Alireza Jolfaei

Orcid: 0000-0001-7818-459X

According to our database1, Alireza Jolfaei authored at least 173 papers between 2011 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
IoT Systems for Extreme Environments.
IEEE Internet Things J., February, 2024

A Blockchain-Based Mutual Authentication Method to Secure the Electric Vehicles' TPMS.
IEEE Trans. Ind. Informatics, January, 2024

Mitigating Label Flipping Attacks in Malicious URL Detectors Using Ensemble Trees.
CoRR, 2024

GraphSUM: Scalable Graph Summarization for Efficient Question Answering.
Proceedings of the Proceedings 27th International Conference on Extending Database Technology, 2024

2023
Mixed Graph Neural Network-Based Fake News Detection for Sustainable Vehicular Social Networks.
IEEE Trans. Intell. Transp. Syst., December, 2023

Multimodal Social Data Analytics on the Design and Implementation of an EEG-Mechatronic System Interface.
ACM J. Data Inf. Qual., September, 2023

Fog Intelligence for Secure Smart Villages: Architecture and Future Challenges.
IEEE Consumer Electron. Mag., September, 2023

Adult content image recognition by Boltzmann machine limited and deep learning.
Evol. Intell., August, 2023

Aggregated decentralized down-sampling-based ResNet for smart healthcare systems.
Neural Comput. Appl., July, 2023

Active Learning Based Adversary Evasion Attacks Defense for Malwares in the Internet of Things.
IEEE Syst. J., June, 2023

Secure ticket-based authentication method for IoT applications.
Digit. Commun. Networks, June, 2023

Mutual Supervised Fusion & Transfer Learning with Interpretable Linguistic Meaning for Social Data Analytics.
ACM Trans. Asian Low Resour. Lang. Inf. Process., May, 2023

Application of fuzzy learning in IoT-enabled remote healthcare monitoring and control of anesthetic depth during surgery.
Inf. Sci., May, 2023

Multi-Objective Neural Evolutionary Algorithm for Combinatorial Optimization Problems.
IEEE Trans. Neural Networks Learn. Syst., April, 2023

AI-Enabled Cryptographic Key Management Model for Secure Communications in the Internet of Vehicles.
IEEE Trans. Intell. Transp. Syst., April, 2023

Monitoring the security of audio biomedical signals communications in wearable IoT healthcare.
Digit. Commun. Networks, April, 2023

A Weak-Region Enhanced Bayesian Classification for Spam Content-Based Filtering.
ACM Trans. Asian Low Resour. Lang. Inf. Process., March, 2023

A Fog-Based Security Framework for Large-Scale Industrial Internet of Things Environments.
IEEE Internet Things Mag., March, 2023

Intrusion Detection for Maritime Transportation Systems With Batch Federated Aggregation.
IEEE Trans. Intell. Transp. Syst., February, 2023

A blockchain-orchestrated deep learning approach for secure data transmission in IoT-enabled healthcare system.
J. Parallel Distributed Comput., February, 2023

Filtering Malicious Messages by Trust-Aware Cognitive Routing in Vehicular Ad Hoc Networks.
IEEE Trans. Intell. Transp. Syst., January, 2023

DeformableGAN: Generating Medical Images With Improved Integrity for Healthcare Cyber Physical Systems.
IEEE Trans. Netw. Sci. Eng., 2023

Intelligent Computation Offloading and Resource Allocation in IIoT With End-Edge-Cloud Computing Using NSGA-III.
IEEE Trans. Netw. Sci. Eng., 2023

SCA-LFD: Side-Channel Analysis-Based Load Forecasting Disturbance in the Energy Internet.
IEEE Trans. Ind. Electron., 2023

An Intelligent Intrusion Detection System for Smart Consumer Electronics Network.
IEEE Trans. Consumer Electron., 2023

