Invited Talk

Under Review

  1. Raeini M. G. and Nojoumian M.
    Privacy-Preserving Big Data Analytics: From Theory to Practice. Submitted to the 6th International Workshop on Security and Privacy in Big Data (BigSecurity), 6 pages, 2019.

  2. Park C., Nojoumian M. and Pados D. A.
    Using EEG and Self-Reported Human Metrics to Measure Trust in Human-Autonomous Vehicle Interactions. Submitted to the Springer Human-centric Computing and Information Sciences (HCIS): Security, trust and privacy for Human-centric Internet of Things, #HCIS-D-18-00234, 41 pages, 2018.

  3. Shahrdar S., Park C., Nojoumian M.
    Real-Time Trust Measurement in Human-Autonomous Vehicle Interactions Using a VR-Motion Simulator and a New Structured Data Collection Approach. Submitted to the ACM Transactions on Internet Technology (TOIT): Trust and AI, #TOIT-2018-0090, 20 pages, 2018.

  4. Alvarez R. and Nojoumian M.
    Comprehensive Survey on Privacy-Preserving Protocols for Securing the Financial Markets of Electronic Auctions. Submitted to the Elsevier Computers and Security, #COSE_2018_519, 17 pages, 2018.

  5. Golchubian A. and Nojoumian M.
    A Survey of Game Theoretic Network Security. Submitted to the Elsevier Computers and Security, #COSE_2018_224, 13 pages, 2018.

Refereed Journals

  1. Cordero C. G., Traverso G., Nojoumian M., Habib S. M., Buchmann J., Muhlhauser M. and Vasilomanolakis E.
    Sphinx: a Colluder-Resistant Trust Mechanism for Collaborative Intrusion Detection. IEEE Access (Access), vol. 6, pp. 72427-72438, 2018.

  2. Tonyali S., Akkaya K., Saputro N., Uluagac A. S. and Nojoumian M.
    Privacy-Preserving Protocols for Secure and Reliable Data Aggregation in IoT-Enabled Smart Metering Systems. Future Generation Computer Systems (FGCS), Elsevier, vol. 78, part 2, pp. 547-557, 2018.

  3. Subramanian S., Mozaffari Kermani M., Azarderakhsh R. and Nojoumian M.
    Reliable Hardware Architectures for Cryptographic Block Ciphers LED and HIGHT. IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems (TCAD), vol 36, issue 10, pp. 1750-1758, 2017.

  4. Eslami Z., Pakniat N. and Nojoumian M.
    Ideal Social Secret Sharing Using Birkhoff Interpolation Method. Security and Communication Networks (SCN), John Wiley & Sons, Ltd, vol. 9, issue 18, PP. 4973-4982, 2016.

  5. Nojoumian M. and Stinson D. R.
    Sequential Secret Sharing as a New Hierarchical Access Structure. Journal of Internet Services and Info Security (JISIS), Next Gen Networks and Systems Security, vol. 5, issue 2, pp. 24-32, 2015.

  6. Nojoumian M. and Stinson D. R.
    On Dealer-free Dynamic Threshold Schemes. Advances in Mathematics of Communications (AMC), American Institute of Math Sciences, vol. 7, no. 1, pp. 39-56, 2013.

  7. Nojoumian M. and Lethbridge T. C.
    Reengineering PDF-Based Documents Targeting Complex Software Specifications. International Journal of Knowledge and Web Intelligence (IJKWI), Inderscience, vol. 2, no. 4, pp. 292-319, 2011.

  8. Nojoumian M., Stinson D. R., and Grainger M.
    Unconditionally Secure Social Secret Sharing Scheme. IET Information Security (IFS), Multi-Agent and Distributed Information Security, vol. 4, issue 4, pp. 202-211, 2010.

