Negar Kiyavash
Negar Kiyavash

Administrative Titles

  • Donald Biggar Willett Scholar
Adjunct Associate Professor

For More Information

Education

  • Ph.D., Electrical and Computer Engineering, University of Illinois at Urbana-Champaign, USA 2006.
  • M.S., Electrical and Computer Engineering, University of Illinois at Urbana-Champaign, USA 2003.
  • B.S., Electrical Engineering, Sharif University of Technology, Iran 1999.

Research Interests

  • Statistical Signal Processing with Applications to Network Inference and Security.

Research Areas

  • Coding theory and applications
  • Information theory
  • Machine learning and pattern recognition
  • Watermarking and information forensics

Selected Articles in Journals

  • S. Kadloor, N. Kiyavash, and P. Venkitasubramaniam, “Mitigating Timing based Information Leakage in Shared Schedulers,” IEEE/ACM Transactions on Networking, pp. 1562 -1573, Vol. 24, Issue 3, 2016.
  • S. Kim, C. Quinn, N. Kiyavash, and T. Coleman, “Dynamic and Succinct Statistical Analysis of Neuroscience Data,” Proceedings of the IEEE, pp. 683-698, Vol. 102, No. 5, 2014.
  • A. A. Kulkarni, N. Kiyavash, and R. Sreenivas, “On the Varshamov-Tenengolts Construction on Binary Strings,” to appear in SIAM Journal on Discrete Mathematics (SIDMA), pp. 7990, Vol. 317, 2014.
  • D. Cullina and N. Kiyavash, “An Improvement to Levenshteins Upper Bound on the Cardinality of Deletion Correcting Codes,” IEEE Transactions on Information Theory, pp. 3862-3870, Vol. 60, No. 7, 2014.
  • X. Gong, M. Rodrigues, and N. Kiyavash, “Invisible Flow Watermarks for Channels with Dependent Substitution, Deletion, and Bursty Insertion Errors,” IEEE Transactions on Information Forensics and Security, pp. 1850-1859, Vol. 8, No. 11, 2013.
  • A. Houmansadr, N. Kiyavash, and N. Borisov, “Non-blindWatermarking of Network Flows,” IEEE/ACM Transactions on Networking, pp. 1232-1244, Vol. 22, No. 4, 2013.
  • C. Quinn, T. Coleman, and N. Kiyavash, "Efficient Methods to Compute Optimal Tree Approximations of Directed Information Graphs, IEEE Transactions on Signal Processing, pp. 3173-3182, Vol. 61, No. 12, 2013.
  • S. Kadloor, P. Venkitasubramaniam, N. Kiyavash, and A. Mishra, “A Statistical Inference Perspective on Preventing Timing Analysis in Networks,” IEEE Signal Processing Magazine, special issue on “Signal Processing for Cyber-security and Privacy,” pp. 76 - 85,Vol. 30, No. 5, 2013.
  • A. A. Kulkarni and N. Kiyavash, “Non-asymptotic Upper Bounds for Single-Deletion Correcting Codes,” IEEE Transactions on Information Theory, pp. 5115-5130, Vol. 59, No. 8, 2013.
  • N. Kiyavash, F. Koushanfar, T. Coleman, and M. Rodrigues, "A Timing Channel Spyware for the CSMA/CA Protocol," IEEE Transactions on Information Forensics and Security,  pp. 477-487, Vol. 8, No. 3, 2013.
  • D. Mixon, C. Quinn, N. Kiyavash, and M. Fickus, "Equiangular Tight Frame Fingerprinting Codes," IEEE Transactions on Information Theory,  pp. 1855-1865, Vol. 59, No. 3, 2013.
  • S. Kadloor, X. Gong, N. Kiyavash, and P. Venkitasubramaniam, "Designing Router Scheduling Policies: A Privacy Perspective," IEEE Transactions on Signal Processing, pages 2001-2012, Vol. 60, No. 4, 2012.
  • S. K. Gorantla, S. Kadloor, N. Kiyavash, T.P. Coleman, I. Moskowitz, and M. Kang, "Characterizing the Efficacy of the NRL Network Pump in Mitigating Covert Timing Channels," IEEE Transactions on Information Forensics and Security, pages 64-75, Vol. 7, No. 1, 2011.
  • C. Quinn, T. Coleman, N. Kiyavash, and N. Hatsopoulos, "Estimating the Directed Information to Infer Causal Relationships in Ensemble Neural Spike Train Recordings," Journal of Computational Neuroscience, pages. 1- 28, 2010.
  • D. Uhlig, N. Kiyavash, and N. Neogi, "Fault Tolerant Triangulation in Distributed Aircraft Networks with Automatic Dependent Surveillance Broadcast (ADS-B)," International Journal of Systems, Control and Communications (IJSCC) Special Issue on: "Information Processing and Decision Making in Distributed Control Systems," pages 298-324, Vol. 2, No. 1, 2010.
  • N. Kiyavash, P. Moulin, and T. Kalker, "Regular Simplex Fingerprints and Their Optimality Proper-ties," IEEE Transactions on Information Forensics and Security, pages 318-329, Vol. 4, No. 3, 2009.
  • N. Kiyavash, P. Moulin, "Performance of Orthogonal Fingerprinting Codes under Worst-case Noise," IEEE Transactions on Information Forensics and Security, pages 293-301, Vol. 4, No. 3, 2009.
  • I. Duursma, N. Kiyavash, "The Vector Decomposition Problem for Elliptic and Hyperelliptic Curves," Journal of the Ramanujan Mathematical Society, pages 59-76, Vol. 20, No. 1, 2005.

