Secure data aggregation technique for wireless sensor networks in the presence of collusion attacks M Rezvani, A Ignatovic, E Bertino, S Jha IEEE Transactions on Dependable and Secure Computing, 1-1, 2014 | 226 | 2014 |
ResBCDU-Net: a deep learning framework for lung CT image segmentation Y Jalali, M Fateh, M Rezvani, V Abolghasemi, MH Anisi Sensors 21 (1), 268, 2021 | 38 | 2021 |
MalwareMonitor: An SDN-based framework for securing large networks Z Abaid, M Rezvani, S Jha Proceedings of the 2014 CoNEXT on Student Workshop, 40-42, 2014 | 30 | 2014 |
Interdependent security risk analysis of hosts and flows M Rezvani, V Sekulic, A Ignjatovic, E Bertino, S Jha IEEE Transactions on Information Forensics and Security 10 (11), 2325-2339, 2015 | 27 | 2015 |
Deep recurrent–convolutional neural network for classification of simultaneous EEG–fNIRS signals H Ghonchi, M Fateh, V Abolghasemi, S Ferdowsi, M Rezvani IET Signal Processing 14 (3), 142-153, 2020 | 21 | 2020 |
A new method of coding for steganography based on LSB matching revisited M Fateh, M Rezvani, Y Irani Security and Communication Networks 2021, 1-15, 2021 | 20 | 2021 |
Routing-aware and malicious node detection in a concealed data aggregation for WSNs W Alghamdi, M Rezvani, H Wu, SS Kanhere ACM Transactions on Sensor Networks (TOSN) 15 (2), 1-20, 2019 | 20 | 2019 |
Analyzing XACML policies using answer set programming M Rezvani, D Rajaratnam, A Ignjatovic, M Pagnucco, S Jha International Journal of Information Security 18, 465-479, 2019 | 18 | 2019 |
An email-based high capacity text steganography using repeating characters M Fateh, M Rezvani International Journal of Computers and Applications 43 (3), 226-232, 2021 | 16 | 2021 |
A robust iterative filtering technique for wireless sensor networks in the presence of malicious attacks M Rezvani, A Ignjatovic, E Bertino, S Jha Proceedings of the 11th ACM Conference on Embedded Networked Sensor Systems, 1-2, 2013 | 16 | 2013 |
Assessment methodology for anomaly-based intrusion detection in cloud computing M Rezvani Journal of AI and Data Mining 6 (2), 387-397, 2018 | 15 | 2018 |
Provenance-aware security risk analysis for hosts and network flows M Rezvani, A Ignjatovic, E Bertino, S Jha 2014 IEEE Network Operations and Management Symposium (NOMS), 1-8, 2014 | 15 | 2014 |
MHiC, an integrated user-friendly tool for the identification and visualization of significant interactions in Hi-C data S Khakmardan, M Rezvani, AA Pouyan, M Fateh, H Alinejad-Rokny BMC genomics 21, 1-10, 2020 | 13 | 2020 |
Anomaly-free policy composition in software-defined networks M Rezvani, A Ignjatovic, M Pagnucco, S Jha 2016 IFIP Networking Conference (IFIP Networking) and Workshops, 28-36, 2016 | 13 | 2016 |
Analyzing and resolving anomalies in firewall security policies based on propositional logic M Rezvani, R Aryan 2009 IEEE 13th International Multitopic Conference, 1-7, 2009 | 13 | 2009 |
A collaborative reputation system based on credibility propagation in WSNs M Rezvani, A Ignjatovic, E Bertino, S Jha 2015 IEEE 21st International Conference on Parallel and Distributed Systems …, 2015 | 11 | 2015 |
A randomized reputation system in the presence of unfair ratings M Rezvani, M Rezvani ACM Transactions on Management Information Systems (TMIS) 11 (1), 1-16, 2020 | 10 | 2020 |
Method for providing secure and private fine-grained access to outsourced data M Jahan, M Rezvani, A Seneviratne, S Jha 2015 IEEE 40th Conference on Local Computer Networks (LCN), 406-409, 2015 | 9 | 2015 |
Specification and verification of security policies in firewalls R Jalili, M Rezvani EurAsia-ICT 2002: Information and Communication Technology: First EurAsian …, 2002 | 9 | 2002 |
Spatio-temporal deep learning for EEG-fNIRS brain computer interface H Ghonchi, M Fateh, V Abolghasemi, S Ferdowsi, M Rezvani 2020 42nd Annual International Conference of the IEEE Engineering in …, 2020 | 8 | 2020 |