Florida International University
Edit Your Profile
FIU Discovery
Toggle navigation
Browse
Home
People
Organizations
Scholarly & Creative Works
Research Facilities
Support
Manshaei, Mohammad
Profile QR Code
Share this page
Twitter
Email
Copy link
Share
Publications
Publications
selected scholarly works & creative activities
Article
2021
On Coordination of Smart Grid and Cooperative Cloud Providers
.
IEEE Systems Journal
. 15:672-683.
Full Text via DOI:
10.1109/JSYST.2020.2987017
2021
Strategic Defense Against Stealthy Link Flooding Attacks: A Signaling Game Approach
.
IEEE Transactions on Network Science and Engineering
. 8:751-764.
Full Text via DOI:
10.1109/TNSE.2021.3052090
Web of Science:
000631202700058
2020
A holistic day-ahead distributed energy management approach: Equilibrium selection for customers' game
.
Scientia Iranica
. 27:1437-1449.
Full Text via DOI:
10.24200/SCI.2018.20825
2020
Resource allocation in future HetRAT networks: a general framework
.
Wireless Networks
. 26:2695-2706.
Full Text via DOI:
10.1007/s11276-019-02006-6
2020
Cancer immunoediting: A game theoretical approach
.
In Silico Biology
. 14:1-12.
Full Text via DOI:
10.3233/ISB-200475
2019
A game-theoretic model for users' participation in ephemeral social vehicular networks
.
International Journal of Communication Systems
. 32.
Full Text via DOI:
10.1002/dac.3998
2019
Social Community-Aware Content Placement in Wireless Device-to-Device Communication Networks
.
IEEE Transactions on Mobile Computing
. 18:1938-1950.
Full Text via DOI:
10.1109/TMC.2018.2866100
2019
Neurons and astrocytes interaction in neuronal network: A game-theoretic approach
.
Journal of Theoretical Biology
. 470:76-89.
Full Text via DOI:
10.1016/j.jtbi.2019.02.024
2019
An evolutionary game model for analysis of rumor propagation and control in social networks
.
Physica A: Statistical Mechanics and its Applications
. 523:21-39.
Full Text via DOI:
10.1016/j.physa.2019.01.147
2019
On data center demand response: A cloud federation approach
.
IEEE Access
. 7:101829-101843.
Full Text via DOI:
10.1109/ACCESS.2019.2928552
2018
Game theory of tumor–stroma interactions in multiple myeloma: Effect of nonlinear benefits
.
Games
. 9.
Full Text via DOI:
10.3390/g9020032
2018
A Game-Theoretic Analysis of Shard-Based Permissionless Blockchains
.
IEEE Access
. 6:78100-78112.
Full Text via DOI:
10.1109/ACCESS.2018.2884764
2018
Game-theoretic approach to group learning enhancement through peer-to-peer explanation and competition
.
IEEE Access
. 6:53684-53697.
Full Text via DOI:
10.1109/ACCESS.2018.2871155
2018
On uplink virtual MIMO with device relaying cooperation enforcement in 5G networks
.
IEEE Transactions on Mobile Computing
. 17:155-168.
Full Text via DOI:
10.1109/TMC.2017.2707540
2017
HIV-1-infected T-cells dynamics and prognosis: An evolutionary game model
.
Computer Methods and Programs in Biomedicine
. 152:1-14.
Full Text via DOI:
10.1016/j.cmpb.2017.08.021
2017
Peer-Assisted Information-Centric Network (PICN): A Backward Compatible Solution
.
IEEE Access
. 5:25005-25020.
Full Text via DOI:
10.1109/ACCESS.2017.2762697
2017
P4QS: A peer-To-peer privacy preserving query service for location-based mobile applications
.
IEEE Transactions on Vehicular Technology
. 66:9458-9469.
Full Text via DOI:
10.1109/TVT.2017.2703631
2017
Stochastic Coalitional Games for Cooperative Random Access in M2M Communications
.
IEEE Transactions on Wireless Communications
. 16:6179-6192.
Full Text via DOI:
10.1109/TWC.2017.2720658
2017
Evolutionary emergence of angiogenesis in avascular tumors using a spatial public goods game
.
PLoS ONE
. 12.