Articles in Conference Proceedings

  • D. Cullina and N. Kiyavash, “Generalized sphere-packing upper bounds on the size of codes for combinatorial channels,” in Proceedings of the IEEE International Symposium on Information Theory (ISIT), 2014.
  • A. Truong and N. Kiyavash, “Optimal Adversarial Strategies in Learning with Expert Advice,” in Proceedings of the IEEE Conference on Decision and Control (CDC), 2014.
  • J. Etesami and N. Kiyavash, “Directed Information Graphs: a Generalization of Linear Dynamical Graphs,” in Proceedings of the American Control Conference (ACC), 2014.
  • J. Etesami and N. Kiyavash, “A Novel Collusion Attack on Finite Alphabet Digital Fingerprinting Systems,” in Proceedings of the IEEE International Symposium on Information Theory (ISIT), 2014.
  • D. Cullina and N. Kiyavash, “An Improvement to Levenshteins Upper Bound on the Cardinality of Deletion Correcting Codes,” in Proceedings of the IEEE International Symposium on Information Theory (ISIT), 2013.
  • C. Quinn, A. Pinar, and N. Kiyavash, “Optimal Bounded-Degree Approximations of Joint Distributions of Networks of Stochastic Processes,” in IEEE International Symposium on Information Theory (ISIT), 2013.
  • C. Quinn, J. Etesami, N. Kiyavash, and T. Coleman, “Robust Directed Tree Approximations for Networks of Stochastic Processes,” in IEEE International Symposium on Information Theory (ISIT), 2013.
  • X. Gong, N. Kiyavash, "Timing side channels for traffic analysis," in IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), Vancouver, Canada, May 2013.
  • S. Kadloor, N. Kiyavash, "Delay Optimal Policies Offer Very Little Privacy," in International Conference on Computer Communications (INFOCOM), Turin, Italy, April 2013. (Acceptance rate: 17%)
  • D. Cullina, A. Kulkarni, and N. Kiyavash, "A Coloring Approach to Constructing Deletion Correcting Codes from Constant Weight Subgraphs," in IEEE International Symposium on Information Theory (ISIT), Boston, July 2012.
  • J. Etesami, N. Kiyavash, and T. Coleman, "Learning Minimal Latent Directed Information Trees," in IEEE International Symposium on Information Theory (ISIT), Boston, July 2012.
  • X. Gong, N. Borisov, N. Kiyavash, and N. Schear, "Website Detection Using Remote Traffic Analysis," in Privacy Enhancing Technologies Symposium (PETS), Vigo, Spain, July 2012.
  • X.Gong, M. Rodrigues, and N. Kiyavash, "Invisible Flow Watermarks for Channels with Dependent Substitution and Deletion Errors," in IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), Kyoto, Japan, March 2012.
  • S. Kadloor, N. Kiyavash, and P. Venkitasubramaniam, "Mitigating Timing Based Information Leakage in Shared Schedulers," in INFOCOM, Orlando, Florida, March 2012. (Acceptance rate: 17%)
  • A. Truong, N. Kiyavash, and V. Borkar, "Convergence Analysis for an Online Recommendation System," in IEEE Conference on Decision and Control (CDC), pages 3889-3894, Orlando, Florida, December 2011.
  • C. Quinn, N. Kiyavash, and Todd P. Coleman, "A Minimal Approach to Causal Inference on Topologies with Bounded Indegree," in IEEE Conference on Decision and Control (CDC), pages 168-173, Orlando, Florida, December 2011.
