Filter by:

Order by: Date
Item Counts: 52

A robust PRNU-based source camera attribution with convolutional neural networks

Journal of Supercomputing

International Journal 2024 October Volume (81) No (1)

A clarity and fairness aware framework for selecting workers in competitive crowdsourcing tasks

Computing

International Journal 2024 September Volume (106) No (9) Pages (3005-3030)

REACH: Robust Efficient Authentication for Crowdsensing-based Healthcare

Journal of Supercomputing

International Journal 2024 April Volume (80) No (6) Pages (8434-8468)

DiMo: discovery of microRNA motifs using deep learning and motif embedding

Briefings in Bioinformatics

International Journal 2023 May Volume (24) No (3)

A Taxonomy for RNA Motif Discovery

Journal of Computer and Knowledge Engineering

International Journal 2022 December

On the Suitability of Improved TrustChain for Smartphones

ISeCure

International Journal 2022 October Volume (14) No (3) Pages (33-42)

Sharing Reputation Data Across Online Communities

IEEE Internet Computing

International Journal 2022 July Volume (26) No (4) Pages (60-67)

Slight: A lightweight authentication scheme for smart healthcare services

Computers and Electrical Engineering

International Journal 2022 April Volume (99) Pages (107803-107811)

TAMA: Three-Factor Authentication for Multi-server Architecture

Human-centric Computing and Information Sciences

International Journal 2021 October Volume (11) Pages (1-1)

On the Security of “Secure and Lightweight Authentication with Key Agreement for Smart Wearable Systems”

Wireless Personal Communications

International Journal 2021 September Volume (120) No (1) Pages (1-8)

SCiMet: Stable, sCalable and reliable Metric-based framework for quality assessment in collaborative content generation systems

Journal of Informetrics

International Journal 2021 May Volume (15) No (2) Pages (101127-101127)

A hybrid method of genetic algorithm and support vector machine for DNS tunneling detection

International Journal of Electrical and Computer Engineering-IJECE

International Journal 2021 April Volume (11) No (2) Pages (1666-1674)

A hybrid method of genetic algorithm and support vector machine for intrusion detection

International Journal of Electrical and Computer Engineering-IJECE

International Journal 2021 February Volume (11) No (1)

Secure and Authenticated Data Access and Sharing Model for Smart Wearable Systems

IEEE Internet of Things Journal

International Journal 2021 January Volume (9) No (7) Pages (5368-5379)

A provably secure and lightweight authentication scheme for Internet of Drones for smart city surveillance

Journal of Systems Architecture

International Journal 2020 December Volume (115) Pages (101955-)

A provably secure ECC-based roaming authentication scheme for global mobility networks

Journal of Information Security and Applications

International Journal 2020 October Volume (54) Pages (102588-102600)

An efficient storage-optimizing tick data clustering model

Turkish Journal of Electrical Engineering and Computer Sciences

International Journal 2020 September Volume (28) No (5) Pages (2657-2669)

Enhanced Schemes for Data Fragmentation, Allocation, and Replication in Distributed Database Systems

Computer Systems Science and Engineering

International Journal 2020 March Volume (35) No (2) Pages (99-112)

Secure communication in CloudIoT through design of a lightweight authentication and session key agreement scheme

International Journal of Communication Systems

International Journal 2020 February Volume (36) No (1)

AQA: An Adaptive Quality Assessment Framework for Online Review Systems

IEEE Transactions on Services Computing

International Journal 2020 January Volume (15) No (3) Pages (1486-1497)

Perfect forward secrecy via an ECC-based authentication scheme for SIP in VoIP

Journal of Supercomputing

International Journal 2019 November Volume (76) No (4) Pages (3086-3104)

A Trust-Based Experience-Aware Framework for Integrating Fuzzy Recommendations

IEEE Transactions on Services Computing

International Journal 2019 January Volume (15) No (2) Pages (698-709)

DNS Tunneling Detection Method Based on Multilabel Support Vector Machine

Security and Communication Networks

International Journal 2018 January Volume (2018) No (1) Pages (1-9)

Collusion-resistant Worker Selection in Social Crowdsensing Systems

Journal of Computer and Knowledge Engineering

International Journal 2017 February Volume (1) No (1) Pages (9-20)

Trust-based privacy-aware participant selection in social participatory sensing

Journal of Information Security and Applications

International Journal 2015 February Volume (20) No (1) Pages (11-25)

A Reputation Framework for Social Participatory Sensing Systems

Mobile Networks and Applications

International Journal 2014 February Volume (19) No (1) Pages (88-100)

Design and performance evaluation of a fuzzy based traffic conditioner for differentiated services

Computer Networks

International Journal 2005 April Volume (47) No (6) Pages (847-869)

A fuzzy extension to the blue active queue management algorithm

مهندسی برق و الکترونیک ایران

International Journal 2005 February Volume (1) No (3) Pages (3-15)

