Mahnush Movahedi Department of Computer Science University of New Mexico (UNM), Albuquerque, NM, USA [email protected] http://cs.unm.edu/∼movahedi Research Interests Randomized Algorithms, Fault-Tolerant Distributed Algorithms, Game Theory. Education • Ph.D. candidate, Computer Science, University of New Mexico, USA, GPA: 4.04 Advisor: Jared Saia, Expected graduation: Summer 2015. • M.S, Computer Science, University of New Mexico, USA, 2013. • M.S, Computer Engineering, Amirkabir University of Technology (AUT), Iran, 2010. Project: Misbehavior Detection in Wireless Sensor Networks, Graduate with Distinction. • B.S, Information Technology Engineering, Amirkabir University of Technology, Iran, 2007. Project: Secure ERP Systems. Awards and Honors • Best Paper Award, Conference on Distributed Computing and Networking (ICDCN), 2014. • (ISC)2 Foundation Graduate Research Scholarship in Information Security, 2012. • Travel Awards: DISC 2014, MobiHoc 2014. • M.S. Graduated with distinction, Amirkabir University of Technology (Tehran Polytechnic), 2010. • Iran Telecommunication Research Center (ITRC) Student Scholarship, 2009. • M.S. Admission with Scholership Award for Exceptional Students, AUT, 2007. • B.S. Graduate with Distinction, Computer Engineering Department, AUT, 2007. Academic Activities • Research Assistant, advised by Jared Saia, UNM CS, Spring 2011 - present. Projects: Cost-competitive interactive communication, asynchronous secure multi-party computation, scalable secret sharing schemes. • Visiting Scholar, advised by Seth Pettie, University of Michigan, Ann Arbor, Summer 2014. • Guest Lecturer, Algorithms and Data Structures Course, UNM CS, Fall 2013 and Fall 2012. • Undergraduate Mentor, Project for New Mexico Graduates of Color (PNMGC), Spring 2014. • Program Committee, ACM Workshop on Foundations of Mobile Computing (FOMC), 2014. • Conference Reviewer, ICALP 2014, DISC 2014. • Research Assistant, advised by Hossein Pedram, Asynchronous Laboratory, AUT CE, 2007-2010. Projects: Distributed intrusion detection via artificial immune algorithms, denial-of-service resistant wireless sensor networks. • Teaching Assistant, Computer Networks, AUT CE, 2008. • Researcher, Robotics Research Center, AUT CE, 2004-2006. Project: License plate recognition using mathematical morphology and neural networks. Publications In theory papers, author names are usually sorted in the alphabetic order. 1 Peer-Reviewed 1. Scalable Mechanisms for Rational Secret Sharing, with Varsha Dani and Jared Saia, Journal of Distributed Computing, 2014. 2. Quorums Quicken Queries: Efficient Asynchronous Secure Multiparty Computation, with Varsha Dani, Valerie King, and Jared Saia. 15th Conference on Distributed Computing and Networking (ICDCN), India, 2014 ( best paper award and invited to to the Theoretical Computer Science journal as a special issue). 3. Secure Anonymous Broadcast (Brief Announcement), with Jared Saia and Mahdi Zamani. 28th Symposium on Distributed Computing (DISC ’14), Austin, TX, 2014. 4. Secure Location Sharing, with Mahdi Zamani. 10th ACM Workshop on Foundations of Mobile Computing (FOMC ’14), Philadelphia, PA, 2014. (a brief announcement of this work is published in DISC 2014). 5. Towards Provably-Secure Scalable Anonymous Broadcast, with Joud Khoury, Jared Saia, and Mahdi Zamani. USENIX Workshop on Free and Open Communications on the Internet (FOCI ’13), Washington, DC, 2013. 6. Breaking the O(nm) Bit Barrier: Secure Multiparty Computation with a Static Adversary (Brief Announcement), with Varsha Dani, Valerie King, and Jared Saia. In ACM Symposium on Principles of Distributed Computing (PODC), Portugal, 2012. 7. Scalable Mechanisms for Rational Secret Sharing, with Varsha Dani, Yamel Rodriguez, and Jared Saia. ACM Symposium on Principles of Distributed Computing (PODC), San Jose, CA, USA, 2011. 