Mohsen Rezvani
Mohsen Rezvani
Verified email at - Homepage
Cited by
Cited by
Secure data aggregation technique for wireless sensor networks in the presence of collusion attacks
M Rezvani, A Ignatovic, E Bertino, S Jha
IEEE Transactions on Dependable and Secure Computing, 1-1, 2014
ResBCDU-Net: a deep learning framework for lung CT image segmentation
Y Jalali, M Fateh, M Rezvani, V Abolghasemi, MH Anisi
Sensors 21 (1), 268, 2021
A new method of coding for steganography based on LSB matching revisited
M Fateh, M Rezvani, Y Irani
Security and Communication Networks 2021, 1-15, 2021
Deep recurrent–convolutional neural network for classification of simultaneous EEG–fNIRS signals
H Ghonchi, M Fateh, V Abolghasemi, S Ferdowsi, M Rezvani
IET Signal Processing 14 (3), 142-153, 2020
Interdependent security risk analysis of hosts and flows
M Rezvani, V Sekulic, A Ignjatovic, E Bertino, S Jha
IEEE Transactions on Information Forensics and Security 10 (11), 2325-2339, 2015
MalwareMonitor: An SDN-based framework for securing large networks
Z Abaid, M Rezvani, S Jha
Proceedings of the 2014 CoNEXT on Student Workshop, 40-42, 2014
Routing-aware and malicious node detection in a concealed data aggregation for WSNs
W Alghamdi, M Rezvani, H Wu, SS Kanhere
ACM Transactions on Sensor Networks (TOSN) 15 (2), 1-20, 2019
Analyzing XACML policies using answer set programming
M Rezvani, D Rajaratnam, A Ignjatovic, M Pagnucco, S Jha
International Journal of Information Security 18, 465-479, 2019
Assessment methodology for anomaly-based intrusion detection in cloud computing
M Rezvani
Journal of AI and Data Mining 6 (2), 387-397, 2018
An email-based high capacity text steganography using repeating characters
M Fateh, M Rezvani
International Journal of Computers and Applications 43 (3), 226-232, 2021
A provenance-aware multi-dimensional reputation system for online rating systems
M Rezvani, A Ignjatovic, E Bertino
ACM Transactions on Internet Technology (TOIT) 18 (4), 1-20, 2018
A robust iterative filtering technique for wireless sensor networks in the presence of malicious attacks
M Rezvani, A Ignjatovic, E Bertino, S Jha
Proceedings of the 11th ACM Conference on Embedded Networked Sensor Systems, 1-2, 2013
Anomaly-free policy composition in software-defined networks
M Rezvani, A Ignjatovic, M Pagnucco, S Jha
2016 IFIP Networking Conference (IFIP Networking) and Workshops, 28-36, 2016
Provenance-aware security risk analysis for hosts and network flows
M Rezvani, A Ignjatovic, E Bertino, S Jha
2014 IEEE Network Operations and Management Symposium (NOMS), 1-8, 2014
MHiC, an integrated user-friendly tool for the identification and visualization of significant interactions in Hi-C data
S Khakmardan, M Rezvani, AA Pouyan, M Fateh, H Alinejad-Rokny
BMC genomics 21, 1-10, 2020
Analyzing and resolving anomalies in firewall security policies based on propositional logic
M Rezvani, R Aryan
2009 IEEE 13th International Multitopic Conference, 1-7, 2009
RAT: Reinforcement-Learning-Driven and Adaptive Testing for Vulnerability Discovery in Web Application Firewalls
M Amouei, M Rezvani, M Fateh
IEEE Transactions on Dependable and Secure Computing 19 (5), 3371-3386, 2021
A randomized reputation system in the presence of unfair ratings
M Rezvani, M Rezvani
ACM Transactions on Management Information Systems (TMIS) 11 (1), 1-16, 2020
Printed Persian OCR system using deep learning
M Rahmati, M Fateh, M Rezvani, A Tajary, V Abolghasemi
IET Image Processing 14 (15), 3920-3931, 2020
A collaborative reputation system based on credibility propagation in wsns
M Rezvani, A Ignjatovic, E Bertino, S Jha
2015 IEEE 21st International Conference on Parallel and Distributed Systems …, 2015
The system can't perform the operation now. Try again later.
Articles 1–20