Presentation Mehrdad Nojoumian's Publication
Invited Talk

Ongoing/Under Review

  1. Shahrdar S., Park C., Nojoumian M.
    Real-Time Trust Measurement in Human-Autonomous Vehicle Interactions Using a VR-Motion Simulator and a New Structured Data Collection Approach. Accepted with Revisions, International Journal of HCI: Human-System Cooperation in Autonomous Driving.

  2. Shahrdar S., Park C., Nojoumian M.
    Human Trust Measurement in an Immersive Virtual Reality Autonomous Vehicle Simulation. Submitted to the IEEE Connected and Automated Vehicles Symposium.

  3. Cordero C. G., Traverso G., Nojoumian M., Habib S. M., Buchmann J. and Muhlhauser M.
    A Colluder Resistant Evidence-based Trust Dimension for Collaborative Intrusion Detection Systems. Submitted to the Computers & Security.

  4. Nojoumian M.
    Rational Trust Modeling. Under Review Manuscript,

Refereed Journals

  1. Tonyali S., Akkaya K., Saputro N., Uluagac A. S. and Nojoumian M.
    Privacy-Preserving Protocols for Secure and Reliable Data Aggregation in IoT-Enabled Smart Metering Systems. Future Generation Computer Systems (FGCS), Elsevier, vol. 78, part 2, pp. 547-557, 2018.

  2. Subramanian S., Mozaffari Kermani M., Azarderakhsh R. and Nojoumian M.
    Reliable Hardware Architectures for Cryptographic Block Ciphers LED and HIGHT. IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems (TCAD), vol 36, issue 10, pp. 1750-1758, 2017.

  3. Eslami Z., Pakniat N. and Nojoumian M.
    Ideal Social Secret Sharing Using Birkhoff Interpolation Method. Security and Communication Networks (SCN), John Wiley & Sons, Ltd, vol. 9, issue 18, PP. 4973-4982, 2016.

  4. Nojoumian M. and Stinson D. R.
    Sequential Secret Sharing as a New Hierarchical Access Structure. Journal of Internet Services and Info Security (JISIS), Next Gen Networks and Systems Security, vol. 5, issue 2, pp. 24-32, 2015.

  5. Nojoumian M. and Stinson D. R.
    On Dealer-free Dynamic Threshold Schemes. Advances in Mathematics of Communications (AMC), American Institute of Math Sciences, vol. 7, no. 1, pp. 39-56, 2013.

  6. Nojoumian M. and Lethbridge T. C.
    Reengineering PDF-Based Documents Targeting Complex Software Specifications. International Journal of Knowledge and Web Intelligence (IJKWI), Inderscience, vol. 2, no. 4, pp. 292-319, 2011.

  7. Nojoumian M., Stinson D. R., and Grainger M.
    Unconditionally Secure Social Secret Sharing Scheme. IET Information Security (IFS), Multi-Agent and Distributed Information Security, vol. 4, issue 4, pp. 202-211, 2010.

  8. Nojoumian M. and Lethbridge T. C.
    A New Approach for the Trust Calculation in Social Networks. E-Business and Telecommunication Networks (E-BTN): Selected Papers of ICETE 06, Springer CCIS, vol. 9, pp. 64-77, 2008.
    Acceptance Rate: 29/326: 9%

Refereed Conferences

  1. Park C., Shahrdar S., Nojoumian M.
    EEG-Based Classification of Emotional State Using an Autonomous Vehicle Simulator. To Appear in the 10th IEEE Sensor Array and Multichannel Signal Processing Workshop (SAM), Sheffield, UK, 2018.

  2. Nojoumian M., Golchubian A., Njilla L., Kwiat K. and Kamhoua C.
    Incentivizing Blockchain Miners to Avoid Dishonest Mining Strategies By a Reputation-Based Paradigm. To appear in IEEE Computing Conference (CC), London, UK, 2018.
    The complete version with proofs appears as a book chapter in Blockchain and Distributed Systems Security.

  3. Shahrdar S., Menezes L. and Nojoumian M.
    A Survey on Trust in Autonomous Systems. To appear in IEEE Computing Conference (CC), London, UK, 2018.

  4. Ades C., Gonzalez I., AlSaidi M., Nojoumian M., Bai O., Aravelli A., Lagos L. and Engeberg E.
    Robotic Finger Force Sensor Fabrication and Evaluation Through a Glove. 31th Florida Conference on Recent Advances in Robotics (FCRAR), Orlando, USA, 2018.

  5. Raeini M. G. and Nojoumian M.
    Secure Error Correction Using Multiparty Computation. 8th IEEE Annual Computing and Communication Workshop and Conference (CCWC), pp. 468-473, Las Vegas, US, 2018.

  6. Traverso G., Garcia C., Nojoumian M., Azarderakhsh R., Demirel D., Habib S.M. and Buchmann J.
    Evidence-Based Trust Mechanism Using Clustering Algorithms for Distributed Storage Systems. To appear in 15th IEEE Annual Conference on Privacy, Security and Trust (PST), Calgary, Canada, 2017.