Cyber Attacks via Consumer Electronics: Studying the Threat of Covert Malware in Smart and Autonomous Vehicles.
IEEE Trans. Consumer Electron., 2023

Deep Learning and Smart Contract-Assisted Secure Data Sharing for IoT-Based Intelligent Agriculture.
IEEE Intell. Syst., 2023

An Integrated Framework for Enhancing Security and Privacy in IoT-Based Business Intelligence Applications.
Proceedings of the IEEE International Conference on Consumer Electronics, 2023

IGA : An Improved Genetic Algorithm to Construct Weightwise (Almost) Perfectly Balanced Boolean Functions with High Weightwise Nonlinearity.
Proceedings of the 2023 ACM Asia Conference on Computer and Communications Security, 2023

2022
DeCoP: Deep Learning for COVID-19 Prediction of Survival.
IEEE Trans. Mol. Biol. Multi Scale Commun., December, 2022

An intelligent cryptographic key management model for secure communications in distributed industrial intelligent systems.
Int. J. Intell. Syst., December, 2022

Efficient Cryptographic Hardware for Safety Message Verification in Internet of Connected Vehicles.
ACM Trans. Internet Techn., November, 2022

Introduction to the Special Issue on Affective Services based on Representation Learning.
ACM Trans. Multim. Comput. Commun. Appl., 2022

Introduction To The Special Section On Edge/Fog Computing For Infectious Disease Intelligence.
ACM Trans. Internet Techn., 2022

On the Neural Backdoor of Federated Generative Models in Edge Computing.
ACM Trans. Internet Techn., 2022

Vulnerability Detection in SIoT Applications: A Fuzzing Method on their Binaries.
IEEE Trans. Netw. Sci. Eng., 2022

A Quantitative Comparative Study of Data-oriented Trust Management Schemes in Internet of Things.
ACM Trans. Manag. Inf. Syst., 2022

Guest Editorial Introduction to the Special Issue on Context Prediction of Autonomous Vehicles.
IEEE Trans. Intell. Transp. Syst., 2022

An Enhanced Multi-Stage Deep Learning Framework for Detecting Malicious Activities From Autonomous Vehicles.
IEEE Trans. Intell. Transp. Syst., 2022

Investigating the Prospect of Leveraging Blockchain and Machine Learning to Secure Vehicular Networks: A Survey.
IEEE Trans. Intell. Transp. Syst., 2022

A Secure and Decentralized Trust Management Scheme for Smart Health Systems.
IEEE J. Biomed. Health Informatics, 2022

Missing Value Filling Based on the Collaboration of Cloud and Edge in Artificial Intelligence of Things.
IEEE Trans. Ind. Informatics, 2022

Experience-Driven Attack Design and Federated-Learning-Based Intrusion Detection in Industry 4.0.
IEEE Trans. Ind. Informatics, 2022

A Novel Real-Time Deterministic Scheduling Mechanism in Industrial Cyber-Physical Systems for Energy Internet.
IEEE Trans. Ind. Informatics, 2022

Real-Time Transmission Optimization for Edge Computing in Industrial Cyber-Physical Systems.
IEEE Trans. Ind. Informatics, 2022

High Bandwidth Green Communication With Vehicles by Decentralized Resource Optimization in Integrated Access Backhaul 5G Networks.
IEEE Trans. Green Commun. Netw., 2022

Fuz-Spam: Label Smoothing-Based Fuzzy Detection of Spammers in Internet of Things.
IEEE Trans. Fuzzy Syst., 2022

Security and Privacy in Shared HitLCPS Using a GA-Based Multiple-Threshold Sanitization Model.
IEEE Trans. Emerg. Top. Comput. Intell., 2022

Resource Offload Consolidation Based on Deep-Reinforcement Learning Approach in Cyber-Physical Systems.
IEEE Trans. Emerg. Top. Comput. Intell., 2022

Guest Editorial: Computational Intelligence for Human-in-the-Loop Cyber Physical Systems.
IEEE Trans. Emerg. Top. Comput. Intell., 2022

