Secure data aggregation technique for wireless sensor networks in the presence of collusion attacks M Rezvani, A Ignatovic, E Bertino, S Jha IEEE Transactions on Dependable and Secure Computing, 1-1, 2014 | 251 | 2014 |
ResBCDU-Net: a deep learning framework for lung CT image segmentation Y Jalali, M Fateh, M Rezvani, V Abolghasemi, MH Anisi Sensors 21 (1), 268, 2021 | 94 | 2021 |
A new method of coding for steganography based on LSB matching revisited M Fateh, M Rezvani, Y Irani Security and communication networks 2021 (1), 6610678, 2021 | 52 | 2021 |
Deep recurrent–convolutional neural network for classification of simultaneous EEG–fNIRS signals H Ghonchi, M Fateh, V Abolghasemi, S Ferdowsi, M Rezvani IET Signal Processing 14 (3), 142-153, 2020 | 48 | 2020 |
Interdependent security risk analysis of hosts and flows M Rezvani, V Sekulic, A Ignjatovic, E Bertino, S Jha IEEE Transactions on Information Forensics and Security 10 (11), 2325-2339, 2015 | 31 | 2015 |
MalwareMonitor: An SDN-based framework for securing large networks Z Abaid, M Rezvani, S Jha Proceedings of the 2014 CoNEXT on Student Workshop, 40-42, 2014 | 30 | 2014 |
Routing-aware and malicious node detection in a concealed data aggregation for WSNs W Alghamdi, M Rezvani, H Wu, SS Kanhere ACM Transactions on Sensor Networks (TOSN) 15 (2), 1-20, 2019 | 25 | 2019 |
Analyzing XACML policies using answer set programming M Rezvani, D Rajaratnam, A Ignjatovic, M Pagnucco, S Jha International Journal of Information Security 18, 465-479, 2019 | 22 | 2019 |
RAT: Reinforcement-learning-driven and adaptive testing for vulnerability discovery in web application firewalls M Amouei, M Rezvani, M Fateh IEEE Transactions on Dependable and Secure Computing 19 (5), 3371-3386, 2021 | 21 | 2021 |
An email-based high capacity text steganography using repeating characters M Fateh, M Rezvani International Journal of Computers and Applications 43 (3), 226-232, 2021 | 21 | 2021 |
Assessment methodology for anomaly-based intrusion detection in cloud computing M Rezvani Journal of AI and Data Mining 6 (2), 387-397, 2018 | 20 | 2018 |
A game-theoretic approach for robust federated learning E Tahanian, M Amouei, H Fateh, M Rezvani International Journal of Engineering 34 (4), 832-842, 2021 | 18 | 2021 |
MHiC, an integrated user-friendly tool for the identification and visualization of significant interactions in Hi-C data S Khakmardan, M Rezvani, AA Pouyan, M Fateh, H Alinejad-Rokny BMC genomics 21, 1-10, 2020 | 17 | 2020 |
A provenance-aware multi-dimensional reputation system for online rating systems M Rezvani, A Ignjatovic, E Bertino ACM Transactions on Internet Technology (TOIT) 18 (4), 1-20, 2018 | 17 | 2018 |
A deep learning approach for botnet detection using raw network traffic data M Shahhosseini, H Mashayekhi, M Rezvani Journal of Network and Systems Management 30 (3), 44, 2022 | 16 | 2022 |
A robust iterative filtering technique for wireless sensor networks in the presence of malicious attacks M Rezvani, A Ignjatovic, E Bertino, S Jha Proceedings of the 11th ACM Conference on Embedded Networked Sensor Systems, 1-2, 2013 | 16 | 2013 |
Printed Persian OCR system using deep learning M Rahmati, M Fateh, M Rezvani, A Tajary, V Abolghasemi IET Image Processing 14 (15), 3920-3931, 2020 | 15 | 2020 |
A randomized reputation system in the presence of unfair ratings M Rezvani, M Rezvani ACM Transactions on Management Information Systems (TMIS) 11 (1), 1-16, 2020 | 15 | 2020 |
Anomaly-free policy composition in software-defined networks M Rezvani, A Ignjatovic, M Pagnucco, S Jha 2016 IFIP Networking Conference (IFIP Networking) and Workshops, 28-36, 2016 | 15 | 2016 |
Provenance-aware security risk analysis for hosts and network flows M Rezvani, A Ignjatovic, E Bertino, S Jha 2014 IEEE Network Operations and Management Symposium (NOMS), 1-8, 2014 | 15 | 2014 |