Covert wireless communication with artificial noise generation R Soltani, D Goeckel, D Towsley, BA Bash, S Guha IEEE Transactions on Wireless Communications 17 (11), 7252-7267, 2018 | 175 | 2018 |
Covert single-hop communication in a wireless network with distributed artificial noise generation R Soltani, B Bash, D Goeckel, S Guha, D Towsley 2014 52nd Annual Allerton Conference on communication, control, and …, 2014 | 57 | 2014 |
Practical traffic analysis attacks on secure messaging applications A Bahramali, R Soltani, A Houmansadr, D Goeckel, D Towsley arXiv preprint arXiv:2005.00508, 2020 | 52 | 2020 |
Covert communications on poisson packet channels R Soltani, D Goeckel, D Towsley, A Houmansadr 2015 53rd Annual Allerton Conference on Communication, Control, and …, 2015 | 24 | 2015 |
Fundamental limits of covert packet insertion R Soltani, D Goeckel, D Towsley, A Houmansadr IEEE Transactions on Communications 68 (6), 3401-3414, 2020 | 21 | 2020 |
Covert communications on renewal packet channels R Soltani, D Goeckel, D Towsley, A Houmansadr 2016 54th Annual Allerton Conference on Communication, Control, and …, 2016 | 20 | 2016 |
Towards provably invisible network flow fingerprints R Soltani, D Goeckel, D Towsley, A Houmansadr 2017 51st Asilomar Conference on Signals, Systems, and Computers, 258-262, 2017 | 17 | 2017 |
Fundamental limits of invisible flow fingerprinting R Soltani, D Goeckel, D Towsley, A Houmansadr IEEE Transactions on Information Forensics and Security 15, 345-360, 2019 | 15 | 2019 |
Asymptotic loss in privacy due to dependency in gaussian traces N Takbiri, R Soltani, DL Goeckel, A Houmansadr, H Pishro-Nik 2019 IEEE Wireless Communications and Networking Conference (WCNC), 1-6, 2019 | 11 | 2019 |
I still know what you did last summer: Inferring sensitive user activities on messaging applications through traffic analysis A Bozorgi, A Bahramali, F Rezaei, A Ghafari, A Houmansadr, R Soltani, ... IEEE Transactions on Dependable and Secure Computing 20 (5), 4135-4153, 2022 | 7 | 2022 |
Fundamental limits of covert bit insertion in packets R Soltani, D Goeckel, D Towsley, A Houmansadr 2018 56th Annual Allerton Conference on Communication, Control, and …, 2018 | 5 | 2018 |
Practical Traffic Analysis Attacks on Secure Messaging Applications R Soltani, A Houmansadr, D Goeckel, D Towsley Alireza Bahramali, 2020 | 1 | 2020 |
Fundamental Limits of Covert Communication in Packet Channels R Soltani University of Massachusetts Amherst, 2019 | 1 | 2019 |
Compression of power delay profile R Soltani, H Kwon, F Penna, J Park US Patent App. 17/842,694, 2023 | | 2023 |
Compression of Channel Coefficients with Neural Networks for NR and LTE R Soltani, HJ Kwon, MS Lin, J Lee, I Kang 2022 IEEE 95th Vehicular Technology Conference:(VTC2022-Spring), 1-5, 2022 | | 2022 |
Deep learning-based channel buffer compression H Kwon, R Soltani, MS Lin, J Lee, I Kang US Patent App. 17/187,151, 2022 | | 2022 |
Deep learning-based channel buffer compression HJ Kwon, R Soltani, MSL Lin, J Lee, I Kang US Patent US20220101109A1, 2021 | | 2021 |