Seguir
Amir Jalaly Bidgoly
Amir Jalaly Bidgoly
Associate Professor at Department of Computer Engineering, University of Qom
Dirección de correo verificada de qom.ac.ir - Página principal
Título
Citado por
Citado por
Año
A survey on methods and challenges in EEG based authentication
AJ Bidgoly, HJ Bidgoly, Z Arezoumand
Computers & Security 93, 101788, 2020
1272020
Benchmarking reputation systems: A quantitative verification approach
AJ Bidgoly, BT Ladani
Computers in Human Behavior 57, 274-291, 2016
412016
Fake news detection on social media using a natural language inference approach
F Sadeghi, AJ Bidgoly, H Amirkhani
Multimedia Tools and Applications 81 (23), 33801-33821, 2022
312022
Fake news detection on social media using a natural language inference approach
F Sadeghi, AJ Bidgoly, H Amirkhani
Multimedia Tools and Applications, 1-21, 2022
312022
Towards a universal and privacy preserving EEG-based authentication system
AJ Bidgoly, HJ Bidgoly, Z Arezoumand
Scientific Reports 12 (1), 2531, 2022
312022
Trust modeling and verification using colored petri nets
AJ Bidgoly, BT Ladani
2011 8th International ISC Conference on Information Security and Cryptology …, 2011
282011
Modelling and quantitative verification of reputation systems against malicious attackers
AJ Bidgoly, BT Ladani
The Computer Journal 58 (10), 2567-2582, 2015
272015
Modeling and quantitative verification of trust systems against malicious attackers
AJ Bidgoly, BT Ladani
The Computer Journal 59 (7), 1005-1027, 2016
252016
Ransomware detection using process mining and classification algorithms
A Bahrani, AJ Bidgly
2019 16th International ISC (Iranian Society of Cryptology) Conference on …, 2019
192019
PDETool: A multi-formalism modeling tool for discrete-event systems based on SDES description
A Khalili, A Jalaly Bidgoly, M Abdollahi Azgomi
Applications and Theory of Petri Nets: 30th International Conference, PETRI …, 2009
192009
Quantitative verification of beta reputation system using PRISM probabilistic model checker
AJ Bidgoly, BT Ladani
2013 10th International ISC Conference on Information Security and …, 2013
182013
Android malware detection using network traffic based on sequential deep learning models
S Fallah, AJ Bidgoly
Software: Practice and Experience, 2022
162022
Recommendation system using a deep learning and graph analysis approach
M Kherad, AJ Bidgoly
Computational Intelligence 38 (5), 1859-1883, 2022
142022
Benchmarking machine learning algorithms for android malware detection
S Fallah, AJ Bidgoly
Jordanian Journal of Computers and Information Technology 5 (3), 2019
142019
A novel chaining encryption algorithm for LPWAN IoT network
AJ Bidgoly, HJ Bidgoly
IEEE Sensors Journal 19 (16), 7027-7034, 2019
142019
Multi-thread hierarchical deep model for context-aware sentiment analysis
A Keramatfar, H Amirkhani, A Jalaly Bidgoly
Journal of Information Science 49 (1), 133-144, 2023
122023
Probabilistic analysis of trust based decision making in hostile environments
AJ Bidgoly
Knowledge-Based Systems 211, 106521, 2021
112021
A novel reward and penalty trust evaluation model based on confidence interval using Petri Net
A Mohsenzadeh, AJ Bidgoly, Y Farjami
Journal of Network and Computer Applications 154, 102533, 2020
112020
Robustness verification of soft security systems
AJ Bidgoly
Journal of Information Security and Applications 55, 102632, 2020
102020
A systematic survey on collaborator finding systems in scientific social networks
Z Roozbahani, J Rezaeenour, H Emamgholizadeh, A Jalaly Bidgoly
Knowledge and Information Systems 62, 3837-3879, 2020
102020
El sistema no puede realizar la operación en estos momentos. Inténtalo de nuevo más tarde.
Artículos 1–20