Multi-task Fuzzy Clustering-Based Multi-task TSK Fuzzy System for Text Sentiment Classification.
ACM Trans. Asian Low Resour. Lang. Inf. Process., 2022

Joint Optimization of Energy Consumption and Data Transmission in Smart Body Area Networks.
Sensors, 2022

Antlion re-sampling based deep neural network model for classification of imbalanced multimodal stroke dataset.
Multim. Tools Appl., 2022

Jam-Absorption Driving Strategy for Improving Safety Near Oscillations in a Connected Vehicle Environment Considering Consequential Jams.
IEEE Intell. Transp. Syst. Mag., 2022

Consumer, Commercial, and Industrial IoT (In)Security: Attack Taxonomy and Case Studies.
IEEE Internet Things J., 2022

A survey of security and privacy issues in the Internet of Things from the layered context.
Trans. Emerg. Telecommun. Technol., 2022

Cognitive smart cities: Challenges and trending solutions.
Expert Syst. J. Knowl. Eng., 2022

Multifactor Pattern Implicit Authentication.
IEEE Consumer Electron. Mag., 2022

Blockchain-enabled secure communication for unmanned aerial vehicle (UAV) networks.
Proceedings of the 5th International ACM Mobicom Workshop on Drone Assisted Wireless Communications for 5G and Beyond, 2022

A Conceptual Trust Management Framework under Uncertainty for Smart Vehicular Networks.
Proceedings of the IEEE INFOCOM 2022, 2022

A New Five-Level Grid-Connected PV Inverter Topology Controlled By Model Predictive.
Proceedings of the IECON 2022, 2022

A New Multisource Inverter Topology for Electrical Vehicle Applications Controlled by Model Predictive.
Proceedings of the IECON 2022, 2022

Security of Machine Learning-Based Anomaly Detection in Cyber Physical Systems.
Proceedings of the 31st International Conference on Computer Communications and Networks, 2022

Blockchain and Deep Learning for Cyber Threat-Hunting in Software-Defined Industrial IoT.
Proceedings of the 2022 IEEE International Conference on Communications Workshops, 2022

Blockchain and Deep Learning Empowered Secure Data Sharing Framework for Softwarized UAVs.
Proceedings of the 2022 IEEE International Conference on Communications Workshops, 2022

Fuzzy-Based Operational Resilience Modelling.
Proceedings of the 9th IEEE International Conference on Data Science and Advanced Analytics, 2022

Cyber Resilience Modelling for the Operations of Hybrid Network.
Proceedings of the IEEE Intl. Conf. on Dependable, 2022

2021
Fuzzy-in-the-Loop-Driven Low-Cost and Secure Biometric User Access to Server.
IEEE Trans. Reliab., 2021

RICA-MD: A Refined ICA Algorithm for Motion Detection.
ACM Trans. Multim. Comput. Commun. Appl., 2021

Privacy-preserving Time-series Medical Images Analysis Using a Hybrid Deep Learning Framework.
ACM Trans. Internet Techn., 2021

FinPrivacy: A Privacy-preserving Mechanism for Fingerprint Identification.
ACM Trans. Internet Techn., 2021

Joint Encryption and Compression-Based Watermarking Technique for Security of Digital Documents.
ACM Trans. Internet Techn., 2021

Power Side-Channel Analysis of RNS GLV ECC Using Machine and Deep Learning Algorithms.
ACM Trans. Internet Techn., 2021

A Secure Ticket-Based Authentication Mechanism for Proxy Mobile IPv6 Networks in Volunteer Computing.
ACM Trans. Internet Techn., 2021

Fair-Hierarchical Scheduling for Diversified Services in Space, Air and Ground for 6G-Dense Internet of Things.
IEEE Trans. Netw. Sci. Eng., 2021

Energy Efficient Proactive Routing Scheme for Enabling Reliable Communication in Underwater Internet of Things.
IEEE Trans. Netw. Sci. Eng., 2021

SPEED: A Deep Learning Assisted Privacy-Preserved Framework for Intelligent Transportation Systems.
IEEE Trans. Intell. Transp. Syst., 2021

Uncertain-Driven Analytics of Sequence Data in IoCV Environments.
IEEE Trans. Intell. Transp. Syst., 2021

Mobility Aware Blockchain Enabled Offloading and Scheduling in Vehicular Fog Cloud Computing.
IEEE Trans. Intell. Transp. Syst., 2021

Guest Editorial Introduction to the Special Issue on Deep Learning Models for Safe and Secure Intelligent Transportation Systems.
IEEE Trans. Intell. Transp. Syst., 2021

Preserving Privacy in the Internet of Connected Vehicles.
IEEE Trans. Intell. Transp. Syst., 2021

On the Security of Networked Control Systems in Smart Vehicle and Its Adaptive Cruise Control.
IEEE Trans. Intell. Transp. Syst., 2021

Leveraging Energy Function Virtualization With Game Theory for Fault-Tolerant Smart Grid.
IEEE Trans. Ind. Informatics, 2021

A Fast Prekeying-Based Integrity Protection for Smart Grid Communications.
IEEE Trans. Ind. Informatics, 2021

Modeling of Human Cognition in Consensus Agreement on Social Media and Its Implications for Smarter Manufacturing.
IEEE Trans. Ind. Informatics, 2021

Unsupervised-Learning-Based Continuous Depth and Motion Estimation With Monocular Endoscopy for Virtual Reality Minimally Invasive Surgery.
IEEE Trans. Ind. Informatics, 2021

Guest Editorial: Configuration Security for Industrial Automation and Control Systems.
IEEE Trans. Ind. Informatics, 2021

Automation of Recording in Smart Classrooms via Deep Learning and Bayesian Maximum a Posteriori Estimation of Instructor's Pose.
IEEE Trans. Ind. Informatics, 2021

Energy-Aware Marine Predators Algorithm for Task Scheduling in IoT-Based Fog Computing Applications.
IEEE Trans. Ind. Informatics, 2021

Synthesized Corpora to Evaluate Fuzzing for Green Internet of Things Programs.
IEEE Trans. Green Commun. Netw., 2021

A Novel Conflict Measurement in Decision-Making and Its Application in Fault Diagnosis.
IEEE Trans. Fuzzy Syst., 2021

Fuzzy Detection System for Rumors Through Explainable Adaptive Learning.
IEEE Trans. Fuzzy Syst., 2021

Decentralized Opportunistic Channel Access in CRNs Using Big-Data Driven Learning Algorithm.
IEEE Trans. Emerg. Top. Comput. Intell., 2021

Closing the Loop in Feedback Driven Learning Environments Using Trust Decision Making and Utility Theory.
IEEE Trans. Emerg. Top. Comput. Intell., 2021

Robust Multimodal Representation Learning With Evolutionary Adversarial Attention Networks.
IEEE Trans. Evol. Comput., 2021

Learning Influential Cognitive Links in Social Networks by a New Hybrid Model for Opinion Dynamics.
IEEE Trans. Comput. Soc. Syst., 2021

EEG-Based Brain-Computer Interfaces (BCIs): A Survey of Recent Studies on Signal Sensing Technologies and Computational Intelligence Approaches and Their Applications.
IEEE ACM Trans. Comput. Biol. Bioinform., 2021

An Embedding-Based Topic Model for Document Classification.
ACM Trans. Asian Low Resour. Lang. Inf. Process., 2021

A scalable framework for healthcare monitoring application using the Internet of Medical Things.
Softw. Pract. Exp., 2021

INSWF DNA signal analysis tool: Intelligent noise suppression window filter.
Softw. Pract. Exp., 2021

