Follow
Mohammad Hossein Manshaei
Mohammad Hossein Manshaei
IUT/EPFL/INRIA
Verified email at epfl.ch - Homepage
Title
Cited by
Cited by
Year
IEEE 802.11 rate adaptation: a practical approach
M Lacage, MH Manshaei, T Turletti
Proceedings of the 7th ACM international symposium on Modeling, analysis and …, 2004
9152004
Game theory meets network security and privacy
M Manshaei, Q Zhu, T Alpcan, T Basar, JP Hubaux
ACM Computing Surveys 45 (3), 2013
8372013
On non-cooperative location privacy: a game-theoretic analysis
J Freudiger, MH Manshaei, JP Hubaux, DC Parkes
Proceedings of the 16th ACM conference on Computer and communications …, 2009
2202009
On wireless social community networks
MH Manshaei, J Freudiger, M Félegyházi, P Marbach, JP Hubaux
IEEE INFOCOM 2008-The 27th Conference on Computer Communications, 1552-1560, 2008
1022008
Revocation games in ephemeral networks
M Raya, MH Manshaei, M Félegyházi, JP Hubaux
Proceedings of the 15th ACM conference on Computer and communications …, 2008
862008
On the age of pseudonyms in mobile ad hoc networks
J Freudiger, MH Manshaei, JY Le Boudec, JP Hubaux
2010 Proceedings IEEE INFOCOM, 1-9, 2010
812010
Non-cooperative location privacy
J Freudiger, MH Manshaei, JP Hubaux, DC Parkes
IEEE Transactions on Dependable and Secure Computing 10 (2), 84-98, 2012
682012
Performance analysis of the IEEE 802.11 MAC and physical layer protocol
MH Manshaei, GR Cantieni, C Barakat, T Turletti
Sixth IEEE International Symposium on a World of Wireless Mobile and …, 2005
642005
MMP–TIMP interactions in cancer invasion: An evolutionary game-theoretical framework
JS Sartakhti, MH Manshaei, M Sadeghi
Journal of theoretical biology 412, 17-26, 2017
552017
: A Peer-to-Peer Privacy Preserving Query Service for Location-Based Mobile Applications
M Ghaffari, N Ghadiri, MH Manshaei, MS Lahijani
IEEE Transactions on Vehicular Technology 66 (10), 9458-9469, 2017
492017
Resource allocation for machine-to-machine communications with unmanned aerial vehicles
MN Soorki, M Mozaffari, W Saad, MH Manshaei, H Saidi
2016 IEEE Globecom Workshops (GC Wkshps), 1-6, 2016
422016
A game-theoretic analysis of shard-based permissionless blockchains
MH Manshaei, M Jadliwala, A Maiti, M Fooladgar
IEEE Access 6, 78100-78112, 2018
402018
Tracking games in mobile networks
M Humbert, MH Manshaei, J Freudiger, JP Hubaux
International Conference on Decision and Game Theory for Security, 38-57, 2010
392010
CLARA: closed-loop adaptive rate allocation for IEEE 802.11 wireless LANs
C Hoffmann, H Manshaei, T Turletti
2005 International Conference on Wireless Networks, Communications and …, 2005
382005
Simulation-based performance analysis of 802.11 a wireless LAN
MH Manshaei, T Turletti
Proc. International Symposium on Telecommunications (IST’03), 2003
35*2003
Secure and private data aggregation for energy consumption scheduling in smart grids
MA Rahman, MH Manshaei, E Al-Shaer, M Shehab
IEEE Transactions on Dependable and Secure Computing 14 (2), 221-234, 2015
342015
A game-theoretic approach for deceiving remote operating system fingerprinting
MA Rahman, MH Manshaei, E Al-Shaer
2013 IEEE Conference on Communications and Network Security (CNS), 73-81, 2013
332013
Ad-blocking games: Monetizing online content under the threat of ad avoidance
N Vratonjic, MH Manshaei, J Grossklags, JP Hubaux
The Economics of Information Security and Privacy, 49-73, 2013
332013
An evolutionary game model for analysis of rumor propagation and control in social networks
M Askarizadeh, BT Ladani, MH Manshaei
Physica A: statistical mechanics and its applications 523, 21-39, 2019
322019
A dynamic bayesian security game framework for strategic defense mechanism design
S Farhang, MH Manshaei, MN Esfahani, Q Zhu
International conference on decision and game theory for security, 319-328, 2014
292014
The system can't perform the operation now. Try again later.
Articles 1–20