  • X. Gong, N. Kiyavash, and P. Venkitasubramaniam, "Information Theoretic Analysis of Side Channel Information Leakage in FCFS Schedulers," in IEEE International Symposium on Information Theory (ISIT), St. Petersburg, Russia, August 2011.
  • C. Quinn, N. Kiyavash, and T. Coleman, "Equivalence between Minimal Generative Model Graphs and Directed Information Graphs," in IEEE International Symposium on Information Theory (ISIT), St. Petersburg, Russia, August 2011.
  • D. Mixon, C. Quinn, N. Kiyavash, and M. Fickus, "Equiangular Tight Frame Fingerprinting Codes," in IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), Prague, Czech Republic, May 2011.
  • S. Kadloor, X.Gong, N. Kiyavash, and Parv Venkitasubramaniam, "Designing Privacy Preserving Router Scheduling Policies," in Conference on Information Sciences and Systems (CISS), Baltimore, Maryland, March 2011.
  • S. K. Gorantla, S. Kadloor, T. P. Coleman, N. Kiyavash, I. Moskowitz, and M. Kang, "Information Theoretic Limits of Covert Communication Over the Network Pump," in IEEE International Symposium on Information Theory and its Applications (ISITA), Taichung, Taiwan, October 2010.
  • C. Quinn, N. Kiyavash, and T. Coleman, "Approximating Discrete Probability Distributions with Causal Dependence Trees," in IEEE International Symposium on Information Theory and its Applications (ISITA), Taichung, Taiwan, October 2010.
  • S. Kadloor, X. Gong, N. Kiyavash, T. Tezcan, and N. Borisov, "A Low-Cost Side Channel Traffic Analysis Attack in Packet Networks," in IEEE International Conference on Communications (ICC), Cape Town, South Africa, May 2010.
  • N. Kiyavash, T. P. Coleman, and Mavis Rodrigues, "Novel Shaping and Complexity-Reduction Techniques for Approaching Capacity over Queuing Timing Channels," in IEEE International Conference on Communications (ICC), Dresden, Germany, June 2009.
  • N. Kiyavash, T. P. Coleman, "Covert Timing Channel Codes for Communication over Interactive Traffic," in Proceedings of IEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP), Taipei, Taiwan, April 2009.
  • Amir Houmansadr, N. Kiyavash, and Nikita Borisov, "Multi-Flow Attack Resistant Watermarks for Network Flows," in Proceedings of IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), Taipei, Taiwan, April 2009.
  • Amir Houmansadr, N. Kiyavash, and Nikita Borisov, "RAINBOW: A Robust And Invisible Non-Blind Watermark for Network Flows," in Network & Distributed System Security Symposium (NDSS), San Diego, California, February 2009. (Acceptance rate: 11%)
  • D. Uhlig, N. Kiyavash, and N. Neogi, "Real-Time Triangulation Based on Measurements from Mobile ADSB Aircraft," in Euromicro Conference on Real-Time Systems (ECRTS), Prague, Czech Republic, July 2008.
  • N. Kiyavash, A. Houmansadr, and N. Borisov, "Multi-flow Attacks against Network Flow Watermarking Schemes," in USENIX Security Symposium 2008, San Jose, California, July 2008. (Acceptance rate: 14%)
  • T. P. Coleman, N. Kiyavash, and V. Subramanian, "The Rate-Distortion Function of a Poisson Process with a Queuing Distortion Measure," in IEEE Data Compression Conference (DCC), Snowbird, Utah, March 2008.
