default search action
Iman Vakilinia
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c24]Lakshmi Priya Krishnan, Iman Vakilinia, Sandeep Reddivari, Sanjay Ahuja:
Analyzing Cryptocurrency Social Media for Price Forecasting and Scam Detection. ISDFS 2024: 1-6 - [c23]Lakshmi Priya Krishnan, Iman Vakilinia, Sandeep Reddivari, Sanjay Ahuja:
Handling Imbalanced Data for Detecting Scams in Ethereum Transactions Using Sampling Techniques. ISDFS 2024: 1-6 - 2023
- [j8]Lakshmi Priya Krishnan, Iman Vakilinia, Sandeep Reddivari, Sanjay Ahuja:
Scams and Solutions in Cryptocurrencies - A Survey Analyzing Existing Machine Learning Models. Inf. 14(3): 171 (2023) - [j7]William David Paredes, Hemani Kaushal, Iman Vakilinia, Zornitza Genova Prodanoff:
LoRa Technology in Flying Ad Hoc Networks: A Survey of Challenges and Open Issues. Sensors 23(5): 2403 (2023) - [j6]Iman Vakilinia, Weihong Wang, Jiajun Xin:
An Incentive-Compatible Mechanism for Decentralized Storage Network. IEEE Trans. Netw. Sci. Eng. 10(4): 2294-2306 (2023) - 2022
- [j5]Iman Vakilinia, Peyman Faizian, Mohammad Mahdi Khalili:
RewardRating: A Mechanism Design Approach to Improve Rating Systems. Games 13(4): 52 (2022) - [c22]Swapnoneel Roy, O. Patrick Kreidl, Karthikeyan Umapathy, Zornitza Genova Prodanoff, Iman Vakilinia:
Building Framework and Infrastructure to Assist a Minority Serving Institution (MSI) in Cybersecurity Program Development. CSCI 2022: 2137-2139 - [c21]Iman Vakilinia:
Cryptocurrency Giveaway Scam with YouTube Live Stream. UEMCON 2022: 195-200 - [i3]Iman Vakilinia:
Cryptocurreny Giveaway Scam with YouTube Live Stream. CoRR abs/2205.12897 (2022) - [i2]Iman Vakilinia, Weihong Wang, Jiajun Xin:
An Incentive-Compatible Mechanism for Decentralized Storage Network. CoRR abs/2208.09937 (2022) - 2021
- [c20]Iman Vakilinia, Mohammad Mahdi Khalili, Ming Li:
A Mechanism Design Approach to Solve Ransomware Dilemmas. GameSec 2021: 181-194 - [c19]Mohammad Mahdi Khalili, Iman Vakilinia:
Trading Privacy through Randomized Response. INFOCOM Workshops 2021: 1-6 - [i1]Iman Vakilinia, Peyman Faizian, Mohammad Mahdi Khalili:
RewardRating: A Mechanism Design Approach to Improve Rating Systems. CoRR abs/2101.10954 (2021) - 2020
- [j4]Iman Vakilinia, Shamik Sengupta:
Vulnerability market as a public-good auction with privacy preservation. Comput. Secur. 93: 101807 (2020) - [c18]Shahriar Badsha, Iman Vakilinia, Shamik Sengupta:
BloCyNfo-Share: Blockchain based Cybersecurity Information Sharing with Fine Grained Access Control. CCWC 2020: 317-323 - [c17]Bryson Lingenfelter, Iman Vakilinia, Shamik Sengupta:
Analyzing Variation Among IoT Botnets Using Medium Interaction Honeypots. CCWC 2020: 761-767 - [c16]Iman Vakilinia, Mohammad Jafari, Deepak K. Tosh, Shahin Vakilinia:
Privacy Preserving Path Planning in an Adversarial Zone. ISNCC 2020: 1-6
2010 – 2019
- 2019
- [b1]Iman Vakilinia:
Collaborative Analysis of Cybersecurity Information Sharing. University of Nevada, Reno, USA, 2019 - [j3]Iman Vakilinia, Shamik Sengupta:
Fair and private rewarding in a coalitional game of cybersecurity information sharing. IET Inf. Secur. 13(6): 530-540 (2019) - [j2]Iman Vakilinia, Shamik Sengupta:
A Coalitional Cyber-Insurance Framework for a Common Platform. IEEE Trans. Inf. Forensics Secur. 14(6): 1526-1538 (2019) - [c15]Shahriar Badsha, Iman Vakilinia, Shamik Sengupta:
Privacy Preserving Cyber Threat Information Sharing and Learning for Cyber Defense. CCWC 2019: 708-714 - [c14]Iman Vakilinia, Shahin Vakilinia, Shahriar Badsha, Engin Arslan, Shamik Sengupta:
Pooling Approach for Task Allocation in the Blockchain Based Decentralized Storage Network. CNSM 2019: 1-6 - 2018
- [c13]Iman Vakilinia, Sui Cheung, Shamik Sengupta:
Sharing Susceptible Passwords as Cyber Threat Intelligence Feed. MILCOM 2018: 1-6 - [c12]Farhan Sadique, Sui Cheung, Iman Vakilinia, Shahriar Badsha, Shamik Sengupta:
Automated Structured Threat Information Expression (STIX) Document Generation with Privacy Preservation. UEMCON 2018: 847-853 - [c11]Iman Vakilinia, Shahriar Badsha, Shamik Sengupta:
Crowdfunding the Insurance of a Cyber-Product Using Blockchain. UEMCON 2018: 964-970 - 2017
- [c10]Deepak K. Tosh, Iman Vakilinia, Sachin Shetty, Shamik Sengupta, Charles A. Kamhoua, Laurent Njilla, Kevin A. Kwiat:
Three Layer Game Theoretic Decision Framework for Cyber-Investment and Cyber-Insurance. GameSec 2017: 519-532 - [c9]Iman Vakilinia, Sushil J. Louis, Shamik Sengupta:
Evolving sharing strategies in cybersecurity information exchange framework. GECCO (Companion) 2017: 309-310 - [c8]Iman Vakilinia, Shamik Sengupta:
A coalitional game theory approach for cybersecurity information sharing. MILCOM 2017: 237-242 - [c7]Iman Vakilinia, Deepak K. Tosh, Shamik Sengupta:
3-Way game model for privacy-preserving cybersecurity information exchange framework. MILCOM 2017: 829-834 - [c6]Shahin Vakilinia, Iman Vakilinia, Mohamed Cheriet:
Green process offloading in smart home. PIMRC 2017: 1-5 - [c5]Iman Vakilinia, Deepak K. Tosh, Shamik Sengupta:
Attribute based sharing in cybersecurity information exchange framework. SPECTS 2017: 1-6 - [c4]Iman Vakilinia, Deepak K. Tosh, Shamik Sengupta:
Privacy-preserving cybersecurity information exchange mechanism. SPECTS 2017: 1-7 - 2016
- [c3]Iman Vakilinia, Jiajun Xin, Ming Li, Linke Guo:
Privacy-Preserving Data Aggregation over Incomplete Data for Crowdsensing. GLOBECOM 2016: 1-6 - 2013
- [j1]Shahin Vakilinia, Mohammad Hosein Alvandi, Mohammad Reza Khalili Shoja, Iman Vakilinia:
Cross-Layered Secure and QoS Aware Design of VOIP over Wireless Ad-Hoc Networks. Int. J. Bus. Data Commun. Netw. 9(4): 23-45 (2013) - [c2]Shahin Vakilinia, Mohammad Hosein Alvandi, Mohammad Reza Khalili Shoja, Iman Vakilinia:
Multi-path multi-channel protocol design for secure qos-aware VOIP in wireless ad-hoc networks. WMNC 2013: 1-6 - [c1]Shahin Vakilinia, Iman Vakilinia:
QoS aware energy efficient resource allocation in wireless cooperative OFDMA relay networks. WMNC 2013: 1-4
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-07-12 20:12 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint