Follow
Mohsen Rezvani
Mohsen Rezvani
Verified email at cse.unsw.edu.au - Homepage
Title
Cited by
Cited by
Year
Secure data aggregation technique for wireless sensor networks in the presence of collusion attacks
M Rezvani, A Ignatovic, E Bertino, S Jha
IEEE Transactions on Dependable and Secure Computing, 1-1, 2014
2512014
ResBCDU-Net: a deep learning framework for lung CT image segmentation
Y Jalali, M Fateh, M Rezvani, V Abolghasemi, MH Anisi
Sensors 21 (1), 268, 2021
942021
A new method of coding for steganography based on LSB matching revisited
M Fateh, M Rezvani, Y Irani
Security and communication networks 2021 (1), 6610678, 2021
522021
Deep recurrent–convolutional neural network for classification of simultaneous EEG–fNIRS signals
H Ghonchi, M Fateh, V Abolghasemi, S Ferdowsi, M Rezvani
IET Signal Processing 14 (3), 142-153, 2020
482020
Interdependent security risk analysis of hosts and flows
M Rezvani, V Sekulic, A Ignjatovic, E Bertino, S Jha
IEEE Transactions on Information Forensics and Security 10 (11), 2325-2339, 2015
312015
MalwareMonitor: An SDN-based framework for securing large networks
Z Abaid, M Rezvani, S Jha
Proceedings of the 2014 CoNEXT on Student Workshop, 40-42, 2014
302014
Routing-aware and malicious node detection in a concealed data aggregation for WSNs
W Alghamdi, M Rezvani, H Wu, SS Kanhere
ACM Transactions on Sensor Networks (TOSN) 15 (2), 1-20, 2019
252019
Analyzing XACML policies using answer set programming
M Rezvani, D Rajaratnam, A Ignjatovic, M Pagnucco, S Jha
International Journal of Information Security 18, 465-479, 2019
222019
RAT: Reinforcement-learning-driven and adaptive testing for vulnerability discovery in web application firewalls
M Amouei, M Rezvani, M Fateh
IEEE Transactions on Dependable and Secure Computing 19 (5), 3371-3386, 2021
212021
An email-based high capacity text steganography using repeating characters
M Fateh, M Rezvani
International Journal of Computers and Applications 43 (3), 226-232, 2021
212021
Assessment methodology for anomaly-based intrusion detection in cloud computing
M Rezvani
Journal of AI and Data Mining 6 (2), 387-397, 2018
202018
A game-theoretic approach for robust federated learning
E Tahanian, M Amouei, H Fateh, M Rezvani
International Journal of Engineering 34 (4), 832-842, 2021
182021
MHiC, an integrated user-friendly tool for the identification and visualization of significant interactions in Hi-C data
S Khakmardan, M Rezvani, AA Pouyan, M Fateh, H Alinejad-Rokny
BMC genomics 21, 1-10, 2020
172020
A provenance-aware multi-dimensional reputation system for online rating systems
M Rezvani, A Ignjatovic, E Bertino
ACM Transactions on Internet Technology (TOIT) 18 (4), 1-20, 2018
172018
A deep learning approach for botnet detection using raw network traffic data
M Shahhosseini, H Mashayekhi, M Rezvani
Journal of Network and Systems Management 30 (3), 44, 2022
162022
A robust iterative filtering technique for wireless sensor networks in the presence of malicious attacks
M Rezvani, A Ignjatovic, E Bertino, S Jha
Proceedings of the 11th ACM Conference on Embedded Networked Sensor Systems, 1-2, 2013
162013
Printed Persian OCR system using deep learning
M Rahmati, M Fateh, M Rezvani, A Tajary, V Abolghasemi
IET Image Processing 14 (15), 3920-3931, 2020
152020
A randomized reputation system in the presence of unfair ratings
M Rezvani, M Rezvani
ACM Transactions on Management Information Systems (TMIS) 11 (1), 1-16, 2020
152020
Anomaly-free policy composition in software-defined networks
M Rezvani, A Ignjatovic, M Pagnucco, S Jha
2016 IFIP Networking Conference (IFIP Networking) and Workshops, 28-36, 2016
152016
Provenance-aware security risk analysis for hosts and network flows
M Rezvani, A Ignjatovic, E Bertino, S Jha
2014 IEEE Network Operations and Management Symposium (NOMS), 1-8, 2014
152014
The system can't perform the operation now. Try again later.
Articles 1–20