Mohsen Rezvani
Mohsen Rezvani
Verified email at - Homepage
Cited by
Cited by
Secure data aggregation technique for wireless sensor networks in the presence of collusion attacks
M Rezvani, A Ignatovic, E Bertino, S Jha
IEEE Transactions on Dependable and Secure Computing, 1-1, 2014
ResBCDU-Net: a deep learning framework for lung CT image segmentation
Y Jalali, M Fateh, M Rezvani, V Abolghasemi, MH Anisi
Sensors 21 (1), 268, 2021
MalwareMonitor: An SDN-based framework for securing large networks
Z Abaid, M Rezvani, S Jha
Proceedings of the 2014 CoNEXT on Student Workshop, 40-42, 2014
Interdependent security risk analysis of hosts and flows
M Rezvani, V Sekulic, A Ignjatovic, E Bertino, S Jha
IEEE Transactions on Information Forensics and Security 10 (11), 2325-2339, 2015
Deep recurrent–convolutional neural network for classification of simultaneous EEG–fNIRS signals
H Ghonchi, M Fateh, V Abolghasemi, S Ferdowsi, M Rezvani
IET Signal Processing 14 (3), 142-153, 2020
A new method of coding for steganography based on LSB matching revisited
M Fateh, M Rezvani, Y Irani
Security and Communication Networks 2021, 1-15, 2021
Routing-aware and malicious node detection in a concealed data aggregation for WSNs
W Alghamdi, M Rezvani, H Wu, SS Kanhere
ACM Transactions on Sensor Networks (TOSN) 15 (2), 1-20, 2019
Analyzing XACML policies using answer set programming
M Rezvani, D Rajaratnam, A Ignjatovic, M Pagnucco, S Jha
International Journal of Information Security 18, 465-479, 2019
An email-based high capacity text steganography using repeating characters
M Fateh, M Rezvani
International Journal of Computers and Applications 43 (3), 226-232, 2021
A robust iterative filtering technique for wireless sensor networks in the presence of malicious attacks
M Rezvani, A Ignjatovic, E Bertino, S Jha
Proceedings of the 11th ACM Conference on Embedded Networked Sensor Systems, 1-2, 2013
Assessment methodology for anomaly-based intrusion detection in cloud computing
M Rezvani
Journal of AI and Data Mining 6 (2), 387-397, 2018
Provenance-aware security risk analysis for hosts and network flows
M Rezvani, A Ignjatovic, E Bertino, S Jha
2014 IEEE Network Operations and Management Symposium (NOMS), 1-8, 2014
MHiC, an integrated user-friendly tool for the identification and visualization of significant interactions in Hi-C data
S Khakmardan, M Rezvani, AA Pouyan, M Fateh, H Alinejad-Rokny
BMC genomics 21, 1-10, 2020
Anomaly-free policy composition in software-defined networks
M Rezvani, A Ignjatovic, M Pagnucco, S Jha
2016 IFIP Networking Conference (IFIP Networking) and Workshops, 28-36, 2016
Analyzing and resolving anomalies in firewall security policies based on propositional logic
M Rezvani, R Aryan
2009 IEEE 13th International Multitopic Conference, 1-7, 2009
A collaborative reputation system based on credibility propagation in WSNs
M Rezvani, A Ignjatovic, E Bertino, S Jha
2015 IEEE 21st International Conference on Parallel and Distributed Systems …, 2015
A randomized reputation system in the presence of unfair ratings
M Rezvani, M Rezvani
ACM Transactions on Management Information Systems (TMIS) 11 (1), 1-16, 2020
Method for providing secure and private fine-grained access to outsourced data
M Jahan, M Rezvani, A Seneviratne, S Jha
2015 IEEE 40th Conference on Local Computer Networks (LCN), 406-409, 2015
Specification and verification of security policies in firewalls
R Jalili, M Rezvani
EurAsia-ICT 2002: Information and Communication Technology: First EurAsian …, 2002
Spatio-temporal deep learning for EEG-fNIRS brain computer interface
H Ghonchi, M Fateh, V Abolghasemi, S Ferdowsi, M Rezvani
2020 42nd Annual International Conference of the IEEE Engineering in …, 2020
The system can't perform the operation now. Try again later.
Articles 1–20