Full Text via DOI:
10.1371/journal.pone.0175063
2017
MMP–TIMP interactions in cancer invasion: An evolutionary game-theoretical framework
.
Journal of Theoretical Biology
. 412:17-26.
Full Text via DOI:
10.1016/j.jtbi.2016.09.019
2016
Evolutionary dynamics of tumor-stroma interactions in multiple myeloma
.
PLoS ONE
. 11.
Full Text via DOI:
10.1371/journal.pone.0168856
2016
Cooperative primary–secondary dynamic spectrum leasing game via decentralized bargaining
.
Wireless Networks
. 22:755-764.
Full Text via DOI:
10.1007/s11276-015-0999-8
2014
A dynamic Bayesian security game framework for strategic defense mechanism design
.
Lecture Notes in Computer Science
. 8840:319-328.
Full Text via DOI:
10.1007/978-3-319-12601-2_18
2013
Non-cooperative location privacy
.
IEEE Transactions on Dependable and Secure Computing
. 10:84-98.
Full Text via DOI:
10.1109/TDSC.2012.85
2011
OREN: Optimal revocations in ephemeral networks
.
Computer Networks
. 55:1168-1180.
Full Text via DOI:
10.1016/j.comnet.2010.11.010
2009
On selecting the best transmission mode for WiFi devices
.
Wireless Communications and Mobile Computing
. 9:959-975.
Full Text via DOI:
10.1002/wcm.645
Secure and Private Data Aggregation for Energy Consumption Scheduling in Smart Grids
.
IEEE Transactions on Dependable and Secure Computing
. 14:221-234.
Full Text via DOI:
10.1109/TDSC.2015.2446492
Web of Science:
000396397200009
Book Chapter
2013
Ad-Blocking games: Monetizing online content under the threat of ad avoidance
. 49-73.
Full Text via DOI:
10.1007/978-3-642-39498-0_3
2007
Spectrum sharing games of network operators and cognitive radios
. 555-578.
Full Text via DOI:
10.1007/978-1-4020-5979-7_29
Conference
2021
Wide-AdGraph: Detecting Ad Trackers with a Wide Dependency Chain Graph
. 253-261.
Full Text via DOI:
10.1145/3447535.3462549
2020
On Incentive Compatible Role-based Reward Distribution in Algorand
.
2005 INTERNATIONAL CONFERENCE ON DEPENDABLE SYSTEMS AND NETWORKS, PROCEEDINGS
. 452-463.
Full Text via DOI:
10.1109/DSN48063.2020.00059
Web of Science:
000617924900039
2019
A Social-Aware approach for federated iot-mobile cloud using matching theory
. 554-559.
Full Text via DOI:
10.1109/WF-IoT.2019.8767286
2019
A Game-Theoretic Analysis of Pricing Competition between Aggregators in V2G Systems
.
Proceedings - International Computer Software and Applications Conference
. 549-558.
Full Text via DOI:
10.1109/COMPSAC.2019.00085
Web of Science:
000538791700074
2019
Analyzing Defense Strategies Against Mobile Information Leakages: A Game-Theoretic Approach
.
Lecture Notes in Computer Science
. 276-296.
Full Text via DOI:
10.1007/978-3-030-32430-8_17
2019
LIPs: A Protocol for Leadership Incentives for Heterogeneous and Dynamic Platoons
.
Proceedings - International Computer Software and Applications Conference
. 535-544.
Full Text via DOI:
10.1109/COMPSAC.2019.00082
Web of Science:
000538791700071
2017
Collaborative Real-Time Content Download Application for Wireless Device-to-Device Communications
.
2012 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM)
. 1-6.
Full Text via DOI:
10.1109/GLOCOM.2017.8254122
2016
Energy-aware optimization and mechanism design for cellular device-to-device local area networks
. 309-314.
Full Text via DOI:
10.1109/CISS.2016.7460520
2016
A game-theoretic analysis of deception over social networks using fake avatars
.
Lecture Notes in Computer Science
. 382-394.
Full Text via DOI:
10.1007/978-3-319-47413-7_22
2016
On cooperation mechanism in internet of things with multiple sponsors
Full Text via DOI:
10.1109/GLOCOMW.2016.7848973
2016
Resource allocation for machine-to-machine communications with unmanned aerial vehicles
Full Text via DOI:
10.1109/GLOCOMW.2016.7849026
2015
To trust or not: A security signaling game between service provider and client
.
