Demand Forecasting Using Automatic Machine-Learning Model Selection T Joseph, YS Khiabani, S Mondkar, G Sundaram US Patent App. 16/210,865, 2020 | 29 | 2020 |
Enhancement of secrecy of block ciphered systems by deliberate noise YS Khiabani, S Wei, J Yuan, J Wang IEEE Transactions on Information Forensics and Security 7 (5), 1604-1613, 2012 | 28 | 2012 |
Machine Learning System for Demand Forecasting With Improved Date Alignment T Joseph, YS Khiabani, S Mondkar, G Sundaram US Patent App. 16/238,459, 2020 | 10 | 2020 |
ARQ-based symmetric-key generation over correlated erasure channels YS Khiabani, S Wei IEEE transactions on information forensics and security 8 (7), 1152-1161, 2013 | 8 | 2013 |
Linear cryptanalysis against block ciphered system under noisy ciphertexts YS Khiabani, S Wei, J Yuan, J Wang 2012 IEEE Global Communications Conference (GLOBECOM), 856-861, 2012 | 7 | 2012 |
Optimal design of DPCM scheme for ECG signal handling HB Bahar, YS Khiabani Proceedings of the 6th WSEAS International Conference on Signal, Speech and …, 2006 | 6 | 2006 |
A joint Shannon cipher and privacy amplification approach to attaining exponentially decaying information leakage YS Khiabani, S Wei Information Sciences 357, 6-22, 2016 | 5 | 2016 |
Creation of degraded wiretap channel through deliberate noise in block ciphered systems YS Khiabani, S Wei 2011 IEEE GLOBECOM Workshops (GC Wkshps), 893-897, 2011 | 5 | 2011 |
Design and analysis of an ARQ based symmetric key generation algorithm YS Khiabani, S Wei 2011-MILCOM 2011 Military Communications Conference, 1273-1278, 2011 | 5 | 2011 |
Demand Forecasting System with Improved Process for Adapting Forecasts to Varying Time Slots T Joseph, YS Khiabani, S Mondkar, G Sundaram US Patent App. 16/291,607, 2020 | 3 | 2020 |
Exponential secrecy against unbounded adversary using joint encryption and privacy amplification YS Khiabani, S Wei 2013 IEEE Conference on Communications and Network Security (CNS), 198-206, 2013 | 2 | 2013 |
An end-to-end exponentially secure secrecy scheme against an unbounded adversary YS Khiabani, S Wei 2013 47th Annual Conference on Information Sciences and Systems (CISS), 1-6, 2013 | 2 | 2013 |
System and/or method for predicting user action in connection with a vehicle user interface using machine learning YS Khiabani, HSU Chieh, C Furrer, D Nguyen US Patent 11,783,643, 2023 | 1 | 2023 |
Event streams in a machine learning system for demand forecasting T Joseph, YS Khiabani, S Mondkar, G Sundaram US Patent 11,636,381, 2023 | 1 | 2023 |
ARQ-based key scheduling algorithm over correlated erasure channels YS Khiabani, S Wei MILCOM 2012-2012 IEEE Military Communications Conference, 1-6, 2012 | 1 | 2012 |
System and/or method for predicting user action in connection with a vehicle user interface using machine learning YS Khiabani, HSU Chieh, C Furrer, D Nguyen US Patent App. 18/066,959, 2024 | | 2024 |
Secrecy enhancement of block ciphered systems with deliberate noise in Non-coherent scenario YS Khiabani, S Wei, J Wang, J Yuan 2013 47th Annual Conference on Information Sciences and Systems (CISS), 1-6, 2013 | | 2013 |
Achievable secrecy enchancement through joint encryption and privacy amplification YS Khiabani Louisiana State University and Agricultural & Mechanical College, 2013 | | 2013 |
ECG Signal Handling, Using Differential Pulse Code Modulation Scheme HB Bahar, YS Khiabani Nashriyyah-i Muhandisi-i Barq va Muhandisi-i Kampyutar-i Iran 20 (4), 329, 2009 | | 2009 |
SEMINAR YS Khiabani | | |