Modeling Personality Effect in Trust Prediction.
J. Data Intell., 2021

Self-attention-based conditional random fields latent variables model for sequence labeling.
Pattern Recognit. Lett., 2021

An Intelligent prediction model for UCG state based on dual-source LSTM.
Int. J. Mach. Learn. Cybern., 2021

Real-time cheating immune secret sharing for remote sensing images.
J. Real Time Image Process., 2021

A novel PCA-whale optimization-based deep neural network model for classification of tomato plant diseases using GPU.
J. Real Time Image Process., 2021

SolGuard: Preventing external call issues in smart contract-based multi-agent robotic systems.
Inf. Sci., 2021

Privacy-Preserving Federated Learning Framework Based on Chained Secure Multiparty Computing.
IEEE Internet Things J., 2021

Energy-Efficient Drone Trajectory Planning for the Localization of 6G-Enabled IoT Devices.
IEEE Internet Things J., 2021

Intelligent Trust-Based Public-Key Management for IoT by Linking Edge Devices in a Fog Architecture.
IEEE Internet Things J., 2021

Detection of Anomalies in Industrial IoT Systems by Data Mining: Study of CHRIST Osmotron Water Purification System.
IEEE Internet Things J., 2021

Hiding sensitive information in eHealth datasets.
Future Gener. Comput. Syst., 2021

Robust Sensor Fusion Algorithms Against VoiceCommand Attacks in Autonomous Vehicles.
CoRR, 2021

Fault Current Limiter Dynamic Voltage Restorer (FCL-DVR) with Reduced Number of Components.
CoRR, 2021

A data-driven intelligent planning model for UAVs routing networks in mobile Internet of Things.
Comput. Commun., 2021

Information security in the post quantum era for 5G and beyond networks: Threats to existing cryptography, and post-quantum cryptography.
Comput. Commun., 2021

Privacy reinforcement learning for faults detection in the smart grid.
Ad Hoc Networks, 2021

Robust Sensor Fusion Algorithms Against Voice Command Attacks in Autonomous Vehicles.
Proceedings of the 20th IEEE International Conference on Trust, 2021

Security Principles and Challenges in Electronic Voting.
Proceedings of the 25th International Enterprise Distributed Object Computing Workshop, 2021

2020
Fog-based Secure Service Discovery for Internet of Multimedia Things: A Cross-blockchain Approach.
ACM Trans. Multim. Comput. Commun. Appl., 2020

Privacy Protection for Medical Data Sharing in Smart Healthcare.
ACM Trans. Multim. Comput. Commun. Appl., 2020

Cognitive Popularity Based AI Service Sharing for Software-Defined Information-Centric Networks.
IEEE Trans. Netw. Sci. Eng., 2020

Binary cuckoo search metaheuristic-based supercomputing framework for human behavior analysis in smart home.
J. Supercomput., 2020

Intelligent robust control for cyber-physical systems of rotary gantry type under denial of service attack.
J. Supercomput., 2020

Dynamic clustering method for imbalanced learning based on AdaBoost.
J. Supercomput., 2020

Securing smart vehicles from relay attacks using machine learning.
J. Supercomput., 2020

A Distributed and Anonymous Data Collection Framework Based on Multilevel Edge Computing Architecture.
IEEE Trans. Ind. Informatics, 2020

Artificial Intelligence for Detection, Estimation, and Compensation of Malicious Attacks in Nonlinear Cyber-Physical Systems and Industrial IoT.
IEEE Trans. Ind. Informatics, 2020

A Novel Spectrum Sharing Scheme Using Dynamic Long Short-Term Memory With CP-OFDMA in 5G Networks.
IEEE Trans. Cogn. Commun. Netw., 2020

Elliptic Curve Cryptography Point Multiplication Core for Hardware Security Module.
IEEE Trans. Computers, 2020

Real-time monitoring and operation of microgrid using distributed cloud-fog architecture.
J. Parallel Distributed Comput., 2020

