Invited Talk

Ongoing Manuscript
Issued Patent

  1. Nojoumian M.
    Adaptive Mood Control in Semi or Fully Autonomous Vehicles, United States Patent and Trademark Office (USPTO), Patent No. US 10,981,563 B2, April 20, 2021.
    CBS12 News, FAU News, and citation in InfoWorld.
Refereed Journals

  1. Golchubian A., Marques O. and Nojoumian M.
    Photo Quality Classification Using Deep Learning. Multimedia Tools and Applications (MTAP), Springer, vol 80, pp. 22193-22208, 2021.

  2. Alvarez R. and Nojoumian M.
    Comprehensive Survey on Privacy-Preserving Protocols for Sealed-Bid Auctions. Computers and Security (C&S), Elsevier, vol 88, pp. 101502-101515, 2020.

  3. Abd M. A., Gonzalez I., Ades C., Nojoumian M. and Engeberg E. D.
    Simulated Robotic Device Malfunctions Resembling Malicious Cyberattacks Impact Human Perception of Trust, Satisfaction, and Frustration. International Journal of Advanced Robotic Systems (IJARS), SAGE, vol 16, issue 5, pp. 1-16, 2019.

  4. Cordero C. G., Traverso G., Nojoumian M., Habib S. M., Buchmann J., Muhlhauser M. and Vasilomanolakis E.
    Sphinx: a Colluder-Resistant Trust Mechanism for Collaborative Intrusion Detection. IEEE Access (Access), vol. 6, pp. 72427-72438, 2018.

  5. Tonyali S., Akkaya K., Saputro N., Uluagac A. S. and Nojoumian M.
    Privacy-Preserving Protocols for Secure and Reliable Data Aggregation in IoT-Enabled Smart Metering Systems. Future Generation Computer Systems (FGCS), Elsevier, vol. 78, part 2, pp. 547-557, 2018.

  6. Subramanian S., Mozaffari Kermani M., Azarderakhsh R. and Nojoumian M.
    Reliable Hardware Architectures for Cryptographic Block Ciphers LED and HIGHT. IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems (TCAD), vol 36, issue 10, pp. 1750-1758, 2017.

  7. Eslami Z., Pakniat N. and Nojoumian M.
    Ideal Social Secret Sharing Using Birkhoff Interpolation Method. Security and Communication Networks (SCN), John Wiley & Sons, Ltd, vol. 9, issue 18, PP. 4973-4982, 2016.

  8. Nojoumian M. and Stinson D. R.
    Sequential Secret Sharing as a New Hierarchical Access Structure. Journal of Internet Services and Info Security (JISIS), Next Gen Networks and Systems Security, vol. 5, issue 2, pp. 24-32, 2015.

  9. Nojoumian M. and Stinson D. R.
    On Dealer-free Dynamic Threshold Schemes. Advances in Mathematics of Communications (AMC), American Institute of Math Sciences, vol. 7, no. 1, pp. 39-56, 2013.

  10. Nojoumian M. and Lethbridge T. C.
    Reengineering PDF-Based Documents Targeting Complex Software Specifications. International Journal of Knowledge and Web Intelligence (IJKWI), Inderscience, vol. 2, no. 4, pp. 292-319, 2011.

  11. Nojoumian M., Stinson D. R., and Grainger M.
    Unconditionally Secure Social Secret Sharing Scheme. IET Information Security (IFS), Multi-Agent and Distributed Information Security, vol. 4, issue 4, pp. 202-211, 2010.

Refereed Conferences

  1. Zamir L., Shaan A. and Nojoumian M.
    ISRaft Consensus Algorithm for Autonomous Units. 3rd IEEE International Workshop on Blockchain and Mobile Applications (BlockApp), 6 pages, Dallas, USA, 2021.

  2. Pourtahmasbi P. and Nojoumian M.
    Impacts of Trust Measurements on the Reputation-Based Mining Paradigm. 3rd Conference on Blockchain Research & Applications for Innovative Networks and Services (BRAINS), 4 pages, Paris, France, 2021.

  3. Zamir L. and Nojoumian M.
    Information Sharing in the Presence of Adversarial Nodes Using Raft. Future Technologies Conference (FTC), 14 pages, Vancouver, Canada, 2021.

