Nik, Weibo Gong:
Dense Parity Check Based Secrecy Sharing in Wireless Communications. GLOBECOM 2007: 54-58 - [c13]Woei Ling Leow, Hossein Pishro-Nik:
Delay and Energy Tradeoff in Multi-State Wireless Sensor Networks. GLOBECOM 2007: 1028-1032 - [c12]Sarma Vangala, Hossein Pishro-Nik:
A Highly Reliable FSO/RF Communication System Using Efficient Codes. GLOBECOM 2007: 2232-2236 - [c11]Woei Ling Leow, Hossein Pishro-Nik:
Results on coverage for finite wireless networks. IWCMC 2007: 364-369 - [c10]Sarma Vangala, Hossein Pishro-Nik, Bharat T. Doshi:
Improving Application Performance Over Error Prone Routes in Internet: Joint Impact of Coding, Interleaving, and ARQ. WCNC 2007: 389-394 - 2006
- [c9]Hossein Pishro-Nik, Faramarz Fekri:
On Raptor Codes. ICC 2006: 1137-1141 - [c8]Hossein Pishro-Nik:
Analysis of finite unreliable sensor grids. WiOpt 2006: 326-335 - 2005
- [c7]Ramanan Subramanian, Hossein Pishro-Nik, Faramarz Fekri:
Clustering-based correlation aware data aggregation for distributed sensor networks. GLOBECOM 2005: 5 - [c6]Kevin Sean Chan, Hossein Pishro-Nik, Faramarz Fekri:
Analysis of hierarchical algorithms for wireless sensor network routing protocols. WCNC 2005: 1830-1835 - 2004
- [c5]Hossein Pishro-Nik, Faramarz Fekri:
Performance of low-density parity-check codes with linear minimum distance. ISIT 2004: 206 - [c4]Hossein Pishro-Nik, Faramarz Fekri:
Results on punctured LDPC codes. ITW 2004: 215-219 - [c3]Hossein Pishro-Nik, Kevin Sean Chan, Faramarz Fekri:
On connectivity properties of large-scale sensor networks. SECON 2004: 498-507 - 2003
- [c2]Hossein Pishro-Nik, Nazanin Rahnavard, Faramarz Fekri:
Results on non-uniform error correction using low-density parity-check codes. GLOBECOM 2003: 2041-2045 - 2002
- [c1]Hossein Pishro-Nik, Faramarz Fekri:
Results on minimal tail-biting trellis representation of double-circulant wavelet codes. ICASSP 2002: 2521-2524
Informal and Other Publications
- 2024
- [i25]Ahmad Ghasemi, Hossein Pishro-Nik:
Tiny Graph Neural Networks for Radio Resource Management. CoRR abs/2403.19143 (2024) - 2022
- [i24]Mohammadjavad Khosravi, Rushiv Arora, Saeede Enayati, Hossein Pishro-Nik:
A Search and Detection Autonomous Drone System: from Design to Implementation. CoRR abs/2211.15866 (2022) - 2021
- [i23]Bo Guan, Nazanin Takbiri, Dennis Goeckel, Amir Houmansadr, Hossein Pishro-Nik:
Superstring-Based Sequence Obfuscation to Thwart Pattern Matching Attacks. CoRR abs/2108.12336 (2021) - 2020
- [i22]Nazanin Takbiri, Minting Chen, Dennis L. Goeckel, Amir Houmansadr, Hossein Pishro-Nik:
Asymptotic Privacy Loss due to Time Series Matching of Dependent Users. CoRR abs/2007.06119 (2020) - 2019
- [i21]Nazanin Takbiri, Dennis L. Goeckel, Amir Houmansadr, Hossein Pishro-Nik:
Asymptotic Limits of Privacy in Bayesian Time Series Matching. CoRR abs/1902.06404 (2019) - [i20]Mohammad Moltafet, Atefeh Rezaei, Nader Mokari, Mohammad Reza Javan, Hamid Saeedi, Hossein Pishro-Nik:
Joint Dynamic Pricing and Radio Resource Allocation Framework for IoT Services. CoRR abs/1903.02928 (2019) - [i19]Narges Gholipoor, Saeedeh Parsaeefard, Mohammad Reza Javan, Nader Mokari, Hamid Saeedi, Hossein Pishro-Nik:
Resource Management and Admission Control for Tactile Internet in Next Generation of RAN. CoRR abs/1907.01403 (2019) - [i18]Nazanin Takbiri, Xiaozhe Shao, Lixin Gao, Hossein Pishro-Nik:
Improving Privacy in Graphs Through Node Addition. CoRR abs/1910.08679 (2019) - [i17]Mohammadjavad Khosravi, Hamid Saeedi, Hossein Pishro-Nik:
Multi-Purpose Aerial Drones for Network Coverage and Package Delivery. CoRR abs/1911.05624 (2019) - [i16]Nazanin Takbiri, Virat Shejwalkar, Amir Houmansadr, Dennis L. Goeckel, Hossein Pishro-Nik:
Leveraging Prior Knowledge Asymmetries in the Design of Location Privacy-Preserving Mechanisms. CoRR abs/1912.02209 (2019) - 2018
- [i15]Nazanin Takbiri, Amir Houmansadr, Dennis L. Goeckel, Hossein Pishro-Nik:
Privacy against Statistical Matching: Inter-User Correlation. CoRR abs/1805.01296 (2018) - [i14]Nazanin Takbiri, Amir Houmansadr, Dennis L. Goeckel, Hossein Pishro-Nik:
Privacy of Dependent Users Against Statistical Matching. CoRR abs/1806.11108 (2018) - [i13]Nazanin Takbiri, Ramin Soltani, Dennis L. Goeckel, Amir Houmansadr, Hossein Pishro-Nik:
Asymptotic Loss in Privacy due to Dependency in Gaussian Traces. CoRR abs/1809.10289 (2018) - 2017
- [i12]Azadeh Sheikholeslami, Majid Ghaderi, Hossein Pishro-Nik, Dennis Goeckel:
Energy-Efficient Secrecy in Wireless Networks Based on Random Jamming. CoRR abs/1703.05194 (2017) - [i11]Nader Mokari, Mohammad Reza Javan, Mohammad Moltafet, Hamid Saeedi, Hossein Pishro-Nik:
A New Multiple Access Technique for 5G: Power Domain Sparse Code Multiple Access (PSMA). CoRR abs/1706.06439 (2017) - [i10]Nazanin Takbiri, Amir Houmansadr, Dennis L. Goeckel, Hossein Pishro-Nik:
Matching Anonymized and Obfuscated Time Series to Users' Profiles. CoRR abs/1710.00197 (2017) - 2016
- [i9]Zarrin Montazeri, Amir Houmansadr, Hossein Pishro-Nik:
Achieving Perfect Location Privacy in Wireless Devices Using Anonymization. CoRR abs/1610.05210 (2016) - 2014
- [i8]Ali Rakhshan, Evan Ray, Hossein Pishro-Nik:
Real-Time Estimation of the Distribution of Brake Response Times for an Individual Driver Using Vehicular Ad Hoc Network. CoRR abs/1405.6161 (2014) - [i7]Ali Rakhshan, Evan Ray, Hossein Pishro-Nik:
A New Approach to Customization of Collision Warning Systems to Individual Drivers. CoRR abs/1408.4111 (2014) - [i6]Azadeh Sheikholeslami, Majid Ghaderi, Hossein Pishro-Nik, Dennis Goeckel:
Minimum Energy Routing in Wireless Networks in the Presence of Jamming. CoRR abs/1411.3736 (2014) - [i5]Azadeh Sheikholeslami, Dennis Goeckel, Hossein Pishro-Nik:
Jamming Based on an Ephemeral Key to Obtain Everlasting Security in Wireless Environments. CoRR abs/1412.6014 (2014) - 2012
- [i4]Azadeh Sheikholeslami, Dennis Goeckel, Hossein Pishro-Nik:
Everlasting Secrecy by Exploiting Non-Idealities of the Eavesdropper's Receiver. CoRR abs/1210.1790 (2012) - [i3]Ali Eslami, Hossein Pishro-Nik:
On Finite-Length Performance of Polar Codes: Stopping Sets, Error Floor, and Concatenated Design. CoRR abs/1211.2187 (2012) - [i2]Ali Eslami, Mohammad Nekoui, Hossein Pishro-Nik, Faramarz Fekri:
Results on Finite Wireless Sensor Networks: Connectivity and Coverage. CoRR abs/1211.2198 (2012) - 2011
- [i1]Ali Eslami, Hossein Pishro-Nik:
A Practical Approach to Polar Codes. CoRR abs/1107.5355 (2011)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-08 21:31 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint