Negar Kiyavash

ORCID: 0000-0002-8545-7709
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Bayesian Modeling and Causal Inference
  • Machine Learning and Algorithms
  • Internet Traffic Analysis and Secure E-voting
  • Advanced Graph Neural Networks
  • Advanced Steganography and Watermarking Techniques
  • DNA and Biological Computing
  • Network Security and Intrusion Detection
  • Advanced Causal Inference Techniques
  • Advanced Bandit Algorithms Research
  • Data Quality and Management
  • Neural Networks and Applications
  • Privacy-Preserving Technologies in Data
  • Digital Media Forensic Detection
  • Advanced biosensing and bioanalysis techniques
  • Security and Verification in Computing
  • Cryptography and Data Security
  • Statistical Methods and Inference
  • Gene Regulatory Network Analysis
  • Stochastic Gradient Optimization Techniques
  • Rough Sets and Fuzzy Logic
  • Biometric Identification and Security
  • Graph Theory and Algorithms
  • Point processes and geometric inequalities
  • Error Correcting Code Techniques
  • Bayesian Methods and Mixture Models

École Polytechnique Fédérale de Lausanne
2017-2024

École Polytechnique
2021

University of Illinois Urbana-Champaign
2011-2020

Georgia Institute of Technology
2018-2020

Urbana University
2011-2018

Conference Board
2018

Institute of Electrical and Electronics Engineers
2017

University of Toronto
2017

University of Maryland, College Park
2017

Monash University
2017

In this paper, the fundamental insecurities hampering a scalable, wide-spread deployment of biometric authentication are examined, and cryptosystem capable using fingerprint data as its key is presented. For our application, we focus on situations where private stored smartcard used for in networked environment, assume an attacker can launch o -line attacks against stolen card.Juels Sudan's fuzzy vault starting point building analyzing secure scheme fingerprints smartcards called figerprint...

10.1145/982507.982516 article EN 2003-01-01

We propose a graphical model for representing networks of stochastic processes, the minimal generative graph. It is based on reduced factorizations joint distribution over time. show that under appropriate conditions, it unique and consistent with another type model, directed information graph, which generalization Granger causality. demonstrate how quantifies causality in particular sequential prediction setting. also develop efficient methods to estimate topological structure from data...

10.1109/tit.2015.2478440 article EN publisher-specific-oa IEEE Transactions on Information Theory 2015-09-22

Explicit nonasymptotic upper bounds on the sizes of multiple-deletion correcting codes are presented. In particular, largest single-deletion code for q-ary alphabet and string length is shown to be size at most (q <sup xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink">n</sup> -q)/{(q-1)(n-1)}. An improved bound asymptotic rate function obtained as a corollary. Upper also derived constrained source that does not necessarily comprise all strings...

10.1109/tit.2013.2257917 article EN IEEE Transactions on Information Theory 2013-04-12

We consider the problem of perfectly recovering vertex correspondence between two correlated Erdos-Renyi (ER) graphs. For a pair graphs on same set, vertices can be obscured by randomly permuting labels one In some cases, structural information in allow this to recovered. investigate information-theoretic threshold for exact recovery, i.e. conditions under which entire correctly recovered given unbounded computational resources. Pedarsani and Grossglauser provided an achievability result...

10.1145/2896377.2901460 article EN 2016-06-10

We introduce the problem of best arm identification (BAI) with post-action context, a new BAI in stochastic multi-armed bandit environment and fixed-confidence setting. The addresses scenarios which learner receives $\textit{post-action context}$ addition to reward after playing each action. This context provides additional information that can significantly facilitate decision process. analyze two different types context: (i) $\textit{non-separator}$, where depends on both action (ii)...

10.48550/arxiv.2502.03061 preprint EN arXiv (Cornell University) 2025-02-05

Recent work has shown that traffic analysis of data carried on encrypted tunnels can be used to recover important semantic information. As one example, attackers find out which website, or page a user is accessing simply by monitoring the patterns. We show much greater threat privacy than previously thought, as such attacks remotely. In particular, we that, perform analysis, adversaries do not need directly observe Instead, they send probes from far-off vantage point exploit queuing side...

10.1145/1866307.1866397 article EN 2010-10-04

Digital fingerprinting is a framework for marking media files, such as images, music, or movies, with user-specific signatures to deter illegal distribution. Multiple users can collude produce forgery that potentially overcome system. This paper proposes an equiangular tight frame fingerprint design which robust collusion attacks. We motivate this by considering digital in terms of compressed sensing. The attack modeled linear averaging multiple marked copies before adding Gaussian noise...

10.1109/tit.2012.2229781 article EN IEEE Transactions on Information Theory 2013-01-25

We consider the problem of perfectly recovering vertex correspondence between two correlated Erdos-Renyi (ER) graphs. For a pair graphs on same set, vertices can be obscured by randomly permuting labels one In some cases, structural information in allow this to recovered. investigate information-theoretic threshold for exact recovery, i.e. conditions under which entire correctly recovered given unbounded computational resources. Pedarsani and Grossglauser provided an achievability result...

10.1145/2964791.2901460 article EN ACM SIGMETRICS Performance Evaluation Review 2016-06-14

Automated decision making systems are increasingly being used in real-world applications. In these for the most part, rules derived by minimizing training error on available historical data. Therefore, if there is a bias related to sensitive attribute such as gender, race, religion, etc. data, say, due cultural/historical discriminatory practices against certain demographic, system could continue discrimination decisions including said its rule. We present an information theoretic framework...

10.1109/isit.2018.8437807 article EN 2022 IEEE International Symposium on Information Theory (ISIT) 2018-06-01

Nonconvex minimax problems appear frequently in emerging machine learning applications, such as generative adversarial networks and learning. Simple algorithms the gradient descent ascent (GDA) are common practice for solving these nonconvex games receive lots of empirical success. Yet, it is known that vanilla GDA with constant step size can potentially diverge even convex setting. In this work, we show a subclass nonconvex-nonconcave objectives satisfying so-called two-sided...

10.48550/arxiv.2002.09621 preprint EN other-oa arXiv (Cornell University) 2020-01-01

We consider deletion correcting codes over a q-ary alphabet. It is well known that any code capable of s deletions can also correct combination total insertions and deletions. To obtain asymptotic upper bounds on size, we apply packing argument to channels perform different mixtures Even though the set identical for all these channels, vary. Prior this paper, only corresponding all-insertion case all-deletion were known. recover as special cases. The bound from case, due Levenshtein, has...

10.1109/tit.2014.2317698 article EN IEEE Transactions on Information Theory 2014-04-16

We demonstrate the presence of a novel scheduler side-channel in preemptive, fixed-priority real-time systems (RTS); examples such can be found automotive systems, avionic power plants and industrial control among others. This leak important timing information as future arrival times tasks.This then used to launch devastating attacks, two which are demonstrated here (on real hardware platforms). Note that it is not easy capture this due runtime variations schedules, multiple other tasks...

10.1109/rtas.2019.00016 preprint EN 2019-04-01

Linking network flows is an important problem in intrusion detection as well anonymity. Passive traffic analysis can link flows, but requires long periods of observation to reduce errors. Active analysis, also known flow watermarking, allows for better precision and more scalable. Previous watermarks introduce significant delays the a side effect using blind scheme; this enables attacks that detect remove watermark, while at same time slowing down legitimate traffic. We propose first...

10.1109/tnet.2013.2272740 article EN IEEE/ACM Transactions on Networking 2013-07-31

Recently, directed information graphs have been proposed as concise graphical representations of the statistical dynamics among multiple random processes. A edge from one node to another indicates that past process statistically affects future another, given all other When number processes is large, computing those conditional dependence tests becomes difficult. Also, when interactions too graph no longer facilitates visual extraction relevant for decision-making. This work considers...

10.1109/tsp.2013.2259161 article EN IEEE Transactions on Signal Processing 2013-04-19

This paper presents the design and implementation of spyware communication circuits built into widely used carrier sense multiple access with collision avoidance (CSMA/CA) protocol. The components are embedded within sequential combinational circuit structure during synthesis, rendering distinction or dissociation from original impossible. We take advantage timing channel resulting transmission packets to implement a new practical coding scheme that covertly transfers spied data. Our codes...

10.1109/tifs.2013.2238930 article EN IEEE Transactions on Information Forensics and Security 2013-01-11

We consider the problem of aligning a pair databases with correlated entries. introduce new measure correlation in joint distribution that we call cycle mutual information. This has operational significance: it determines whether exact recovery correspondence between database entries is possible for any algorithm. Additionally, there an efficient algorithm alignment achieves this information theoretic threshold.

10.1109/isit.2018.8437908 article EN 2022 IEEE International Symposium on Information Theory (ISIT) 2018-06-01

We propose an approach for learning latent directed polytrees as long there exists appropriately defined discrepancy measure between the observed nodes. Specifically, we use our information where samples are available from only a subset of processes. Directed trees new type probabilistic graphical models that represent causal dynamics among set random processes in stochastic system. prove is consistent minimal trees. analyze sample complexity task when empirical estimator mutual used measure.

10.1162/neco_a_00874 article EN Neural Computation 2016-07-08

Learning the influence structure of multiple time series data is great interest to many disciplines. This paper studies problem recovering causal in network multivariate linear Hawkes processes. In such processes, occurrence an event one process affects probability new events some other Thus, a natural notion causality exists between processes captured by support excitation matrix. We show that resulting equivalent Directed Information graph (DIG) which encodes factorization joint...

10.48550/arxiv.1603.04319 preprint EN other-oa arXiv (Cornell University) 2016-01-01
Coming Soon ...