Towards a Standard Framework for Integrating Blockchain with the Internet of Things

2024 8th International Conference on Smart Cities, Internet of Things and Applications (SCIoT)

International Conferences | 2024-05-14

Decoding MicroRNA Motifs: A Time Series Approach using Hidden Markov Models

13th International Conference on Computer and Knowledge Engineering (ICCKE 2023)

International Conferences | 2023-11-01

Improved TrustChain for Lightweight Devices

12th International Conference on Computer and Knowledge Engineering

International Conferences | 2022-12-15

An Iterative Model for Quality Assessment in Collaborative Content Generation Systems

The 2nd International Workshop on AI-enabled Process Automation

International Conferences | 2021-11-22

2Line Defense Ontology-Based Trust Management Model

4TH INTERNATIONAL CONFERENCE ON INNOVATIVE COMPUTING AND COMMUNICATION

International Conferences | 2021-02-20

Lightweight Authentication for Remote Healthcare Systems in Cloud-IoT

10th International Conference on Computer and Knowledge Engineering (ICCKE

International Conferences | 2020-10-29

A Novel Provably-Secure ECC-based Authentication and Key Management Protocol for Telecare Medical Information Systems

9th International Conference on Computer and Knowledge Engineering

International Conferences | 2019-10-24

A Systematic Literature Review on Blockchain-based Solutions for IoT Security

The International Conference on Contemporary Issues In Data Science

International Conferences | 2019-03-05

FUMBOT: Design, Implementation and Detectoin

OIC-CERT 9TH GENERAL MEETING AND ANNUAL CONFERENCE 2018

International Conferences | 2018-11-26

Trust and Privacy Challenges in Social Participatory Networks

Sixth Australasian Symposium on Service Research and Innovation (ASSRI’17)

International Conferences | 2017-10-19

A Game-Theoretic Approach to Quality Improvement in Crowdsourcing Tasks

Australian Symposium on Service Research and Innovation

International Conferences | 2017-10-19

A Survey on Participant Recruitment in Crowdsensing Systems

2016 6th International Conference on Computer and Knowledge Engineering (ICCKE)

International Conferences | 2016-10-20

A socially-aware incentive scheme for social participatory sensing

2015 IEEE Tenth International Conference on Intelligent Sensors, Sensor Networks and Information Processing (ISSNIP)

International Conferences | 2015-05-07

Privacy-aware Trust-based Recruitment in Social Participatory Sensing

Mobile and Ubiquitous Systems: Computing, Networking, and Services

International Conferences | 2013-12-02

Trust Assessment in Social Participatory Networks

3rd International Conference on Computer and Knowledge Engineering

International Conferences | 2013-10-31

A Trust-Based Recruitment Framework for Multi-hop Social Participatory Sensing

IEEE International Conference on Distributed Computing in Sensor Systems

International Conferences | 2013-05-21

A Trust Framework for Social Participatory Sensing Systems

Mobile and Ubiquitous Systems: Computing, Networking, and Services

International Conferences | 2012-12-12

طراحی و پیاده‌سازی یک چارچوب مبتنی بر اعتماد برای تشخیص ترافیک موبایل در شبکه

صنایع الکترونیک

Internal journal | بهمن ۱۳۹۸ Volume (10) No (4) Pages (69-84)

ارائه پروتکلی جامع و سبک وزن برای احرازهویت دو طرفه دستگاه‌های VoIP مبتنی بر کارت هوشمند

صنایع الکترونیک

Internal journal | آذر ۱۳۹۸ Volume (10) No (3) Pages (69-84)

کنترل کیفیت غیرمتمرکز مبتنی بر هوش ترکیبی در سیستمهای مشارکتی برخط

14th International Conference on Information and Knowledge Technology (IKT)

Internal conferences | ۱۴۰۲/۱۰/۰۵

ارزیابی میزان شفافیت سؤالات در سامانه‌های پرسش‌ و پاسخ

بیست و هفتمین کنفرانس بین الملی انجمن کامپیوتر ایران

Internal conferences | ۱۴۰۰/۱۲/۰۴

استخراج ویژگی در سنجش عملکرد ناظرها و بهبود امنیت در بلاکچین زنجیره اعتماد

بیست و ششمین کنفرانس بین المللی انجمن کامپیوتر ایران

Internal conferences | ۱۳۹۹/۱۲/۱۲

پروتکلی کارامد مبتنی بر رمزنگاری منحنی بیضوی برای ارتباط امن کاربران با خدمات دهنده

چهارمین کنفرانس تکنولوژی در مهندسی برق و کامپیوتر

Internal conferences | ۱۳۹۸/۰۳/۰۸

تحلیل الگوی مصرف انرژی برق در خانه هوشمند با استفاده از سلسله مراتب زمانی

سومین کنفرانس بین المللی اینترنت اشیاء و کاربردها

Internal conferences | ۱۳۹۸/۰۱/۲۸