The capacity of the semi-deterministic relay channel A El Gamal, MR Aref IEEE Trans. Inform. Theory 28 (3), 1974 | 286* | 1974 |
A secure authentication scheme for VANETs with batch verification M Bayat, M Barmshoory, M Rahimi, MR Aref Wireless networks 21, 1733-1743, 2015 | 267 | 2015 |
Information flow in relay networks MR Aref Stanford University, 1981 | 173 | 1981 |
Achievability proof via output statistics of random binning MH Yassaee, MR Aref, A Gohari IEEE Transactions on Information Theory 60 (11), 6760-6786, 2014 | 147 | 2014 |
Desynchronization attack on RAPP ultralightweight authentication protocol Z Ahmadian, M Salmasizadeh, MR Aref Information processing letters 113 (7), 205-209, 2013 | 107 | 2013 |
Impossible differential attack on seven-round AES-128 B Bahrak, MR Aref IET Information Security 2 (2), 28-32, 2008 | 99 | 2008 |
Statistical performance analysis of MDL source enumeration in array processing F Haddadi, M Malek-Mohammadi, MM Nayebi, MR Aref IEEE Transactions on Signal Processing 58 (1), 452-457, 2009 | 86 | 2009 |
A technique for deriving one-shot achievability results in network information theory MH Yassaee, MR Aref, A Gohari 2013 IEEE International Symposium on Information Theory, 1287-1291, 2013 | 83 | 2013 |
Multiple access wiretap channels with strong secrecy MH Yassaee, MR Aref 2010 IEEE Information Theory Workshop, 1-5, 2010 | 78 | 2010 |
A secure ECC-based privacy preserving data aggregation scheme for smart grids E Vahedi, M Bayat, MR Pakravan, MR Aref Computer Networks 129, 28-36, 2017 | 77 | 2017 |
Mobility modeling and analytical solution for spatial traffic distribution in wireless multimedia networks F Ashtiani, JA Salehi, MR Aref IEEE Journal on Selected Areas in Communications 21 (10), 1699-1709, 2003 | 70 | 2003 |
Channel simulation via interactive communications MH Yassaee, A Gohari, MR Aref IEEE Transactions on Information Theory 61 (6), 2964-2982, 2015 | 69 | 2015 |
Dynamic and secure key management model for hierarchical heterogeneous sensor networks MR Alagheband, MR Aref IET Information Security 6 (4), 271-280, 2012 | 69 | 2012 |
Adaptive detection algorithm for radar signals in autoregressive interference A Sheikhi, MM Nayebi, MR Aref IEE Proceedings-Radar, Sonar and Navigation 145 (5), 309-314, 1998 | 64 | 1998 |
Efficient secure channel coding based on quasi-cyclic low-density parity-check codes AAS Afshar, T Eghlidos, MR Aref IET communications 3 (2), 279-292, 2009 | 62 | 2009 |
Squaring attacks on McEliece public-key cryptosystems using quasi-cyclic codes of even dimension C Löndahl, T Johansson, M Koochak Shooshtari, M Ahmadian-Attari, ... Designs, Codes and Cryptography 80, 359-377, 2016 | 59 | 2016 |
Signal activity detection of phase-shift keying signals AA Tadaion, M Derakhtian, S Gazor, MM Nayebi, MR Aref IEEE Transactions on Communications 54 (8), 1439-1445, 2006 | 57 | 2006 |
A fuzzy fully distributed trust management system in wireless sensor networks H Jadidoleslamy, MR Aref, H Bahramgiri AEU-International Journal of Electronics and Communications 70 (1), 40-49, 2016 | 53 | 2016 |
Slepian–Wolf coding over cooperative relay networks MH Yassaee, MR Aref IEEE transactions on information theory 57 (6), 3462-3482, 2011 | 50 | 2011 |
A fast multiple-source detection and localization array signal processing algorithm using the spatial filtering and ML approach AA Tadaion, M Derakhtian, S Gazor, MR Aref IEEE transactions on signal processing 55 (5), 1815-1827, 2007 | 50 | 2007 |