Lecture Notes in Computer Science
. 322-333.
Full Text via DOI:
10.1007/978-3-319-25594-1_18
2014
Hybrid cellular and device-to-device communication power control: Nash bargaining game
. 1077-1081.
Full Text via DOI:
10.1109/ISTEL.2014.7000864
2014
A modular two-layer system for accurate and fast traffic classification
. 149-154.
Full Text via DOI:
10.1109/ISCISC.2014.6994039
2013
A Game-Theoretic Approach for Deceiving Remote Operating System Fingerprinting
.
2013 IEEE CONFERENCE ON COMMUNICATIONS AND NETWORK SECURITY (CNS)
. 73-81.
Web of Science:
000332881600009
2011
One-to-n scrip systems for cooperative privacy-enhancing technologies
. 682-692.
Full Text via DOI:
10.1109/Allerton.2011.6120234
2010
ISPs and ad networks against botnet ad fraud
.
Lecture Notes in Computer Science
. 149-167.
Full Text via DOI:
10.1007/978-3-642-17197-0_10
2010
Tracking games in mobile networks
.
Lecture Notes in Computer Science
. 38-57.
Full Text via DOI:
10.1007/978-3-642-17197-0_3
2010
Optimal revocations in ephemeral networks: A game-theoretic framework
. 21-30.
2010
On the age of pseudonyms in mobile ad hoc networks
.
IEEE Infocom. Proceedings
.
Full Text via DOI:
10.1109/INFCOM.2010.5461975
2009
On non-cooperative location privacy: A game-theoretic analysis
.
Proceedings of the ACM Conference on Computer and Communications Security
. 324-337.
Full Text via DOI:
10.1145/1653662.1653702
2009
Cooperation in underwater sensor networks
. 540-548.
Full Text via DOI:
10.1109/GAMENETS.2009.5137443
2009
Evolution and market share of wireless community networks
. 508-514.
Full Text via DOI:
10.1109/GAMENETS.2009.5137439
2008
Revocation games in ephemeral networks
.
Proceedings of the ACM Conference on Computer and Communications Security
. 199-210.
Full Text via DOI:
10.1145/1455770.1455797
2008
On wireless social community networks
.
IEEE Infocom. Proceedings
. 2225-2233.
Full Text via DOI:
10.1109/INFOCOM.2007.215
2008
Wireless social community networks: A game-theoretic analysis
. 22-25.
Full Text via DOI:
10.1109/IZS.2008.4497267
2008
Optimal pricing strategy for wireless social community networks
. 103-108.
Full Text via DOI:
10.1145/1403027.1403050
2006
Implementation of group member authentication protocol in mobile ad-hoc networks
.
IEEE Wireless Communications and Networking Conference, WCNC
. 2205-2210.
Full Text via DOI:
10.1109/wcnc.2006.1696638
2005
CLARA: Closed-loop adaptive rate allocation for IEEE 802.11 wireless LANs
. 668-673.
Full Text via DOI:
10.1109/WIRLES.2005.1549487
2005
Performance analysis of the IEEE 802.11 MAC and physical layer protocol
. 88-97.
Full Text via DOI:
10.1109/WOWMOM.2005.76
2004
IEEE 802.11 rate adaptation: A practical approach
. 126-134.
2004
A media-oriented transmission mode selection in 802.11 wireless LANs
. 1228-1233.
Full Text via DOI:
10.1109/wcnc.2004.1311364
Proceedings Paper
2017
Group Testing Game
.
IFAC-PapersOnLine
. 9668-9673.
Full Text via DOI:
10.1016/j.ifacol.2017.08.2047
Review
2013
Game theory meets network security and privacy
.
ACM Computing Surveys
.
Full Text via DOI:
10.1145/2480741.2480742
2005
An evaluation of media-oriented rate selection algorithm for multimedia transmission in MANETs
.
Eurasip Journal on Wireless Communications and Networking
. 757-773.
Full Text via DOI:
10.1155/WCN.2005.757
visualizations
Co-author Network
Map of Science