default search action
Ehsan Nekouei
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j21]Yongxia Shi, Ehsan Nekouei:
Quantization and Event-Triggered Policy Design for Encrypted Networked Control. IEEE CAA J. Autom. Sinica 11(4): 946-955 (2024) - [j20]Alexander Johansson, Ehsan Nekouei, Xiaotong Sun, Karl Henrik Johansson, Jonas Mårtensson:
Hub-Based Platoon Formation: Optimal Release Policies and Approximate Solutions. IEEE Trans. Intell. Transp. Syst. 25(6): 5755-5766 (2024) - [i15]Mohammadreza Doostmohammadian, Alireza Aghasi, Mohammad Pirani, Ehsan Nekouei, Houman Zarrabi, Reza Keypour, Apostolos I. Rikos, Karl Henrik Johansson:
Survey of Distributed Algorithms for Resource Allocation over Multi-Agent Systems. CoRR abs/2401.15607 (2024) - [i14]Chuanghong Weng, Ehsan Nekouei:
A Stochastic Sampling Approach to Privacy. CoRR abs/2405.11975 (2024) - 2023
- [j19]Yongxia Shi, Ehsan Nekouei, Qinglei Hu:
Secure motion control of micro-spacecraft using semi-homomorphic encryption. Secur. Saf. 2: 2023018 (2023) - [j18]Ehsan Nekouei, Henrik Sandberg, Mikael Skoglund, Karl Henrik Johansson:
A Model Randomization Approach to Statistical Parameter Privacy. IEEE Trans. Autom. Control. 68(2): 839-850 (2023) - [c18]Yihao Liu, Patrick Hung, Ehsan Nekouei, Ray C. C. Cheung:
Homomorphic Encryption-Based System Design for Secure Data Processing. ICSPCC 2023: 1-6 - [i13]Yuzhe Wu, Ehsan Nekouei:
Memory-based Controllers for Efficient Data-driven Control of Soft Robots. CoRR abs/2309.10273 (2023) - [i12]Chuanghong Weng, Ehsan Nekouei, Karl Henrik Johansson:
Optimal Privacy-Aware Dynamic Estimation. CoRR abs/2311.05896 (2023) - [i11]Alexander Johansson, Ehsan Nekouei, Xiaotong Sun, Karl Henrik Johansson, Jonas Mårtensson:
Hub-Based Platoon Formation: Optimal Release Policies and Approximate Solutions. CoRR abs/2311.06604 (2023) - [i10]Zhenan Feng, Ehsan Nekouei:
A Privacy-Preserving Framework for Cloud-Based HVAC Control. CoRR abs/2312.05183 (2023) - 2022
- [j17]Ehsan Nekouei, Henrik Sandberg, Mikael Skoglund, Karl Henrik Johansson:
Optimal Privacy-Aware Estimation. IEEE Trans. Autom. Control. 67(5): 2253-2266 (2022) - [j16]Mohammad Pirani, Ehsan Nekouei, Henrik Sandberg, Karl Henrik Johansson:
A Game-Theoretic Framework for Security-Aware Sensor Placement Problem in Networked Control Systems. IEEE Trans. Autom. Control. 67(7): 3699-3706 (2022) - [j15]Ehsan Nekouei, Mohammad Pirani, Henrik Sandberg, Karl Henrik Johansson:
A Randomized Filtering Strategy Against Inference Attacks on Active Steering Control Systems. IEEE Trans. Inf. Forensics Secur. 17: 16-27 (2022) - [j14]Alexander Johansson, Ehsan Nekouei, Karl Henrik Johansson, Jonas Mårtensson:
Strategic Hub-Based Platoon Coordination Under Uncertain Travel Times. IEEE Trans. Intell. Transp. Syst. 23(7): 8277-8287 (2022) - [c17]Mohammadreza Doostmohammadian, Alireza Aghasi, Mohammad Pirani, Ehsan Nekouei, Usman A. Khan, Themistoklis Charalambous:
Fast-Convergent Anytime-Feasible Dynamics for Distributed Allocation of Resources Over Switching Sparse Networks with Quantized Communication Links. ECC 2022: 84-89 - [i9]Alexander Johansson, Ehsan Nekouei, Karl Henrik Johansson, Jonas Mårtensson:
Multi-Fleet Platoon Matching: A Game-Theoretic Approach. CoRR abs/2202.08748 (2022) - [i8]Alexander Johansson, Valerio Turri, Ehsan Nekouei, Karl Henrik Johansson, Jonas Mårtensson:
Truck Platoon Formation at Hubs: An Optimal Release Time Rule. CoRR abs/2202.09119 (2022) - 2021
- [j13]Takashi Tanaka, Ehsan Nekouei, Ali Reza Pedram, Karl Henrik Johansson:
Linearly Solvable Mean-Field Traffic Routing Games. IEEE Trans. Autom. Control. 66(2): 880-887 (2021) - [j12]Mohammad Pirani, Ehsan Nekouei, Henrik Sandberg, Karl Henrik Johansson:
A Graph-Theoretic Equilibrium Analysis of Attacker-Defender Game on Consensus Dynamics Under $\mathcal {H}_2$ Performance Metric. IEEE Trans. Netw. Sci. Eng. 8(3): 1991-2000 (2021) - [i7]Alexander Johansson, Ehsan Nekouei, Karl Henrik Johansson, Jonas Mårtensson:
Strategic Hub-Based Platoon Coordination under Uncertain Travel Times. CoRR abs/2104.00255 (2021) - [i6]Ehsan Nekouei, Henrik Sandberg, Mikael Skoglund, Karl Henrik Johansson:
A Model Randomization Approach to Statistical Parameter Privacy. CoRR abs/2105.10664 (2021) - 2020
- [j11]Ehsan Nekouei, Girish N. Nair, Tansu Alpcan, Robin J. Evans:
Sample Complexity of Solving Non-Cooperative Games. IEEE Trans. Inf. Theory 66(2): 1261-1280 (2020)
2010 – 2019
- 2019
- [j10]Ehsan Nekouei, Takashi Tanaka, Mikael Skoglund, Karl Henrik Johansson:
Information-theoretic approaches to privacy in estimation and control. Annu. Rev. Control. 47: 412-422 (2019) - [j9]Tansu Alpcan, Ehsan Nekouei, Girish N. Nair, Robin J. Evans:
An Information Analysis of Iterative Algorithms for Network Utility Maximization and Strategic Games. IEEE Trans. Control. Netw. Syst. 6(1): 151-162 (2019) - [c16]Mohammad Pirani, Ehsan Nekouei, Henrik Sandberg, Karl Henrik Johansson:
A Game-theoretic Framework for Security-aware Sensor Placement Problem in Networked Control Systems. ACC 2019: 114-119 - [c15]Jieqiang Wei, Ehsan Nekouei, Junfeng Wu, Vladimir Cvetkovic, Karl Henrik Johansson:
Steady-state Analysis of a Human-social Behavior Model: a Neural-cognition Perspective. ACC 2019: 199-204 - [c14]David Umsonst, Ehsan Nekouei, André Teixeira, Henrik Sandberg:
On the Confidentiality of Linear Anomaly Detector States. ACC 2019: 397-403 - [c13]Mohammad Pirani, Ehsan Nekouei, Seyed Mehran Dibaji, Henrik Sandberg, Karl Henrik Johansson:
Design of Attack-Resilient Consensus Dynamics: A Game-Theoretic Approach. ECC 2019: 2227-2232 - [i5]Ehsan Nekouei, Mikael Skoglund, Karl Henrik Johansson:
An Entropy Power Inequality for Discrete Random Variables. CoRR abs/1905.03015 (2019) - 2018
- [j8]Ehsan Nekouei, Tansu Alpcan, Girish N. Nair, Robin J. Evans:
Convergence Analysis of Quantized Primal-Dual Algorithms in Network Utility Maximization Problems. IEEE Trans. Control. Netw. Syst. 5(1): 284-297 (2018) - [c12]Takashi Tanaka, Ehsan Nekouei, Karl Henrik Johansson:
Linearly Solvable Mean-Field Road Traffic Games. Allerton 2018: 283-289 - [c11]Ehsan Nekouei, Mikael Skoglund, Karl Henrik Johansson:
Privacy of Information Sharing Schemes in a Cloud-based Multi-sensor Estimation Problem. ACC 2018: 998-1002 - [c10]Jaehyun Yoo, Ehsan Nekouei, Karl Henrik Johansson:
Event-based Observer and MPC with Disturbance Attenuation using ERM Learning. ECC 2018: 1894-1899 - [c9]Alexander Johansson, Ehsan Nekouei, Karl Henrik Johansson, Jonas Mårtensson:
Multi-Fleet Platoon Matching: A Game-Theoretic Approach. ITSC 2018: 2980-2985 - 2017
- [c8]Ehsan Nekouei, Tansu Alpcan, Girish N. Nair:
Nash equilibrium approximation under communication and computation constraints in large-scale non-cooperative games. ASCC 2017: 2083-2088 - [c7]Amin Masoumzadeh, Ehsan Nekouei, Tansu Alpcan:
Impact of a coal power plant closure on a multi-region wholesale electricity market. ISGT Europe 2017: 1-6 - [i4]Ehsan Nekouei, Girish N. Nair, Tansu Alpcan, Robin J. Evans:
Lower Bounds on the Complexity of Solving Two Classes of Non-cooperative Games. CoRR abs/1701.06717 (2017) - 2016
- [j7]Ehsan Nekouei, Girish N. Nair, Tansu Alpcan:
Performance Analysis of Gradient-Based Nash Seeking Algorithms Under Quantization. IEEE Trans. Autom. Control. 61(12): 3771-3783 (2016) - [j6]Ehsan Nekouei, Hazer Inaltekin, Subhrakanti Dey:
Throughput Analysis for the Cognitive Uplink Under Limited Primary Cooperation. IEEE Trans. Commun. 64(7): 2780-2796 (2016) - 2015
- [j5]Ehsan Nekouei, Tansu Alpcan, Deb Chattopadhyay:
Game-Theoretic Frameworks for Demand Response in Electricity Markets. IEEE Trans. Smart Grid 6(2): 748-758 (2015) - [c6]Ehsan Nekouei, Girish N. Nair, Tansu Alpcan:
Convergence analysis of quantized primal-dual algorithm in quadratic network utility maximization problems. CDC 2015: 2655-2660 - 2014
- [j4]Athipat Limmanee, Subhrakanti Dey, Ehsan Nekouei:
Optimal power policies and throughput scaling analyses in fading cognitive broadcast channels with primary outage probability constraint. EURASIP J. Wirel. Commun. Netw. 2014: 35 (2014) - [j3]Ehsan Nekouei, Hazer Inaltekin, Subhrakanti Dey:
Power Control and Asymptotic Throughput Analysis for the Distributed Cognitive Uplink. IEEE Trans. Commun. 62(1): 41-58 (2014) - 2013
- [b1]Ehsan Nekouei:
Throughput scaling laws in cognitive multiple access networks. University of Melbourne, Australia, 2013 - [c5]Ehsan Nekouei, Hazer Inaltekin, Subhrakanti Dey:
Distributed cognitive multiple access networks: Power control, scheduling and multiuser diversity. ISIT 2013: 1665-1669 - [i3]Ehsan Nekouei, Hazer Inaltekin, Subhrakanti Dey:
Distributed Cognitive Multiple Access Networks: Power Control, Scheduling and Multiuser Diversity. CoRR abs/1304.3865 (2013) - 2012
- [j2]Ehsan Nekouei, Hazer Inaltekin, Subhrakanti Dey:
Throughput Scaling in Cognitive Multiple Access With Average Power and Interference Constraints. IEEE Trans. Signal Process. 60(2): 927-946 (2012) - [c4]Ehsan Nekouei, Hazer Inaltekin, Subhrakanti Dey:
Asymptotically optimal channel feedback protocol design for cognitive multiple access channels. GLOBECOM 2012: 2196-2202 - [c3]Ehsan Nekouei, Tansu Alpcan, Subhrakanti Dey:
An outage-based game design for cognitive radio. ISWCS 2012: 1034-1038 - [i2]Ehsan Nekouei, Hazer Inaltekin, Subhrakanti Dey:
Asymptotically Optimal Feedback Protocol Design for Cognitive Multiple Access Channels. CoRR abs/1209.1424 (2012) - [i1]Ehsan Nekouei, Hazer Inaltekin, Subhrakanti Dey:
Throughput Scaling Laws in Distributed Cognitive Multiple Access Channels. CoRR abs/1209.1426 (2012) - 2011
- [c2]Ehsan Nekouei, Hazer Inaltekin, Subhrakanti Dey:
Throughput Scaling in Cognitive Multiple Access Networks with Power and Interference Constraints. ICC 2011: 1-6
2000 – 2009
- 2008
- [c1]Ehsan Nekouei, Hossein Momenaee Kermani, Siamak Talebi:
An information lossless, full diversity, full rate, linear dispersion STBC. ICT 2008: 1-4 - 2007
- [j1]Ehsan Nekouei, Paeiz Azmi:
Multiuser Detection in MC-CDMA Communication Systems Using MPEM Algorithm. Wirel. Pers. Commun. 40(4): 593-603 (2007)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-30 21:32 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint