


default search action
Mahdi Jafari Siavoshani
Person information
SPARQL queries 
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j14]Mahdi Soltani
, Khashayar Khajavi
, Mahdi Jafari Siavoshani
, Amir Hossein Jahangir
:
A multi-agent adaptive deep learning framework for online intrusion detection. Cybersecur. 7(1): 9 (2024) - [c25]Seyed Alireza Javid, Seyed Pooya Shariatpanahi, Mahdi Jafari Siavoshani:
Intelligent Reflecting Surface Assisted Over-the-Air Computation with Device-to-Device Communication. IWCIT 2024: 1-6 - [i26]Arash Jamshidi, Seyed Mohammad Hosseini, Seyed Mahdi Noormousavi, Mahdi Jafari Siavoshani:
Differentially Private Machine Learning-powered Combinatorial Auction Design. CoRR abs/2405.10622 (2024) - [i25]Seyed Mohammad Hosseini, Arash Jamshidi, Seyed Mahdi Noormousavi, Mahdi Jafari Siavoshani, Naeimeh Omidvar:
Extended Deep Submodular Functions. CoRR abs/2409.12053 (2024) - 2023
- [j13]Mahdi Soltani
, Behzad Ousat
, Mahdi Jafari Siavoshani, Amir Hossein Jahangir
:
An adaptable deep learning-based intrusion detection system to zero-day attacks. J. Inf. Secur. Appl. 76: 103516 (2023) - [j12]Mahdi Jafari Siavoshani
, Amirhossein Khajehpour, Amirmohammad Ziaei, Amir Ali Gatmiri, Ali Taheri:
Machine learning interpretability meets TLS fingerprinting. Soft Comput. 27(11): 7191-7208 (2023) - [i24]Mahdi Soltani, Khashayar Khajavi, Mahdi Jafari Siavoshani, Amir Hossein Jahangir:
A Multi-Agent Adaptive Deep Learning Framework for Online Intrusion Detection. CoRR abs/2303.02622 (2023) - 2022
- [j11]Ehsan Khosravi
, Ali Mohammad Afshin Hemmatyar
, Mahdi Jafari Siavoshani
, Behzad Moshiri
:
Safe Deep Driving Behavior Detection (S3D). IEEE Access 10: 113827-113838 (2022) - [j10]Fatemeh Ghaffari
, Seyed Pooya Shariatpanahi
, Mahdi Jafari Siavoshani
, Behnam Bahrak
:
Multi-Sender Index Coding Over Linear Networks. IEEE Commun. Lett. 26(2): 273-276 (2022) - [j9]Mahdi Soltani, Mahdi Jafari Siavoshani, Amir Hossein Jahangir
:
A content-based deep intrusion detection system. Int. J. Inf. Sec. 21(3): 547-562 (2022) - 2021
- [j8]Mahdi Jafari Siavoshani
, Seyed Pooya Shariatpanahi
, Mohammad Ali Maddah-Ali:
Private Information Retrieval for a Multi-Message Scenario With Private Side Information. IEEE Trans. Commun. 69(5): 3235-3244 (2021) - [c24]Mahdi Jafari Siavoshani, Seyed Pooya Shariatpanahi
, Naeimeh Omidvar:
Intelligent Reflecting Surfaces for Compute-and-Forward. IWCIT 2021: 1-6 - [i23]Mahdi Jafari Siavoshani, Seyed Pooya Shariatpanahi:
Intelligent Reflecting Surfaces for Compute-and-Forward. CoRR abs/2101.05607 (2021) - [i22]Mahdi Soltani, Behzad Ousat, Mahdi Jafari Siavoshani, Amir Hossein Jahangir:
An Adaptable Deep Learning-Based Intrusion Detection System to Zero-Day Attacks. CoRR abs/2108.09199 (2021) - 2020
- [j7]Mohammad Lotfollahi
, Mahdi Jafari Siavoshani
, Ramin Shirali Hossein Zade, Mohammdsadegh Saberian:
Deep packet: a novel approach for encrypted traffic classification using deep learning. Soft Comput. 24(3): 1999-2012 (2020) - [j6]Mahdi Jafari Siavoshani
, Farzad Parvaresh
, Ali Pourmiri
, Seyed Pooya Shariatpanahi
:
Coded Load Balancing in Cache Networks. IEEE Trans. Parallel Distributed Syst. 31(2): 347-358 (2020) - [c23]Aida Ramezani, Amirhossein Khajehpour, Mahdi Jafari Siavoshani:
On Multi-Session Website Fingerprinting Over TLS Handshake. IST 2020: 211-216 - [c22]Amir Hossein Estiri, Mohammad Reza Sabramooz, Ali Banaei, Amir Hossein Dehghan, Benyamin Jamialahmadi, Mahdi Jafari Siavoshani:
A Variational Auto-Encoder Approach for Image Transmission in Noisy Channel. IST 2020: 227-233 - [i21]Mahdi Soltani, Mahdi Jafari Siavoshani, Amir Hossein Jahangir:
A Content-Based Deep Intrusion Detection System. CoRR abs/2001.05009 (2020) - [i20]Aida Ramezani, Amirhossein Khajehpour, Mahdi Jafari Siavoshani:
On Multi-Session Website Fingerprinting over TLS Handshake. CoRR abs/2009.09284 (2020) - [i19]Amir Hossein Estiri, Mohammad Reza Sabramooz, Ali Banaei, Amir Hossein Dehghan, Benyamin Jamialahmadi, Mahdi Jafari Siavoshani:
A Variational Auto-Encoder Approach for Image Transmission in Wireless Channel. CoRR abs/2010.03967 (2020) - [i18]Mahdi Jafari Siavoshani, Amirhossein Khajepour, Amirmohammad Ziaei, Amir Ali Gatmiri, Ali Taheri:
Machine Learning Interpretability Meets TLS Fingerprinting. CoRR abs/2011.06304 (2020)
2010 – 2019
- 2019
- [i17]Hamid Ghasemi, Mahdi Jafari Siavoshani, Saeed Hadadan:
A Novel Communication Cost Aware Load Balancing in Content Delivery Networks using Honeybee Algorithm. CoRR abs/1902.04463 (2019) - [i16]Saeed Masoudian
, Ali Arabzadeh, Mahdi Jafari Siavoshani, Milad Jalal, Alireza Amouzad:
Adaptive Online Learning for Gradient-Based Optimizers. CoRR abs/1906.00290 (2019) - 2018
- [j5]Mahdi Jafari Siavoshani
, Ali Pourmiri
, Seyed Pooya Shariatpanahi
:
Storage, Communication, and Load Balancing Trade-off in Distributed Cache Networks. IEEE Trans. Parallel Distributed Syst. 29(4): 943-957 (2018) - [c21]Seyed Pooya Shariatpanahi
, Mahdi Jafari Siavoshani, Mohammad Ali Maddah-Ali:
Multi-Message Private Information Retrieval with Private Side Information. ITW 2018: 1-5 - [c20]Mohammad H. Amerimehr, Seyed Pooya Shariatpanahi
, Mahdi Jafari Siavoshani, Farid Ashtiani
, Mojtaba Mazoochi:
Performance analysis of network coding-based content delivery in dual interface cellular networks. IWCIT 2018: 1-6 - [i15]Seyed Pooya Shariatpanahi, Mahdi Jafari Siavoshani, Mohammad Ali Maddah-Ali:
Multi-Message Private Information Retrieval with Private Side Information. CoRR abs/1805.11892 (2018) - 2017
- [j4]Mahdi Jafari Siavoshani
, Shaunak Mishra, Christina Fragouli, Suhas N. Diggavi:
Multi-Party Secret Key Agreement Over State-Dependent Wireless Broadcast Channels. IEEE Trans. Inf. Forensics Secur. 12(2): 323-337 (2017) - [c19]Ali Pourmiri
, Mahdi Jafari Siavoshani, Seyed Pooya Shariatpanahi
:
Proximity-Aware Balanced Allocations in Cache Networks. IPDPS 2017: 1068-1077 - [c18]Mahdi Jafari Siavoshani, Seyed Pooya Shariatpanahi
, Hamid Ghasemi, Ali Pourmiri
:
On communication cost vs. load balancing in Content Delivery Networks. ISCC 2017: 651-656 - [i14]Mahdi Jafari Siavoshani, Ali Pourmiri, Seyed Pooya Shariatpanahi:
Storage, Communication, and Load Balancing Trade-off in Distributed Cache Networks. CoRR abs/1706.10209 (2017) - [i13]Mahdi Jafari Siavoshani, Farzad Parvaresh, Ali Pourmiri, Seyed Pooya Shariatpanahi:
Coded Load Balancing in Cache Networks. CoRR abs/1707.09757 (2017) - [i12]Mohammad Lotfollahi, Ramin Shirali Hossein Zade, Mahdi Jafari Siavoshani, Mohammdsadegh Saberian:
Deep Packet: A Novel Approach For Encrypted Traffic Classification Using Deep Learning. CoRR abs/1709.02656 (2017) - 2016
- [c17]Farzin Haddadpour, Mahdi Jafari Siavoshani, Morteza Noshad:
Low-complexity stochastic Generalized Belief Propagation. ISIT 2016: 785-789 - [i11]Mahdi Jafari Siavoshani, Shaunak Mishra, Christina Fragouli, Suhas N. Diggavi:
Group secret key agreement over state-dependent wireless broadcast channels. CoRR abs/1604.02380 (2016) - [i10]Farzin Haddadpour, Mahdi Jafari Siavoshani, Morteza Noshad:
Low-Complexity Stochastic Generalized Belief Propagation. CoRR abs/1605.02046 (2016) - [i9]Mahdi Jafari Siavoshani, Seyed Pooya Shariatpanahi, Hamid Ghasemi, Ali Pourmiri:
On Communication Cost vs. Load Balancing in Content Delivery Networks. CoRR abs/1610.04513 (2016) - [i8]Ali Pourmiri, Mahdi Jafari Siavoshani, Seyed Pooya Shariatpanahi:
Proximity-Aware Balanced Allocations in Cache Networks. CoRR abs/1610.05961 (2016) - 2015
- [c16]Chun Lam Chan, Mahdi Jafari Siavoshani, Sidharth Jaggi, Navin Kashyap, Pascal O. Vontobel:
Generalized belief propagation for estimating the partition function of the 2D Ising model. ISIT 2015: 2261-2265 - [c15]Javad B. Ebrahimi
, Mahdi Jafari Siavoshani:
On linear index coding from graph homomorphism perspective. ITA 2015: 220-229 - 2014
- [c14]Javad B. Ebrahimi
, Mahdi Jafari Siavoshani:
Linear index coding via graph homomorphism. CoDIT 2014: 158-163 - [c13]Javad B. Ebrahimi
, Mahdi Jafari Siavoshani:
On index coding and graph homomorphism. ITW 2014: 541-545 - [i7]Javad B. Ebrahimi, Mahdi Jafari Siavoshani:
On Index Coding and Graph Homomorphism. CoRR abs/1408.7019 (2014) - [i6]Javad B. Ebrahimi, Mahdi Jafari Siavoshani:
Linear Index Coding via Graph Homomorphism. CoRR abs/1410.1371 (2014) - 2013
- [c12]Farzin Haddadpour, Mahdi Jafari Siavoshani, Mayank Bakshi
, Sidharth Jaggi:
On AVCs with quadratic constraints. ISIT 2013: 271-275 - [i5]Farzin Haddadpour, Mahdi Jafari Siavoshani, Mayank Bakshi, Sidharth Jaggi:
On AVCs with Quadratic Constraints. CoRR abs/1301.6345 (2013) - 2012
- [b1]Mahdi Jafari Siavoshani:
Network Coding - Theoretical Designs Directed to Applications. EPFL, Switzerland, 2012 - [j3]Mahdi Jafari Siavoshani, Christina Fragouli, Suhas N. Diggavi:
Subspace Properties of Network Coding and Their Applications. IEEE Trans. Inf. Theory 58(5): 2599-2619 (2012) - [c11]Mahdi Jafari Siavoshani, Shenghao Yang, Raymond W. Yeung:
Non-coherent network coding: An arbitrarily varying channel approach. ISIT 2012: 1672-1676 - [c10]Mahdi Jafari Siavoshani, Christina Fragouli:
Multi-terminal secrecy in a linear non-coherent packetized networks. NetCod 2012: 85-90 - [i4]Mahdi Jafari Siavoshani, Christina Fragouli:
Multi-terminal Secrecy in a Linear Non-coherent Packetized Networks. CoRR abs/1206.3133 (2012) - 2011
- [j2]Mahdi Jafari Siavoshani, Soheil Mohajer, Christina Fragouli, Suhas N. Diggavi:
On the Capacity of Noncoherent Network Coding. IEEE Trans. Inf. Theory 57(2): 1046-1066 (2011) - [c9]Mahdi Jafari Siavoshani, Shaunak Mishra, Suhas N. Diggavi, Christina Fragouli:
Group secret key agreement over state-dependent wireless broadcast channels. ISIT 2011: 1960-1964 - [i3]Mahdi Jafari Siavoshani, U. Pulleti, Emre Atsan, Iris Safaka, Christina Fragouli, Katerina J. Argyraki, Suhas N. Diggavi:
Exchanging Secrets without Using Cryptography. CoRR abs/1105.4991 (2011) - [i2]Mahdi Jafari Siavoshani, Christina Fragouli, Suhas N. Diggavi:
Subspace Properties of Network Coding and their Applications. CoRR abs/1106.5387 (2011) - 2010
- [j1]Lorenzo Keller, Mahdi Jafari Siavoshani, Christina Fragouli, Katerina J. Argyraki
, Suhas N. Diggavi:
Joint identity-message coding. IEEE J. Sel. Areas Commun. 28(7): 1083-1093 (2010) - [i1]Mahdi Jafari Siavoshani, Soheil Mohajer, Christina Fragouli, Suhas N. Diggavi:
On the Capacity of Non-Coherent Network Coding. CoRR abs/1001.1658 (2010)
2000 – 2009
- 2009
- [c8]Lorenzo Keller, Mahdi Jafari Siavoshani, Christina Fragouli, Katerina J. Argyraki
, Suhas N. Diggavi:
Identity Aware Sensor Networks. INFOCOM 2009: 2177-2185 - [c7]Mahdi Jafari Siavoshani, Lorenzo Keller, Christina Fragouli, Katerina J. Argyraki
:
Compressed network coding vectors. ISIT 2009: 109-113 - [c6]Mahdi Jafari Siavoshani, Soheil Mohajer, Christina Fragouli, Suhas N. Diggavi:
On the capacity of non-coherent network coding. ISIT 2009: 273-277 - [c5]Soheil Mohajer, Mahdi Jafari Siavoshani, Suhas N. Diggavi, Christina Fragouli:
On the capacity of multisource non-coherent network coding. ITW 2009: 130-134 - [c4]Mahdi Jafari Siavoshani, Christina Fragouli, Suhas N. Diggavi:
Code construction for multiple sources network coding. S³@MobiHoc 2009: 21-24 - 2008
- [c3]Mahdi Jafari Siavoshani, Christina Fragouli, Suhas N. Diggavi:
Noncoherent multisource network coding. ISIT 2008: 817-821 - 2007
- [c2]Mahdi Jafari Siavoshani, Christina Fragouli, Suhas N. Diggavi:
Subspace Properties of Randomized Network Coding. ITW 2007: 1-5 - [c1]Mahdi Jafari Siavoshani, Christina Fragouli, Suhas N. Diggavi, Christos Gkantsidis:
Bottleneck discovery and overlay management in network coded peer-to-peer systems. INM@SIGCOMM 2007: 293-298
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-21 20:32 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint