Negar Kiyavash

Electrical and Computer Engineering
Negar  Kiyavash
Negar Kiyavash
Associate Professor
109 Coordinated Science Lab MC 228
1308 W. Main St.
Urbana Illinois 61801

For more information

Negar Kiyavash's home page.

Profile

Education

  • Ph.D., Electrical and Computer Engineering, University of Illinois at Urbana-Champaign, USA 2006.
  • M.S., Electrical and Computer Engineering, University of Illinois at Urbana-Champaign, USA 2003.
  • B.S., Electrical Engineering, Sharif University of Technology, Iran 1999.

Research Interests

Statistical Signal Processing and Information Theory with Applications to Network Inference and Computer, Communication and Multimedia Security.

Research Areas

  • Coding theory and applications
  • Communications
  • Information theory
  • Machine learning and pattern recognition
  • Signal Processing
  • Watermarking and information forensics

Selected Articles in Journals

  • S. Kadloor and N. Kiyavash, “Delay Optimal Policies Offer Very Little Privacy,” to appear, IEEE Transactions on Information Theory.
  • S. Kadloor, N. Kiyavash, and P. Venkitasubramaniam, “Mitigating Timing based Information Leakage in Shared Schedulers,” to appear, IEEE/ACM Transactions on Networking.
  • S. Kim, C. Quinn, N. Kiyavash, and T. Coleman, “Dynamic and Succinct Statistical Analysis of Neuroscience Data,” Proceedings of the IEEE, pp. 683-698, Vol. 102, No. 5, 2014.
  • A. A. Kulkarni, N. Kiyavash, and R. Sreenivas, “On the Varshamov-Tenengolts Construction on Binary Strings,” to appear in SIAM Journal on Discrete Mathematics (SIDMA), pp. 7990, Vol. 317, 2014.
  • D. Cullina and N. Kiyavash, “An Improvement to Levenshteins Upper Bound on the Cardinality of Deletion Correcting Codes,” IEEE Transactions on Information Theory, pp. 3862-3870, Vol. 60, No. 7, 2014.
  • X. Gong, M. Rodrigues, and N. Kiyavash, “Invisible Flow Watermarks for Channels with Dependent Substitution, Deletion, and Bursty Insertion Errors,” IEEE Transactions on Information Forensics and Security, pp. 1850-1859, Vol. 8, No. 11, 2013.
  • A. Houmansadr, N. Kiyavash, and N. Borisov, “Non-blindWatermarking of Network Flows,” IEEE/ACM Transactions on Networking, pp. 1232-1244, Vol. 22, No. 4, 2013.
  • C. Quinn, T. Coleman, and N. Kiyavash, "Efficient Methods to Compute Optimal Tree Approximations of Directed Information Graphs, IEEE Transactions on Signal Processing, pp. 3173-3182, Vol. 61, No. 12, 2013.
  • S. Kadloor, P. Venkitasubramaniam, N. Kiyavash, and A. Mishra, “A Statistical Inference Perspective on Preventing Timing Analysis in Networks,” IEEE Signal Processing Magazine, special issue on “Signal Processing for Cyber-security and Privacy,” pp. 76 - 85,Vol. 30, No. 5, 2013.
  • A. A. Kulkarni and N. Kiyavash, “Non-asymptotic Upper Bounds for Single-Deletion Correcting Codes,” IEEE Transactions on Information Theory, pp. 5115-5130, Vol. 59, No. 8, 2013.
  • N. Kiyavash, F. Koushanfar, T. Coleman, and M. Rodrigues, "A Timing Channel Spyware for the CSMA/CA Protocol," IEEE Transactions on Information Forensics and Security,  pp. 477-487, Vol. 8, No. 3, 2013.
  • D. Mixon, C. Quinn, N. Kiyavash, and M. Fickus, "Equiangular Tight Frame Fingerprinting Codes," IEEE Transactions on Information Theory,  pp. 1855-1865, Vol. 59, No. 3, 2013.
  • S. Kadloor, X. Gong, N. Kiyavash, and P. Venkitasubramaniam, "Designing Router Scheduling Policies: A Privacy Perspective," IEEE Transactions on Signal Processing, pages 2001-2012, Vol. 60, No. 4, 2012.
  • S. K. Gorantla, S. Kadloor, N. Kiyavash, T.P. Coleman, I. Moskowitz, and M. Kang, "Characterizing the Efficacy of the NRL Network Pump in Mitigating Covert Timing Channels," IEEE Transactions on Information Forensics and Security, pages 64-75, Vol. 7, No. 1, 2011.
  • C. Quinn, T. Coleman, N. Kiyavash, and N. Hatsopoulos, "Estimating the Directed Information to Infer Causal Relationships in Ensemble Neural Spike Train Recordings," Journal of Computational Neuroscience, pages. 1- 28, 2010.
  • D. Uhlig, N. Kiyavash, and N. Neogi, "Fault Tolerant Triangulation in Distributed Aircraft Networks with Automatic Dependent Surveillance Broadcast (ADS-B)," International Journal of Systems, Control and Communications (IJSCC) Special Issue on: "Information Processing and Decision Making in Distributed Control Systems," pages 298-324, Vol. 2, No. 1, 2010.
  • N. Kiyavash, P. Moulin, and T. Kalker, "Regular Simplex Fingerprints and Their Optimality Proper-ties," IEEE Transactions on Information Forensics and Security, pages 318-329, Vol. 4, No. 3, 2009.
  • N. Kiyavash, P. Moulin, "Performance of Orthogonal Fingerprinting Codes under Worst-case Noise," IEEE Transactions on Information Forensics and Security, pages 293-301, Vol. 4, No. 3, 2009.
  • I. Duursma, N. Kiyavash, "The Vector Decomposition Problem for Elliptic and Hyperelliptic Curves," Journal of the Ramanujan Mathematical Society, pages 59-76, Vol. 20, No. 1, 2005.

