Hossein Pishro-Nik
Home
Publications
Research
Students
Teaching
Undergraduate Projects

 

Books


Journal Papers

 

 

Refereed Conference Papers

 

  • V. Shejwalkar, A. Houmansadr, H. Pishro-Nik, and D. Goeckel, ”Revisiting Utility Metrics for Location Privacy-Preserving Mechanisms,” Annual Computer Security Applications Conference (ACSAC), 2019.
  • N. Takbiri, A. Houmansadr, D.L. Goeckel, and H. Pishro-Nik, ”Asymptotic Limits of Privacy in Bayesian Time Series Matching,” Conference on Information Science and Systems (CISS), 2019.
  • N. Takbiri, R. Soltani, A. Houmansadr, D.L. Goeckel, and H. Pishro-Nik, ”Asymptotic loss in privacy due to dependency in gaussian traces,” IEEE Wireless Communications and Networking Conference (WCNC), 2019.
  • S. Enayati, H. Saeedi, and H. Pishro-Nik, “Trajectory Processes that Preserve Uniformity: A Stochastic Geometry Perspective,” IEEE International Symposium on Information Theory (ISIT), 2018.
  • N. Takbiri, A. Houmansadr, D.L. Goeckel, and H. Pishro-Nik, “Privacy against Statistical Matching: Inter-User Correlation,” IEEE International Symposium on Information Theory (ISIT), 2018.
  • A. Azizi, N. Mokari, S. Enayati, and H. Pishro-Nik, “ Stochastic geometry based pricing in IoT systems,” in IEEE WCNC, 2018.
  • N. Takbiri, A. Houmansadr, D.L. Goeckel, and H. Pishro-Nik, “Statistical matching in the presence of anonymization and obfuscation: Non-asymptotic results in the discrete case,” 2018 Annual Conference on Information Science and Systems (CISS), 2018
  • K. Li, H. Pishro-Nik, D. Goeckel, “Privacy against matching under anonymization and obfuscation in the Gaussian case,” 2018 Annual Conference on Information Science and Systems (CISS), 2018.
  • N. Takbiri, A. Houmansadr, D.L. Goeckel, and H. Pishro-Nik, “Limits of Location Privacy under Anonymization and Obfuscation,” IEEE International Symposium on Information Theory (ISIT), 2017.
  • A. Rakhshan and H. Pishro-Nik, “Acceptable range of spatial density in an ad hoc network of UAVs,” 2017 IEEE 28th Annual International Symposium on Personal, Indoor, and Mobile Radio Communications (IEEE PIMRC), 2017.
  • M. Moltafet, N. Mokari, M. R. Javan, H. Saeedi, and H. Pishro-Nik, “PSMA for 5G: Network throughput analysis,” 2017 IEEE 28th Annual International Symposium on Personal, Indoor, and Mobile Radio Communications (IEEE PIMRC), 2017.
  • N. Takbiri, A. Houmansadr, D.L. Goeckel, and H. Pishro-Nik, “Fundamental limits of location privacy using anonymization,” 51st Annual Conference on Information Science and Systems (CISS). IEEE, 2017.
  • K. Li, H. Pishro-Nik, D. Goeckel, “Bayesian time series matching and privacy, ” 2017 51st Asilomar Conference on Signals, Systems, and Computers, 2017.
  • Z. Montazeri, A. Houmansadr, H. Pishro-Nik, “Defining perfect location privacy using anonymization,” 2016 Annual Conference on Information Science and Systems (CISS), pp. 204-209, 2016.
  • A. Rakhshan, H. Pishro-Nik, “Characterizing successful packet transmission in a Vehicular Ad Hoc Network,” 2016 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS), pp. 636-641, 2016.
  • A. Rakhshan, H. Pishro-Nik, “A new approach to customization of accident warning systems to individual drivers,” 2016 IEEE International Multi-Disciplinary Conference on Cognitive Methods in Situation Awareness and Decision Support (CogSIMA), pp. 219-225, 2016.
  • A. Rakhshan, H. Pishro-Nik, “Packet success probability derivation in a vehicular ad hoc network for a highway scenario,” 2016 Annual Conference on Information System and Systems (CISS), pp. 210-215, 2016.
  • Z. Montazeri, A. Houmansadr, H. Pishro-Nik, “Achieving Perfect Location Privacy in Markov Models Using Anonymization“, International Symposium on Information Theory and Its Applications (ISITA), 2016.