  9. Nojoumian M. and Lethbridge T. C.
    A New Approach for the Trust Calculation in Social Networks. E-Business and Telecommunication Networks (E-BTN): Selected Papers of ICETE 06, Springer CCIS, vol. 9, pp. 64-77, 2008.
    Acceptance Rate: 29/326: 9%

Refereed Conferences

  1. Shahrdar S., Park C. and Nojoumian M.
    Human Trust Measurement Using an Immersive Virtual Reality Autonomous Vehicle Simulator. To Appear in the AAAI/ACM Conference on AI, Ethics, and Society (AIES), 6 pages, Honolulu, USA, 2019.
    Acceptance Rate: 34/220: 15%

  2. Nojoumian M.
    Rational Trust Modeling. 9th Conference on Decision and Game Theory for Security (GameSec), Springer LNCS 11199, pp. 418-431, Seattle, USA, 2018.

  3. Park C., Shahrdar S., Nojoumian M.
    EEG-Based Classification of Emotional State Using an Autonomous Vehicle Simulator. 10th IEEE Sensor Array and Multichannel Signal Processing Workshop (SAM), pp. 297-300, Sheffield, UK, 2018.

  4. Nojoumian M., Golchubian A., Njilla L., Kwiat K. and Kamhoua C.
    Incentivizing Blockchain Miners to Avoid Dishonest Mining Strategies By a Reputation-Based Paradigm. Computing Conference (CC), Springer AISC 857, pp. 1118-1134, London, UK, 2018.
    The complete version with proofs appears as a book chapter in Blockchain and Distributed Systems Security.

  5. Shahrdar S., Menezes L. and Nojoumian M.
    A Survey on Trust in Autonomous Systems. Computing Conference (CC), Springer AISC 857, pp. 368-386, London, UK, 2018.

  6. Ades C., Gonzalez I., AlSaidi M., Nojoumian M., Bai O., Aravelli A., Lagos L. and Engeberg E.
    Robotic Finger Force Sensor Fabrication and Evaluation Through a Glove. 31th Florida Conference on Recent Advances in Robotics (FCRAR), pp. 60-65, Orlando, USA, 2018.
    Received the Best Paper Award

  7. Raeini M. G. and Nojoumian M.
    Secure Error Correction Using Multiparty Computation. 8th IEEE Annual Computing and Communication Workshop and Conference (CCWC), pp. 468-473, Las Vegas, US, 2018.

  8. Traverso G., Garcia C., Nojoumian M., Azarderakhsh R., Demirel D., Habib S.M. and Buchmann J.
    Evidence-Based Trust Mechanism Using Clustering Algorithms for Distributed Storage Systems. 15th IEEE Annual Conference on Privacy, Security and Trust (PST), pp. 277-282, Calgary, Canada, 2017.

  9. Abd M. A., Gonzalez I., Nojoumian M. and Engeberg E. D.
    Impacts of Robot Assistant Performance on Human Trust, Satisfaction, and Frustration. Robotics, Science and Systems: Morality and Social Trust in Autonomous Robots Workshop (RSS), 4 pages, Boston, USA, 2017.

  10. Nojoumian M., Golchubian A., Saputro N. and Akkaya K.
    Preventing Collusion Between SDN Defenders and Attackers Using a Game Theoretical Approach. IEEE INFOCOM: Advances in Software Defined & Context Aware Cognitive Radio Networks (SCAN), pp. 802-807, Atlanta, USA, 2017.

  11. Abd M. A., Gonzalez I., Nojoumian M. and Engeberg E. D.
    Trust, Satisfaction and Frustration Measurements for Real-Time Human-Robot Interaction. 30th Florida Conference on Recent Advances in Robotics (FCRAR), pp. 89-93, Boca Raton, USA, 2017.

  12. Nojoumian M.
    Unconditionally Secure Proactive Verifiable Secret Sharing Using New Detection and Recovery Techniques. 14th IEEE Annual Conference on Privacy, Security and Trust (PST), pp. 269-274, Auckland, New Zealand, 2016.

  13. Krishnamachari S., Nojoumian M., and Akkaya K.
    Implementation and Analysis of Dutch-Style Sealed-Bid Auctions: Computational vs Unconditional Security. 1st International Conference on Information Systems Security and Privacy (ICISSP), pp. 106-113, Angers, France, 2015.

  14. Nojoumian M.
    Trust, Influence and Reputation Management Based on Human Reasoning. 4th AAAI Workshop on Incentives and Trust in E-Communities (WIT-EC), pp. 21-24, Austin, USA, 2015.

  15. Nojoumian M.
    Generalization of Socio-Rational Secret Sharing with a New Utility Function. 12th IEEE Annual Conference on Privacy, Security and Trust (PST), pp. 338-341, Toronto, Canada, 2014.

  16. Nojoumian M. and Stinson D. R.
    Efficient Sealed-Bid Auction Protocols Using Verifiable Secret Sharing. 10th International Conference on Information Security Practice and Experience (ISPEC), Springer LNCS 8434, pp. 302-317, Fuzhou, China, 2014.
    Acceptance Rate: 36/158: 23%

  17. Nojoumian M. and Stinson D. R.
    Socio-Rational Secret Sharing as a New Direction in Rational Cryptography. 3rd Conference on Decision and Game Theory for Security (GameSec), Springer LNCS 7638, pp. 18-37, Budapest, Hungary, 2012.
    Acceptance Rate: 10/37: 27%

  18. Nojoumian M. and Stinson D. R.
    Social Secret Sharing in Cloud Computing Using a New Trust Function. 10th IEEE Annual Conference on Privacy, Security and Trust (PST), pp. 161-167, Paris, France, 2012.

  19. Nojoumian M. and Stinson D. R.
    Unconditionally Secure First-Price Auction Protocols Using a Multicomponent Commitment Scheme. 12th International Conference on Information and Communications Security (ICICS), Springer LNCS 6476, pp. 266-280, Barcelona, Spain, 2010.
    Acceptance Rate: 31/135: 23%

  20. Nojoumian M. and Stinson D. R.
    Brief Announcement: Secret Sharing Based on the Social Behaviors of Players. 29th ACM Symposium on Principles of Distributed Computing (PODC), pp. 239-240, Zurich, Switzerland, 2010.

  21. Nojoumian M. and Nair D. K.
    Comparing Genetic Algorithm and Guided Local Search Methods by Symmetric TSP Instances. 10th ACM Genetic and Evolutionary Computation Conference (GECCO), pp. 1131-1132, Atlanta, USA, 2008.

  22. Nojoumian M. and Lethbridge T. C.
    Extracting Document Structure to Facilitate a Knowledge Base Creation for the UML Superstructure Specification. 4th IEEE International Conference on Info Technology: New Generations (ITNG), pp. 393-400, Las Vegas, USA, 2007.

  23. Nojoumian M. and Lethbridge T. C.
    A New Approach for the Trust Calculation in Social Networks. 3rd International Conference on E-Business (ICE-B): Part of ICETE, pp. 257-264, Setubal, Portugal, 2006.
    Selected as a Best Paper

  24. Nojoumian M. and Tran T.
    Computational Politics and Economy for the Establishment of an Integrated Intelligent Government. 19th IEEE Canadian Conference on Electrical and Computer Engineering (CCECE), pp. 332-336, Ottawa, Canada, 2006.

Refereed Presentations

  1. Nojoumian M.
    Game Theoretical Analysis of a Reputation-Based Cryptocurrency Mining Paradigm. 18th International Symposium on Dynamic Games and Applications (ISDG), Grenoble, France, Presentation on July 10, 2018.

  2. Nojoumian M.
    Dealer-Free Threshold Changeability in Secret Sharing Schemes. 9th International Conference on Information Theoretic Security (ICITS), Tacoma, USA, Presentation on August 10, 2016.

  3. Nojoumian M.
    From Rational Secret Sharing to Social and Socio-Rational Secret Sharing. 5th World Congress of the Game Theory Society (GAMES), Maastricht, The Netherlands, Presentation on July 24, 2016.

PhD and MSc Theses