Articles in Conference Proceedings

  • D. Cullina and N. Kiyavash, “Generalized sphere-packing upper bounds on the size of codes for combinatorial channels,” in Proceedings of the IEEE International Symposium on Information Theory (ISIT), 2014.
  • A. Truong and N. Kiyavash, “Optimal Adversarial Strategies in Learning with Expert Advice,” in Proceedings of the IEEE Conference on Decision and Control (CDC), 2014.
  • J. Etesami and N. Kiyavash, “Directed Information Graphs: a Generalization of Linear Dynamical Graphs,” in Proceedings of the American Control Conference (ACC), 2014.
  • J. Etesami and N. Kiyavash, “A Novel Collusion Attack on Finite Alphabet Digital Fingerprinting Systems,” in Proceedings of the IEEE International Symposium on Information Theory (ISIT), 2014.
  • D. Cullina and N. Kiyavash, “An Improvement to Levenshteins Upper Bound on the Cardinality of Deletion Correcting Codes,” in Proceedings of the IEEE International Symposium on Information Theory (ISIT), 2013.
  • C. Quinn, A. Pinar, and N. Kiyavash, “Optimal Bounded-Degree Approximations of Joint Distributions of Networks of Stochastic Processes,” in IEEE International Symposium on Information Theory (ISIT), 2013.
  • C. Quinn, J. Etesami, N. Kiyavash, and T. Coleman, “Robust Directed Tree Approximations for Networks of Stochastic Processes,” in IEEE International Symposium on Information Theory (ISIT), 2013.
  • X. Gong, N. Kiyavash, "Timing side channels for traffic analysis," in IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), Vancouver, Canada, May 2013.
  • S. Kadloor, N. Kiyavash, "Delay Optimal Policies Offer Very Little Privacy," in International Conference on Computer Communications (INFOCOM), Turin, Italy, April 2013. (Acceptance rate: 17%)
  • D. Cullina, A. Kulkarni, and N. Kiyavash, "A Coloring Approach to Constructing Deletion Correcting Codes from Constant Weight Subgraphs," in IEEE International Symposium on Information Theory (ISIT), Boston, July 2012.
  • J. Etesami, N. Kiyavash, and T. Coleman, "Learning Minimal Latent Directed Information Trees," in IEEE International Symposium on Information Theory (ISIT), Boston, July 2012.
  • X. Gong, N. Borisov, N. Kiyavash, and N. Schear, "Website Detection Using Remote Traffic Analysis," in Privacy Enhancing Technologies Symposium (PETS), Vigo, Spain, July 2012.
  • X.Gong, M. Rodrigues, and N. Kiyavash, "Invisible Flow Watermarks for Channels with Dependent Substitution and Deletion Errors," in IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), Kyoto, Japan, March 2012.
  • S. Kadloor, N. Kiyavash, and P. Venkitasubramaniam, "Mitigating Timing Based Information Leakage in Shared Schedulers," in INFOCOM, Orlando, Florida, March 2012. (Acceptance rate: 17%)
  • A. Truong, N. Kiyavash, and V. Borkar, "Convergence Analysis for an Online Recommendation System," in IEEE Conference on Decision and Control (CDC), pages 3889-3894, Orlando, Florida, December 2011.
