Hadi Ahmadi

Orcid: 0000-0002-9641-0033

According to our database1, Hadi Ahmadi authored at least 20 papers between 2009 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Flash: A Comprehensive Approach to Intrusion Detection via Provenance Graph Representation Learning.
Proceedings of the IEEE Symposium on Security and Privacy, 2024

2020
A learning-based metaheuristic for a multi-objective agile inspection planning model under uncertainty.
Eur. J. Oper. Res., 2020

2019
Graph Model Implementation of Attribute-Based Access Control Policies.
CoRR, 2019

A bio-inspired vestibular system using MEMS sensors and 3D printing technology.
Proceedings of the 13th International Conference on Sensing Technology, 2019

2014
Distance Lower Bounding.
IACR Cryptol. ePrint Arch., 2014

Multipath Private Communication: An Information Theoretic Approach.
CoRR, 2014

Private Message Transmission Using Disjoint Paths.
Proceedings of the Applied Cryptography and Network Security, 2014

2013
Message transmission and key establishment: General equality for weak and strong capacities.
J. Inf. Secur. Appl., 2013

Detection of Algebraic Manipulation in the Presence of Leakage.
IACR Cryptol. ePrint Arch., 2013

Secure Distance Bounding Verification using Physical-Channel Properties
CoRR, 2013

2012
Information Theoretic Security over Physical-Layer Channels.
PhD thesis, 2012

Message Transmission and Key Establishment: Conditions for Equality of Weak and Strong Capacities.
Proceedings of the Foundations and Practice of Security - 5th International Symposium, 2012

2011
Common Randomness and Secret Key Capacities of Two-way Channels.
IACR Cryptol. ePrint Arch., 2011

Secret Keys from Channel Noise.
IACR Cryptol. ePrint Arch., 2011

Secret Key Establishment over Noisy Channels.
Proceedings of the Foundations and Practice of Security, 2011

2010
Secret Key Agreement over a Pair of Independent Broadcast Channels
CoRR, 2010

New results on Secret Key Establishment over a pair of broadcast channels.
Proceedings of the International Symposium on Information Theory and its Applications, 2010

Secret key establishment over a pair of independent broadcast channels.
Proceedings of the International Symposium on Information Theory and its Applications, 2010

2009
The Formal Design Model of a Lift Dispatching System (LDS).
Int. J. Softw. Sci. Comput. Intell., 2009

Heuristic guess-and-determine attacks on stream ciphers.
IET Inf. Secur., 2009


  Loading...