  • A. Rakhshan, H. Pishro-Nik, M. Nekoui, “Driver-based adaptation of Vehicular Ad Hoc Networks for design of active safety systems,” 2015 49th Annual Conference on Information Sciences and Systems (CISS), pp. 1-6, 2015.
  • A. Sheikholeslami, M. Ghaderi, H. Pishro-Nik, D. Goeckel, “Jamming-aware minimum energy routing in wireless networks,” 2014 IEEE International Conference on Communications (ICC), pp. 2313-3318, 2014.
  • A. Sheikholeslami, H. Pishro-Nik, M. Ghaderi, D. Goeckel, “On the impact of dynamic jamming on end-to-end delay in linear wireless networks,” 2014 48th Annual Conference on Information Sciences and Systems (CISS), pp. 1-6, 2014.
  • A. Sheikholeslami, D. Goeckel, H. Pishro-Nik, “Everlasting secrecy in disadvantaged wireless environments against sophisticated eavesdroppers,” 2014 48th Asilomar Conference on Signals, Systems and Computers, pp. 1994-1998, 2014.
  • A. Rakhshan, H. Pishro-Nik, E. Ray, “Real-time estimation of the distribution of brake response times for an individual driver using Vehicular Ad Hoc Network,” 2014 IEEE Intelligent Vehicles Symposium Proceedings, pp. 1181-1186, 2014.
  • A. Rakhshan, H. Pishro-Nik, D. Fisher, M. Nekoui, “Tuning collision warning algorithms to individual drivers for design of active safety systems,” 2013 IEEE Globecom Workshops (GC Wkshps), pp. 1333-1337, 2013.
  • A. Sheikholeslami, D. Goeckel, H. Pishro-Nik, “Artificial intersymbol interference (ISI) to exploit receiver imperfections for secrecy,” 2013 IEEE International Symposium on Information Theory, pp. 2950-2954, 2013.
  • H. Mamani, H. Saeedi, A. Eslami, H. Pishro-Nik, “On Generalized EXIT charts of LDPC code ensembles over binary-input output-symmetric memoryless channels,” 2012 IEEE International Symposium on Information Theory Proceedings, pp. 2336-2340, 2012.
  • A. Sheikholeslami, D. Goeckel, H. Pishro-Nik, “Exploiting the non-commutativity of nonlinear operators for information-theoretic security in disadvantaged wireless environments,” 2012 50th Annual Allerton Conference on Communication, Control, and Computing (Allerton), pp. 233-240, 2012.
  • A. Sheikholeslami, D. Goeckel, H. Pishro-Nik, D. Towsley, “Physical layer security from inter-session interference in large wireless networks,” 2012 Proceedings IEEE INFOCOM, pp. 1179-1187, 2012.
  • A. Eslami, H. Pishro-Nik. “A practical approach to polar codes,” 2011 IEEE International Symposium on Information Theory Proceedings, pp. 16-20, 2011.
  • G. Leiner, H. Pishro-Nik, D. Ni, S. Morrell, D. Marcq, J. LaBarge, A. Swochak, “Project crossroads: Vehicular ad-hoc network for collision warning”, Proceedings of 2011 IEEE International Conference on Vehicular Electronics and Safety, pp. 193-198, 2011.
  • M. Nekoui, H. Pishro-Nik, “Analytical Design of Inter-Vehicular Communications for Collision Avoidance,” 2011 IEEE Vehicular Technology Conference (VTC Fall), pp. 1-5, 2011.
  • B. Bovee, M. Nekoui, H. Pishro-Nik, R. Tessier, “Evaluation of the Universal Geocast Scheme for VANETs,” 2011 IEEE Vehicular Technology Conference (VTC Fall), pp. 1-5, 2011.
  • M. Nekoui and H. Pishro-Nik, “Analytic Design of Active Vehicular Safety Systems in Sparse Traffic,” in proceedings of the eighth MOBICOM workshop on VehiculAr InterNETworking (VANET 2011).
  • A. Eslami and H. Pishro-Nik, “On Bit Error Rate Performance of Polar Codes in Finite Regime,“ in proc. 48th Annual Allerton Conference on Communication, Control, and Computing, Sept. 2010.
  • M. Nekoui and H. Pishro-Nik, “Fundamental Tradeoffs in Vehicular Ad Hoc Networks,” Seventh ACM International Workshop on VehiculAr Inter-NETworking, September 2010.
  • A. Eslami, M. Nekoui, and H. Pihsro-Nik, “Results on finite wireless networks on a line,” IEEE Information Theory Workshop 2010, Jan 2010.