8. A DDoS-Aware IDS Model Based on Danger Theory and Mobile Agents, with Mahdi Zamani, Mohammad M. Ebadzadeh, and Hossein Pedram. 5th Int’l Conference on Computational Intelligence and Security (CIS ’09), Beijing, China, 2009. 9. An Architecture Based on Danger Theory in Immune Systems and Mobile Agents for Distributed Intrusion Detection, with Mahdi Zamani, Mohammad M. Ebadzadeh, and Hossein Pedram. 14th Int’l Computer Society of Iran Conference (CSICC ’09), Tehran, Iran, 2009. 10. Design of a License Plate Recognition System Using Mathematical Morphology and Hu Invariant Moments, with Mahdi Zamani. 3rd Conference on Information and Knowledge Technology (IKT ’07), Tehran, Iran, 2007. Preprints • Scalable Secure Multi-Party Shuffling, with Jared Saia and Mahdi Zamani. Submitted to ICDCS 2015. • Asynchronous Multi-Party Computation in Large Networks, with Varsha Dani, Valerie King, Jared Saia, and Mahdi Zamani. In prep. for Journal of Distributed Computing. • On Optimal Decision-Making in Ant Colonies, with Mahdi Zamani. arXiv:1407.0391, 2014. Posters • On Optimal Decision-Making in Ant Colonies, with Mahdi Zamani. In Workshop on Biological Distributed Algorithms (BDA), Austin, TX, 2014. • Privacy-Preserving Multi-Party Sorting of Large Data Sets, with Mahdi Zamani and Jared Saia. In Workshop on Algorithms for Modern Massive Data Sets (MMDS), UC Berkeley, CA, 2014. Presentations • “Privacy-Preserving Location-Based Services”, DISC, Austin, TX, October 2014. • “Handling Asynchrony in Multiparty Computation”, 10th Annual Computer Science Student Conference (CSSC’14), University of New Mexico, April 2014. • “Quorums Quicken Queries: Efficient Asynchronous Secure Multiparty Computation”, Applied Multi-Party Computation Workshop, Microsoft Research Redmond, February 2014. • “Asynchronous Secure Multiparty Computation with a Static Adversary”, CSAIL Theory of Computation Group, Massachusetts Institute of Technology, November 2012. • “Scalable Secure Multiparty Computation”, Department of Computer Science, Brown University, November 2012. 2 • “Application of Scalable Secure Multiparty Computation in Helix”, MURI annual report, George Mason University, June 2012. • “Breaking the O(nm) Bit Barrier: Secure Multiparty Computation with a Static Adversary”, 8th Annual Computer Science Symposium, University of New Mexico, April 2012. Selected Projects • MPCLib: Multi-party computation library written in C# and C++. Techniques used: Shamir’s secret sharing, polynomial commitments, quorum formation, fully homomorphic encryption, and elliptic curve cryptography. • SimulAIS: a discrete event simulator for Artificial Immune Systems (AIS) written in C#. The system is based on Danger Theory, a widely-accepted approach to explain natural immune tolerance (see my paper in CIS’09 for more information). • L2 : A small core λ-calculus language in Haskell that supports booleans and integers calculations. Several evaluation strategies were implemented including natural semantics with nameless representation (DeBruijn notation), CPS transformation, and the CE3R machine. Graduate Course Summary Algorithms and Data Structures (A+, Jared Saia), Intro to Theory of Computation (A+, Cris Moore), Software Foundations (A+, Darko Stefanovic), Complex Adaptive Systems (A, Melanie Moses), Artificial Intelligence (A, Lydia Tapia), Advanced Compiler Construction (A, Darko Stefanovic), Object-Oriented Testing (A, Larry McCartney). Skills • C/C++, C#, Java, Haskell, Prolog, Matlab, NS-2. • Object-oriented design, Network programming, Discrete event simulation. References Jared Saia, Professor CS Dept, UNM [email protected] Phone: (505) 277-5446 Seth Pettie University of Michigan [email protected] Phone: (734) 615-4210 Cris Moore, Professor Santa Fe Institute [email protected] Phone: (505) 984-8800 3 Valerie King, Professor University of Victoria [email protected] Phone: (250) 472-5727
© Copyright 2024 ExpyDoc