  4. Craig J. and Nojoumian M.
    Should Self-Driving Cars Mimic Human Driving Behaviors? 3rd International Conference on HCI in Mobility, Transport and Automotive Systems (MobiTAS), Springer LNCS 12791, pp. 213-225, Washington DC, USA, 2021.
    Received the Best Paper Award Link, FAU News

  5. Alvarez R. and Nojoumian M.
    Efficient Implementation and Computational Analysis of Privacy-Preserving Auction Protocols. Future of Information and Communication Conference (FICC), Springer AISC 1129, pp. 655-671, San Francisco, USA, 2020.
    Received the Best Paper Award Link

  6. Raeini M. G. and Nojoumian M.
    Secure Trust Evaluation Using Multipath and Referral Chain Methods. 15th International Workshop on Security and Trust Management (STM), Springer LNCS 11738, pp. 124-139, Luxembourg, 2019.

  7. Raeini M. G. and Nojoumian M.
    Privacy-Preserving Big Data Analytics: From Theory to Practice. International Conference on Security, Privacy and Anonymity in Computation, Communication and Storage (SpaCCS), Springer LNCS 11637, pp. 45-59, Atlanta, USA, 2019.

  8. Shahrdar S., Park C. and Nojoumian M.
    Human Trust Measurement Using an Immersive Virtual Reality Autonomous Vehicle Simulator. 2nd AAAI/ACM Conference on AI, Ethics, and Society (AIES), pp. 515-520, Honolulu, USA, 2019. Acceptance Rate: 34/220: 15%

  9. Nojoumian M.
    Rational Trust Modeling. 9th Conference on Decision and Game Theory for Security (GameSec), Springer LNCS 11199, pp. 418-431, Seattle, USA, 2018.

  10. Park C., Shahrdar S., Nojoumian M.
    EEG-Based Classification of Emotional State Using an Autonomous Vehicle Simulator. 10th IEEE Sensor Array and Multichannel Signal Processing Workshop (SAM), pp. 297-300, Sheffield, UK, 2018.
    Featured by the IEEE Xplore Innovation Spotlight Link, FAU News

  11. Nojoumian M., Golchubian A., Njilla L., Kwiat K. and Kamhoua C.
    Incentivizing Blockchain Miners to Avoid Dishonest Mining Strategies By a Reputation-Based Paradigm. Computing Conference (CC), Springer AISC 857, pp. 1118-1134, London, UK, 2018.
    The 2nd version with proofs appears as a chapter in Blockchain and Distributed Systems Security, Wiley-IEEE Computer Society, 1st ed, ISBN-13: 978-1119519607, Chapter 11, pp. 233-251, 2019.

  12. Shahrdar S., Menezes L. and Nojoumian M.
    A Survey on Trust in Autonomous Systems. Computing Conference (CC), Springer AISC 857, pp. 368-386, London, UK, 2018.

  13. Ades C., Gonzalez I., AlSaidi M., Nojoumian M., Bai O., Aravelli A., Lagos L. and Engeberg E.
    Robotic Finger Force Sensor Fabrication and Evaluation Through a Glove. 31th Florida Conference on Recent Advances in Robotics (FCRAR), pp. 60-65, Orlando, USA, 2018.
    Received the Best Paper Award Link

  14. Raeini M. G. and Nojoumian M.
    Secure Error Correction Using Multiparty Computation. 8th IEEE Annual Computing and Communication Workshop and Conference (CCWC), pp. 468-473, Las Vegas, US, 2018.

  15. Traverso G., Garcia C., Nojoumian M., Azarderakhsh R., Demirel D., Habib S.M. and Buchmann J.
    Evidence-Based Trust Mechanism Using Clustering Algorithms for Distributed Storage Systems. 15th IEEE Annual Conference on Privacy, Security and Trust (PST), pp. 277-282, Calgary, Canada, 2017.

  16. Abd M. A., Gonzalez I., Nojoumian M. and Engeberg E. D.
    Impacts of Robot Assistant Performance on Human Trust, Satisfaction, and Frustration. Robotics, Science and Systems: Morality and Social Trust in Autonomous Robots Workshop (RSS), 4 pages, Boston, USA, 2017.

  17. Nojoumian M., Golchubian A., Saputro N. and Akkaya K.
    Preventing Collusion Between SDN Defenders and Attackers Using a Game Theoretical Approach. IEEE INFOCOM: Advances in Software Defined & Context Aware Cognitive Radio Networks (SCAN), pp. 802-807, Atlanta, USA, 2017.

  18. Abd M. A., Gonzalez I., Nojoumian M. and Engeberg E. D.
    Trust, Satisfaction and Frustration Measurements for Real-Time Human-Robot Interaction. 30th Florida Conference on Recent Advances in Robotics (FCRAR), pp. 89-93, Boca Raton, USA, 2017.

  19. Nojoumian M.
    Unconditionally Secure Proactive Verifiable Secret Sharing Using New Detection and Recovery Techniques. 14th IEEE Annual Conference on Privacy, Security and Trust (PST), pp. 269-274, Auckland, New Zealand, 2016.