  • T. P. Coleman, N. Kiyavash, "Sparse Graph Codes and Practical Decoding Algorithms for Communicating over Packet Timings in Networks," in Conference on Information Sciences and Systems (CISS), Princeton, New Jersey, March 2008.
  • N. Kiyavash, F. Koushanfar, "Anti-Collusion Position Estimation in Wireless Sensor Networks," in Proceedings of the IEEE Mobile Ad-hoc and Sensor Systems (MASS), Pisa, Italy, October 2007.
  • P. Moulin, N. Kiyavash, "Expurgated Gaussian Fingerprinting Codes," in Proceedings of IEEE International Symposium on Information Theory (ISIT), Nice, France, June 2007.
  • P. Moulin, N. Kiyavash, "Performance of Random Fingerprinting Codes under Arbitrary Nonlinear Attacks," in Proceedings of IEEE Conference on Acoustics, Speech and Signal Processing (ICASSP), pages II-157-II-160, Honolulu, Hawaii, April 2007.
  • N. Kiyavash, P. Moulin, "Sphere Packing Lower Bound on Fingerprinting Error Probability," in Proceedings of SPIE Symposium on Electronic Imaging, San Jose, California, January 2007.
  • F. Koushanfar, N. Kiyavash, and M. Potkonjak, "Interacting Particle-Based Model for Missing Data in Sensor Networks: Foundations and Applications," pages 888-891, in Proceedings of IEEE Sensors, October 2006.
  • N. Kiyavash, R. Blahut, "On Capacity of a Constrained Two-Dimensional Channel in Presence of Violations," in Proceedings of IEEE International Symposium on Information Theory (ISIT), pages 2423-2427, Seattle, Washington, July 2006.
  • N. Kiyavash, P. Moulin, "On Optimal Collusion Strategies for Fingerprinting," in Proceedings of IEEE Conference on Acoustics, Speech and Signal Processing (ICASSP), Toulouse, France, May 2006.
  • N. Kiyavash, P. Moulin, "A Framework for Optimizing Nonlinear Collusion Attacks On Fingerprinting Systems," in Proceeding of Conference on Information Sciences and Systems (CISS), Princeton, New Jersey, March 2006.
  • P. Vontobel, R. Smarandache, N. Kiyavash, J. Teutsch, and D. Vukobratovic, "On Minimal Pseudo-codewords of Codes from Finite Geometries," in Proceedings of IEEE International Symposium on Information Theory (ISIT), pages 980-984, Adelaide, Australia, September 2005.
  • N. Kiyavash, I. Duursma, "On the Vector Decomposition Problem for m-torsion Points in an Elliptic," in Proceedings of IEEE International Symposium on Information Theory (ISIT), page 548, Chicago, June 2004.

Honors

  • Distinguished Alumni Award, 50th Anniversary of Sharif University of Technology (2016)
  • Center for Advance Study Associate (2016-2017)
  • Humboldt Research Fellowship for Experienced Researchers (2015)
  • Willett Faculty Scholar, College of Engineering (2014)
  • Deans Awards for Excellence in Research, College of Engineering (2014)
  • NSF Career Award (2011)
  • AFOSR YIP (2010)

Teaching Honors

  • List of Teachers Ranked as Excellent at UIUC, Spring 2017
  • List of Teachers Ranked as Excellent at UIUC, Spring 2014

Research Honors

  • Best Student Paper Award (ICASSP 2006).

Recent Courses Taught

  • ECE 490 (CSE 441) - Introduction to Optimization