  • M. Nekoui and H. Pishro-Nik, “A Universal Geocast Scheme for Vehicular Ad Hoc Networks,” 2nd IEEE International Intelligent Vehicular Communications System Workshop (IVCS 2010), Jan. 2010.
  • H. Saeedi, H. Pishro-Nik, A. Banihashemi, “On systematic design of universally capacity approaching rate-compatible sequences of LDPC code ensembles over binary-input output-symmetric memoryless channels,“ in the proceedings of the 47th Annual Allerton conference on Communication, Control and Computing, Sept. 2009.
  • H. Saeedi, and H. Pishro-Nik, “On LDPC Codes over Symmetric Channels,” IEEE Information Theory Workshop on Networking and Information Theory, 2009. ITW 2009.
  • M. Nekoui and H. Pishro-Nik, “A Geometrical Analysis of Obstructed Wireless Networks”, in the proceedings of the Information Theory Workshop (ITW ’09), p.p. 589-593, Taormina, Italy, Oct. 2009. 
  • M. Nekoui and H. Pishro-Nik, “Geometry-aware Probabilistic Communications for Urban Vehicular Ad Hoc Networks,” 6th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks Workshops (SECON Workshops '09), p.p. 1-3, June 2009.
  • M. Nekoui and H. Pishro-Nik, “The Effect of VII Market Penetration on Safety and Efficiency of Transportation Networks”, in the proceedings of International Conference on Communications Workshops (ICC Workshops ’09), p.p. 1-5, June 2009.
  • M. Nekoui, D. Ni, H. Pishro-Nik, R. Prasad, M.R. Kanjee, Zhu Hui and Nguyen Thai, “ Development of a VII-enabled prototype intersection collision warning system,” 5th International Conference on Testbeds and Research Infrastructures for the Development of Networks & Communities and Workshops (TridentCom ’09), p.p 1-8, April 2009.
  • H. Pishro-Nik and F. Fekri, “Analysis of Wireless Ad-Hoc and Sensor Networks in Finite Regime,” SECON '08. 5th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks, 2008. 16-20 June 2008 Page(s):73 – 81.
  • M. Nekoui and H. Pishro-Nik, “Reliable Inter-Vehicle Communications for Vehicular Ad Hoc Networks”, in the proceedings of The Fourth Annual International Wireless Internet Conference (WICON ’08), Maui, Hawaii, Nov. 2008.
  • M. Nekoui and H. Pishro-Nik, “A Geometrical Analysis of Vehicular Ad Hoc Networks for Safety Applications”, in the proceedings of the 46th Annual Allerton conference on Communication, Control and Computing, p.p. 1177 – 1183, Sept. 2008.
  • M. Nekoui, Ali Eslami and Hossein Pishro-Nik, “Scaling Laws for Distance Limited Communications in Vehicular Ad Hoc Networks,” in the Proceedings of IEEE International Conference on Communications (ICC 2008), p.p. 2253-2257, Beijing, China, May 2008.
  • M. Nekoui, Ali Eslami and Hossein Pishro-Nik, “The Capacity of Vehicular Ad Hoc Networks with Infrastructure,” in the proceedings of the 6th Intl. Symposium on Modeling and Optimization in Mobile, Ad Hoc, and Wireless Networks (Wiopt ‘08), p.p. 267 – 272, Berlin, Germany, April 2008.
  • M. Nekoui and H. Pishro-Nik, “VANET Capacity Scaling under the Physical Model“, in the proceedings of 42nd Annual Conference on Information Sciences and Systems (CISS ‘08), p.p. 827 – 830, Princeton University, New Jersey, U.S, March 2008.
  • W. L. Leow and H. Pishro-Nik, “Delay and energy tradeoff in multi-state wireless sensor networks,” in IEEE Globecom, 2007.
  • S. Vangala and H. Pishro-Nik, “A highly reliable FSO/RF communication system using efficient codes,” in Globecom, 2007.
  • S. Xiao,H. pishro-Nik, and W. Gong, “Dense Parity Check Based Secrecy Sharing in Wireless Communications,“ in Globecom, 2007.
  • H. pishro-Nik, A. Ganz, and D. Ni, “The capacity of vehicular ad hoc networks,” in Allerton 2007.
  • W. L. Leow and H. Pishro-Nik, ”Results on coverage for finite wireless networks,” in ACM International Wireless Communications and Mobile Computing Conference, 2007,
  • S. V. Sarma, H. Pishro-Nik, “Optimal Hybrid RF-Wireless Optical Communication”, 2007 Conference on Information Sciences and Systems (CISS 2007).
  • S. V. Sarma, H. Pishro-Nik, B. Doshi, “Improving Application Performance over Error Prone Routes in Internet: Joint Optimization of Coding, Interleaving and ARQ”, IEEE Wireless Communications and Networking Conference 2007.
  • H. Pishro-Nik “Analysis of finite unreliable sensor grids”, 4th Intl. Symposium on Modeling and Optimization in Mobile, Ad Hoc, and Wireless Networks, WiOpt 2006, Boston, MA, April 2006.
  • H. Pishro-Nik and F. Fekri, “On Raptor Codes”, IEEE International Conference on Communications, ICC06, Istanbul, Turkey, June 2006. 
  • R. Subramanian, H. Pishro-Nik, F. Fekri, “Clustering-based correlation aware data aggregation for distributed sensor networks”, Globe COM 2005.
  • K. S. Chan, H. Pishro-Nik, and F. Fekri, “Analysis of hierarchical algorithms for wireless sensor network routing algorithms,” IEEE Wireless Communications and Networking Conference, New Orleans, LA, March 2005.
  • H. Pishro-Nik and F. Fekri “Results on punctured LDPC codes,” 2004 IEEE Information Theory Workshop, 2004.
  • H. Pishro-Nik, K. Chan, and F. Fekri “On connectivity properties of large-scale wireless sensor networks,” First Annual IEEE International Conference on Sensor and Ad Hoc Communications and Networks, October 2004.
  • H. Pishro-Nik and F. Fekri “On graphs of LDPC codes,” 42nd Annual Allerton Conference on Communication, Control, and Computing, September. 2004.
  • H. Pishro-Nik and F. Fekri, “Performance of low-density parity-check codes with linear minimum distance,” ISIT 2004, June 2004.
  • H. Pishro-Nik and F. Fekri “Low-density parity-check codes for data frames,” 38th Annual Conference on Information Sciences and Systems, March 2004.
  • H. Pishro-Nik and F. Fekri “Application of irregular repeat-accumulate codes to holographic storage systems,” 38th Annual Conference on Information Sciences and Systems, March 2004.
  • H. Pishro-Nik, N. Rahnavard, and F. Fekri “Results on non-uniform error correction using low-density parity-check codes,” Globe COM 2003.
  • H. Pishro-Nik and F. Fekri “On LDPC codes over the erasure channel,” 41st Annual Allerton Conference on Communication, Control, and Computing, October 2003.
  • H. Pishro-Nik and F. Fekri “Improved decoding algorithms for low-density parity-check codes,” 3rd International Conference on Turbo Codes and Related Topics, September 2003.
  • H. Pishro-Nik and F. Fekri, “Improved decoding algorithms for low-density parity-check codes over the binary erasure channel,” 37th Conference on Information Sciences and Systems, March 2003.
  • H. Pishro-Nik and F. Fekri, “On the maximum likelihood decoding of low-density parity-check codes on the binary erasure channel,” 37th Conference on Information Sciences and Systems, March 2003
  • H. Pishro-Nik, N. Rahnavard, and F. Fekri, “Nonuniform error protection using low-density parity-check codes,” 40th Annual Allerton Conference on Communication, Control,  and Computing, October 2002.
  • H. Pishro-Nik and F. Fekri, “Results on minimal tail-biting trellis representation of double-circulant wavelet codes,” IEEE Int. Conf. Acoustics, Speech, and Signal Proc., May 2002.
International Coauthors

  • M. Ghaderi is with the University of Calgary, Canada
  • S. Enayati and H. Saeedi are with Tarbiat Modares Univesrity, Tehran, Iran
  • H. Yanikomeroglu is with Carleton University, Canada
  • M. Moltafet, A. Rezaee, N. Mokari, M .R. Javan are with Tarbiat Modares University, Tehran, Iran
  • A. Banihashemi is with Carleton University, Canada