  20. Krishnamachari S., Nojoumian M., and Akkaya K.
    Implementation and Analysis of Dutch-Style Sealed-Bid Auctions: Computational vs Unconditional Security. 1st International Conference on Information Systems Security and Privacy (ICISSP), pp. 106-113, Angers, France, 2015.

  21. Nojoumian M.
    Trust, Influence and Reputation Management Based on Human Reasoning. 4th AAAI Workshop on Incentives and Trust in E-Communities (WIT-EC), pp. 21-24, Austin, USA, 2015.

  22. Nojoumian M.
    Generalization of Socio-Rational Secret Sharing with a New Utility Function. 12th IEEE Annual Conference on Privacy, Security and Trust (PST), pp. 338-341, Toronto, Canada, 2014.

  23. Nojoumian M. and Stinson D. R.
    Efficient Sealed-Bid Auction Protocols Using Verifiable Secret Sharing. 10th International Conference on Information Security Practice and Experience (ISPEC), Springer LNCS 8434, pp. 302-317, Fuzhou, China, 2014. Acceptance Rate: 36/158: 23%

  24. Nojoumian M. and Stinson D. R.
    Socio-Rational Secret Sharing as a New Direction in Rational Cryptography. 3rd Conference on Decision and Game Theory for Security (GameSec), Springer LNCS 7638, pp. 18-37, Budapest, Hungary, 2012. Acceptance Rate: 10/37: 27%

  25. Nojoumian M. and Stinson D. R.
    Social Secret Sharing in Cloud Computing Using a New Trust Function. 10th IEEE Annual Conference on Privacy, Security and Trust (PST), pp. 161-167, Paris, France, 2012.

  26. Nojoumian M. and Stinson D. R.
    Unconditionally Secure First-Price Auction Protocols Using a Multicomponent Commitment Scheme. 12th International Conference on Information and Communications Security (ICICS), Springer LNCS 6476, pp. 266-280, Barcelona, Spain, 2010. Acceptance Rate: 31/135: 23%

  27. Nojoumian M. and Stinson D. R.
    Brief Announcement: Secret Sharing Based on the Social Behaviors of Players. 29th ACM Symposium on Principles of Distributed Computing (PODC), pp. 239-240, Zurich, Switzerland, 2010.

  28. Nojoumian M. and Nair D. K.
    Comparing Genetic Algorithm and Guided Local Search Methods by Symmetric TSP Instances. 10th ACM Genetic and Evolutionary Computation Conference (GECCO), pp. 1131-1132, Atlanta, USA, 2008.

  29. Nojoumian M. and Lethbridge T. C.
    Extracting Document Structure to Facilitate a Knowledge Base Creation for the UML Superstructure Specification. 4th IEEE International Conference on Info Technology: New Generations (ITNG), pp. 393-400, Las Vegas, USA, 2007.

  30. Nojoumian M. and Lethbridge T. C.
    A New Approach for the Trust Calculation in Social Networks. 3rd International Conference on E-Business (ICE-B): Part of ICETE, Springer CCIS vol. 9, pp. 257-264, Setubal, Portugal, 2006.
    Selected as a Best Paper Link
    The 2nd version appears as a chapter in E-Business and Telecommunication Networks (E-BTN), Springer CCIS, vol. 9, pp. 64-77, 2008. Acceptance Rate: 29/326: 9%

  31. Nojoumian M. and Tran T.
    Computational Politics and Economy for the Establishment of an Integrated Intelligent Government. 19th IEEE Canadian Conference on Electrical and Computer Engineering (CCECE), pp. 332-336, Ottawa, Canada, 2006.

Refereed Presentations

  1. Nojoumian M.
    Privacy-Preserving Planning and Coordination Among Autonomous Systems Equipped with Resource-Constrained Devices. International Cryptographic Module Conference (ICMC), Vancouver, Canada, Presentation on May 17, 2019.

  2. Nojoumian M.
    Game Theoretical Analysis of a Reputation-Based Cryptocurrency Mining Paradigm. 18th International Symposium on Dynamic Games and Applications (ISDG), Grenoble, France, Presentation on July 10, 2018.

  3. Nojoumian M.
    Dealer-Free Threshold Changeability in Secret Sharing Schemes. 9th International Conference on Information Theoretic Security (ICITS), Tacoma, USA, Presentation on August 10, 2016.

  4. Nojoumian M.
    From Rational Secret Sharing to Social and Socio-Rational Secret Sharing. 5th World Congress of the Game Theory Society (GAMES), Maastricht, The Netherlands, Presentation on July 24, 2016.

PhD and MSc Theses