  • C. Quinn, N. Kiyavash, and Todd P. Coleman, "A Minimal Approach to Causal Inference on Topologies with Bounded Indegree," in IEEE Conference on Decision and Control (CDC), pages 168-173, Orlando, Florida, December 2011.
  • X. Gong, N. Kiyavash, and P. Venkitasubramaniam, "Information Theoretic Analysis of Side Channel Information Leakage in FCFS Schedulers," in IEEE International Symposium on Information Theory (ISIT), St. Petersburg, Russia, August 2011.
  • C. Quinn, N. Kiyavash, and T. Coleman, "Equivalence between Minimal Generative Model Graphs and Directed Information Graphs," in IEEE International Symposium on Information Theory (ISIT), St. Petersburg, Russia, August 2011.
  • D. Mixon, C. Quinn, N. Kiyavash, and M. Fickus, "Equiangular Tight Frame Fingerprinting Codes," in IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), Prague, Czech Republic, May 2011.
  • S. Kadloor, X.Gong, N. Kiyavash, and Parv Venkitasubramaniam, "Designing Privacy Preserving Router Scheduling Policies," in Conference on Information Sciences and Systems (CISS), Baltimore, Maryland, March 2011.
  • S. K. Gorantla, S. Kadloor, T. P. Coleman, N. Kiyavash, I. Moskowitz, and M. Kang, "Information Theoretic Limits of Covert Communication Over the Network Pump," in IEEE International Symposium on Information Theory and its Applications (ISITA), Taichung, Taiwan, October 2010.
  • C. Quinn, N. Kiyavash, and T. Coleman, "Approximating Discrete Probability Distributions with Causal Dependence Trees," in IEEE International Symposium on Information Theory and its Applications (ISITA), Taichung, Taiwan, October 2010.
  • S. Kadloor, X. Gong, N. Kiyavash, T. Tezcan, and N. Borisov, "A Low-Cost Side Channel Traffic Analysis Attack in Packet Networks," in IEEE International Conference on Communications (ICC), Cape Town, South Africa, May 2010.
  • N. Kiyavash, T. P. Coleman, and Mavis Rodrigues, "Novel Shaping and Complexity-Reduction Techniques for Approaching Capacity over Queuing Timing Channels," in IEEE International Conference on Communications (ICC), Dresden, Germany, June 2009.
  • N. Kiyavash, T. P. Coleman, "Covert Timing Channel Codes for Communication over Interactive Traffic," in Proceedings of IEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP), Taipei, Taiwan, April 2009.
  • Amir Houmansadr, N. Kiyavash, and Nikita Borisov, "Multi-Flow Attack Resistant Watermarks for Network Flows," in Proceedings of IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), Taipei, Taiwan, April 2009.
  • Amir Houmansadr, N. Kiyavash, and Nikita Borisov, "RAINBOW: A Robust And Invisible Non-Blind Watermark for Network Flows," in Network & Distributed System Security Symposium (NDSS), San Diego, California, February 2009. (Acceptance rate: 11%)
  • D. Uhlig, N. Kiyavash, and N. Neogi, "Real-Time Triangulation Based on Measurements from Mobile ADSB Aircraft," in Euromicro Conference on Real-Time Systems (ECRTS), Prague, Czech Republic, July 2008.
  • N. Kiyavash, A. Houmansadr, and N. Borisov, "Multi-flow Attacks against Network Flow Watermarking Schemes," in USENIX Security Symposium 2008, San Jose, California, July 2008. (Acceptance rate: 14%)