  7. Abd M. A., Gonzalez I., Nojoumian M. and Engeberg E. D.
    Impacts of Robot Assistant Performance on Human Trust, Satisfaction, and Frustration. Robotics, Science and Systems: Morality and Social Trust in Autonomous Robots Workshop (RSS), 4 pages, Boston, USA, 2017.

  8. Nojoumian M., Golchubian A., Saputro N. and Akkaya K.
    Preventing Collusion Between SDN Defenders and Attackers Using a Game Theoretical Approach. IEEE INFOCOM: Advances in Software Defined & Context Aware Cognitive Radio Networks (SCAN), pp. 802-807, Atlanta, USA, 2017.

  9. Abd M. A., Gonzalez I., Nojoumian M. and Engeberg E. D.
    Trust, Satisfaction and Frustration Measurements for Real-Time Human-Robot Interaction. 30th Florida Conference on Recent Advances in Robotics (FCRAR), pp. 89-93, Boca Raton, USA, 2017.

  10. Nojoumian M.
    Unconditionally Secure Proactive Verifiable Secret Sharing Using New Detection and Recovery Techniques. 14th IEEE Annual Conference on Privacy, Security and Trust (PST), pp. 269-274, Auckland, New Zealand, 2016.

  11. Nojoumian M. and Stinson D. R.
    Dealer-Free Threshold Changeability in Secret Sharing Schemes. 9th International Conference on Information Theoretic Security (ICITS), Tacoma, USA, August 10, 2016.

  12. Nojoumian M. and Stinson D. R.
    From Rational Secret Sharing to Social and Socio-Rational Secret Sharing. 5th World Congress of the Game Theory Society (GAMES), Maastricht, The Netherlands, July 24, 2016.

  13. Krishnamachari S., Nojoumian M., and Akkaya K.
    Implementation and Analysis of Dutch-Style Sealed-Bid Auctions: Computational vs Unconditional Security. 1st International Conference on Information Systems Security and Privacy (ICISSP), pp. 106-113, Angers, France, 2015.

  14. Nojoumian M.
    Trust, Influence and Reputation Management Based on Human Reasoning. 4th AAAI Workshop on Incentives and Trust in E-Communities (WIT-EC), pp. 21-24, Austin, USA, 2015.

  15. Nojoumian M.
    Generalization of Socio-Rational Secret Sharing with a New Utility Function. 12th IEEE Annual Conference on Privacy, Security and Trust (PST), pp. 338-341, Toronto, Canada, 2014.

  16. Nojoumian M. and Stinson D. R.
    Efficient Sealed-Bid Auction Protocols Using Verifiable Secret Sharing. 10th International Conference on Information Security Practice and Experience (ISPEC), Springer LNCS 8434, pp. 302-317, Fuzhou, China, 2014.
    Acceptance Rate: 36/158: 23%

  17. Nojoumian M. and Stinson D. R.
    Socio-Rational Secret Sharing as a New Direction in Rational Cryptography. 3rd Conference on Decision and Game Theory for Security (GameSec), Springer LNCS 7638, pp. 18-37, Budapest, Hungary, 2012.
    Acceptance Rate: 10/37: 27%

  18. Nojoumian M. and Stinson D. R.
    Social Secret Sharing in Cloud Computing Using a New Trust Function. 10th IEEE Annual Conference on Privacy, Security and Trust (PST), pp. 161-167, Paris, France, 2012.

  19. Nojoumian M. and Stinson D. R.
    Unconditionally Secure First-Price Auction Protocols Using a Multicomponent Commitment Scheme. 12th International Conference on Information and Communications Security (ICICS), Springer LNCS 6476, pp. 266-280, Barcelona, Spain, 2010.
    Acceptance Rate: 31/135: 23%

  20. Nojoumian M. and Stinson D. R.
    Brief Announcement: Secret Sharing Based on the Social Behaviors of Players. 29th ACM Symposium on Principles of Distributed Computing (PODC), pp. 239-240, Zurich, Switzerland, 2010.

  21. Nojoumian M. and Nair D. K.
    Comparing Genetic Algorithm and Guided Local Search Methods by Symmetric TSP Instances. 10th ACM Genetic and Evolutionary Computation Conference (GECCO), pp. 1131-1132, Atlanta, USA, 2008.

  22. Nojoumian M. and Lethbridge T. C.
    Extracting Document Structure to Facilitate a Knowledge Base Creation for the UML Superstructure Specification. 4th IEEE International Conference on Info Technology: New Generations (ITNG), pp. 393-400, Las Vegas, USA, 2007.

  23. Nojoumian M. and Lethbridge T. C.
    A New Approach for the Trust Calculation in Social Networks. 3rd International Conference on E-Business (ICE-B): Part of ICETE, pp. 257-264, Setubal, Portugal, 2006.
    Acceptance Rate: 98/326: 30% also Selected as a Best Paper

  24. Nojoumian M. and Tran T.
    Computational Politics and Economy for the Establishment of an Integrated Intelligent Government. 19th IEEE Canadian Conference on Electrical and Computer Engineering (CCECE), pp. 332-336, Ottawa, Canada, 2006.

PhD & MSc Theses