关注
Yahya Sowti Khiabani
Yahya Sowti Khiabani
Machine Learning engineer in Mercedes Benz
在 mercedes-benz.com 的电子邮件经过验证
标题
引用次数
引用次数
年份
Demand Forecasting Using Automatic Machine-Learning Model Selection
T Joseph, YS Khiabani, S Mondkar, G Sundaram
US Patent App. 16/210,865, 2020
292020
Enhancement of secrecy of block ciphered systems by deliberate noise
YS Khiabani, S Wei, J Yuan, J Wang
IEEE Transactions on Information Forensics and Security 7 (5), 1604-1613, 2012
282012
Machine Learning System for Demand Forecasting With Improved Date Alignment
T Joseph, YS Khiabani, S Mondkar, G Sundaram
US Patent App. 16/238,459, 2020
102020
ARQ-based symmetric-key generation over correlated erasure channels
YS Khiabani, S Wei
IEEE transactions on information forensics and security 8 (7), 1152-1161, 2013
82013
Linear cryptanalysis against block ciphered system under noisy ciphertexts
YS Khiabani, S Wei, J Yuan, J Wang
2012 IEEE Global Communications Conference (GLOBECOM), 856-861, 2012
72012
Optimal design of DPCM scheme for ECG signal handling
HB Bahar, YS Khiabani
Proceedings of the 6th WSEAS International Conference on Signal, Speech and …, 2006
62006
A joint Shannon cipher and privacy amplification approach to attaining exponentially decaying information leakage
YS Khiabani, S Wei
Information Sciences 357, 6-22, 2016
52016
Creation of degraded wiretap channel through deliberate noise in block ciphered systems
YS Khiabani, S Wei
2011 IEEE GLOBECOM Workshops (GC Wkshps), 893-897, 2011
52011
Design and analysis of an ARQ based symmetric key generation algorithm
YS Khiabani, S Wei
2011-MILCOM 2011 Military Communications Conference, 1273-1278, 2011
52011
Demand Forecasting System with Improved Process for Adapting Forecasts to Varying Time Slots
T Joseph, YS Khiabani, S Mondkar, G Sundaram
US Patent App. 16/291,607, 2020
32020
Exponential secrecy against unbounded adversary using joint encryption and privacy amplification
YS Khiabani, S Wei
2013 IEEE Conference on Communications and Network Security (CNS), 198-206, 2013
22013
An end-to-end exponentially secure secrecy scheme against an unbounded adversary
YS Khiabani, S Wei
2013 47th Annual Conference on Information Sciences and Systems (CISS), 1-6, 2013
22013
System and/or method for predicting user action in connection with a vehicle user interface using machine learning
YS Khiabani, HSU Chieh, C Furrer, D Nguyen
US Patent 11,783,643, 2023
12023
Event streams in a machine learning system for demand forecasting
T Joseph, YS Khiabani, S Mondkar, G Sundaram
US Patent 11,636,381, 2023
12023
ARQ-based key scheduling algorithm over correlated erasure channels
YS Khiabani, S Wei
MILCOM 2012-2012 IEEE Military Communications Conference, 1-6, 2012
12012
System and/or method for predicting user action in connection with a vehicle user interface using machine learning
YS Khiabani, HSU Chieh, C Furrer, D Nguyen
US Patent App. 18/066,959, 2024
2024
Secrecy enhancement of block ciphered systems with deliberate noise in Non-coherent scenario
YS Khiabani, S Wei, J Wang, J Yuan
2013 47th Annual Conference on Information Sciences and Systems (CISS), 1-6, 2013
2013
Achievable secrecy enchancement through joint encryption and privacy amplification
YS Khiabani
Louisiana State University and Agricultural & Mechanical College, 2013
2013
ECG Signal Handling, Using Differential Pulse Code Modulation Scheme
HB Bahar, YS Khiabani
Nashriyyah-i Muhandisi-i Barq va Muhandisi-i Kampyutar-i Iran 20 (4), 329, 2009
2009
SEMINAR
YS Khiabani
系统目前无法执行此操作,请稍后再试。
文章 1–20