Seguir
Mohsen Rezvani
Mohsen Rezvani
Dirección de correo verificada de cse.unsw.edu.au - Página principal
Título
Citado por
Citado por
Año
Secure data aggregation technique for wireless sensor networks in the presence of collusion attacks
M Rezvani, A Ignatovic, E Bertino, S Jha
IEEE Transactions on Dependable and Secure Computing, 1-1, 2014
2452014
ResBCDU-Net: a deep learning framework for lung CT image segmentation
Y Jalali, M Fateh, M Rezvani, V Abolghasemi, MH Anisi
Sensors 21 (1), 268, 2021
802021
Deep recurrent–convolutional neural network for classification of simultaneous EEG–fNIRS signals
H Ghonchi, M Fateh, V Abolghasemi, S Ferdowsi, M Rezvani
IET Signal Processing 14 (3), 142-153, 2020
382020
A new method of coding for steganography based on LSB matching revisited
M Fateh, M Rezvani, Y Irani
Security and Communication Networks 2021, 1-15, 2021
372021
Interdependent security risk analysis of hosts and flows
M Rezvani, V Sekulic, A Ignjatovic, E Bertino, S Jha
IEEE Transactions on Information Forensics and Security 10 (11), 2325-2339, 2015
302015
MalwareMonitor: An SDN-based framework for securing large networks
Z Abaid, M Rezvani, S Jha
Proceedings of the 2014 CoNEXT on Student Workshop, 40-42, 2014
302014
Routing-aware and malicious node detection in a concealed data aggregation for WSNs
W Alghamdi, M Rezvani, H Wu, SS Kanhere
ACM Transactions on Sensor Networks (TOSN) 15 (2), 1-20, 2019
212019
Assessment methodology for anomaly-based intrusion detection in cloud computing
M Rezvani
Journal of AI and Data Mining 6 (2), 387-397, 2018
202018
Analyzing XACML policies using answer set programming
M Rezvani, D Rajaratnam, A Ignjatovic, M Pagnucco, S Jha
International Journal of Information Security 18, 465-479, 2019
192019
An email-based high capacity text steganography using repeating characters
M Fateh, M Rezvani
International Journal of Computers and Applications 43 (3), 226-232, 2021
172021
A robust iterative filtering technique for wireless sensor networks in the presence of malicious attacks
M Rezvani, A Ignjatovic, E Bertino, S Jha
Proceedings of the 11th ACM Conference on Embedded Networked Sensor Systems, 1-2, 2013
162013
Anomaly-free policy composition in software-defined networks
M Rezvani, A Ignjatovic, M Pagnucco, S Jha
2016 IFIP Networking Conference (IFIP Networking) and Workshops, 28-36, 2016
152016
Provenance-aware security risk analysis for hosts and network flows
M Rezvani, A Ignjatovic, E Bertino, S Jha
2014 IEEE Network Operations and Management Symposium (NOMS), 1-8, 2014
152014
MHiC, an integrated user-friendly tool for the identification and visualization of significant interactions in Hi-C data
S Khakmardan, M Rezvani, AA Pouyan, M Fateh, H Alinejad-Rokny
BMC genomics 21, 1-10, 2020
142020
Analyzing and resolving anomalies in firewall security policies based on propositional logic
M Rezvani, R Aryan
2009 IEEE 13th International Multitopic Conference, 1-7, 2009
142009
Printed Persian OCR system using deep learning
M Rahmati, M Fateh, M Rezvani, A Tajary, V Abolghasemi
IET Image Processing 14 (15), 3920-3931, 2020
132020
Rat: Reinforcement-learning-driven and adaptive testing for vulnerability discovery in web application firewalls
M Amouei, M Rezvani, M Fateh
IEEE Transactions on Dependable and Secure Computing 19 (5), 3371-3386, 2021
122021
A game-theoretic approach for robust federated learning
E Tahanian, M Amouei, H Fateh, M Rezvani
International Journal of Engineering 34 (4), 832-842, 2021
122021
A randomized reputation system in the presence of unfair ratings
M Rezvani, M Rezvani
ACM Transactions on Management Information Systems (TMIS) 11 (1), 1-16, 2020
122020
A collaborative reputation system based on credibility propagation in wsns
M Rezvani, A Ignjatovic, E Bertino, S Jha
2015 IEEE 21st International Conference on Parallel and Distributed Systems …, 2015
122015
El sistema no puede realizar la operación en estos momentos. Inténtalo de nuevo más tarde.
Artículos 1–20