  • T. P. Coleman, N. Kiyavash, and V. Subramanian, "The Rate-Distortion Function of a Poisson Process with a Queuing Distortion Measure," in IEEE Data Compression Conference (DCC), Snowbird, Utah, March 2008.
  • T. P. Coleman, N. Kiyavash, "Sparse Graph Codes and Practical Decoding Algorithms for Communicating over Packet Timings in Networks," in Conference on Information Sciences and Systems (CISS), Princeton, New Jersey, March 2008.
  • N. Kiyavash, F. Koushanfar, "Anti-Collusion Position Estimation in Wireless Sensor Networks," in Proceedings of the IEEE Mobile Ad-hoc and Sensor Systems (MASS), Pisa, Italy, October 2007.
  • P. Moulin, N. Kiyavash, "Expurgated Gaussian Fingerprinting Codes," in Proceedings of IEEE International Symposium on Information Theory (ISIT), Nice, France, June 2007.
  • P. Moulin, N. Kiyavash, "Performance of Random Fingerprinting Codes under Arbitrary Nonlinear Attacks," in Proceedings of IEEE Conference on Acoustics, Speech and Signal Processing (ICASSP), pages II-157-II-160, Honolulu, Hawaii, April 2007.
  • N. Kiyavash, P. Moulin, "Sphere Packing Lower Bound on Fingerprinting Error Probability," in Proceedings of SPIE Symposium on Electronic Imaging, San Jose, California, January 2007.
  • F. Koushanfar, N. Kiyavash, and M. Potkonjak, "Interacting Particle-Based Model for Missing Data in Sensor Networks: Foundations and Applications," pages 888-891, in Proceedings of IEEE Sensors, October 2006.
  • N. Kiyavash, R. Blahut, "On Capacity of a Constrained Two-Dimensional Channel in Presence of Violations," in Proceedings of IEEE International Symposium on Information Theory (ISIT), pages 2423-2427, Seattle, Washington, July 2006.
  • N. Kiyavash, P. Moulin, "On Optimal Collusion Strategies for Fingerprinting," in Proceedings of IEEE Conference on Acoustics, Speech and Signal Processing (ICASSP), Toulouse, France, May 2006.
  • N. Kiyavash, P. Moulin, "A Framework for Optimizing Nonlinear Collusion Attacks On Fingerprinting Systems," in Proceeding of Conference on Information Sciences and Systems (CISS), Princeton, New Jersey, March 2006.
  • P. Vontobel, R. Smarandache, N. Kiyavash, J. Teutsch, and D. Vukobratovic, "On Minimal Pseudo-codewords of Codes from Finite Geometries," in Proceedings of IEEE International Symposium on Information Theory (ISIT), pages 980-984, Adelaide, Australia, September 2005.
  • N. Kiyavash, I. Duursma, "On the Vector Decomposition Problem for m-torsion Points in an Elliptic," in Proceedings of IEEE International Symposium on Information Theory (ISIT), page 548, Chicago, June 2004.

Honors

  • Willett Faculty Scholar, College of Engineering (2014)
  • Deans Awards for Excellence in Research, College of Engineering (2014)
  • NSF Career Award (2011)
  • AFOSR YIP (2010)

Teaching Honors

List of Teachers Ranked as Excellent at UIUC, Spring 2014

Research Honors

Best Student Paper Award (ICASSP 2006).

Courses Taught