An efficient parallel genetic algorithm solution for vehicle routing problem in cloud implementation of the intelligent transportation systems.
J. Cloud Comput., 2020

Securing the Internet of Everything through Adaptive and Resource-Efficient Mechanisms.
IEEE Internet Things Mag., 2020

A Computationally Intelligent Hierarchical Authentication and Key Establishment Framework for the Internet of Things.
IEEE Internet Things Mag., 2020

On the Lifetime of Asynchronous Software-Defined Wireless Sensor Networks.
IEEE Internet Things J., 2020

Learning-Based Context-Aware Resource Allocation for Edge-Computing-Empowered Industrial IoT.
IEEE Internet Things J., 2020

Integrating NFV and ICN for Advanced Driver-Assistance Systems.
IEEE Internet Things J., 2020

Guest Editorial Special Issue on Privacy and Security in Distributed Edge Computing and Evolving IoT.
IEEE Internet Things J., 2020

Vulnerability Modelling for Hybrid Industrial Control System Networks.
J. Grid Comput., 2020

Detection of Anomalies and Faults in Industrial IoT Systems by Data Mining: Study of CHRIST Osmotron Water Purification System.
CoRR, 2020

Resource allocation solution for sensor networks using improved chaotic firefly algorithm in IoT environment.
Comput. Commun., 2020

An energy-aware drone trajectory planning scheme for terrestrial sensors localization.
Comput. Commun., 2020

Security analysis of indistinguishable obfuscation for internet of medical things applications.
Comput. Commun., 2020

Efficient resource management and workload allocation in fog-cloud computing paradigm in IoT using learning classifier systems.
Comput. Commun., 2020

Task Offloading Strategy Based on Reinforcement Learning Computing in Edge Computing Architecture of Internet of Vehicles.
IEEE Access, 2020

A Low-Complexity Equalizer for Video Broadcasting in Cyber-Physical Social Systems Through Handheld Mobile Devices.
IEEE Access, 2020

A Systematic Review on Clone Node Detection in Static Wireless Sensor Networks.
IEEE Access, 2020

Attacks on Self-Driving Cars and Their Countermeasures: A Survey.
IEEE Access, 2020

Security Challenges and Solutions for 5G HetNet.
Proceedings of the 19th IEEE International Conference on Trust, 2020

A dynamic deep trust prediction approach for online social networks.
Proceedings of the MoMM '20: The 18th International Conference on Advances in Mobile Computing and Multimedia, Chiang Mai, Thailand, November 30, 2020

Autonomous detection of malicious events using machine learning models in drone networks.
Proceedings of the DroneCom '20: Proceedings of the 2nd ACM MobiCom Workshop on Drone Assisted Wireless Communications for 5G and Beyond, 2020

Blockchain Technology and Neural Networks for the Internet of Medical Things.
Proceedings of the 39th IEEE Conference on Computer Communications, 2020

2019
A lightweight integrity protection scheme for low latency smart grid applications.
Comput. Secur., 2019

A Face Emotion Recognition Method Using Convolutional Neural Network and Image Edge Computing.
IEEE Access, 2019

Secure Data Streaming to Untrusted Road Side Units in Intelligent Transportation System.
Proceedings of the 18th IEEE International Conference On Trust, 2019

Differentially Private Streaming to Untrusted Edge Servers in Intelligent Transportation System.
Proceedings of the 18th IEEE International Conference On Trust, 2019

Vulnerability Modelling for Hybrid IT Systems.
Proceedings of the IEEE International Conference on Industrial Technology, 2019

Security Hardening of Implantable Cardioverter Defibrillators.
Proceedings of the IEEE International Conference on Industrial Technology, 2019

Detection and Compensation of Covert Service-Degrading Intrusions in Cyber Physical Systems through Intelligent Adaptive Control.
Proceedings of the IEEE International Conference on Industrial Technology, 2019

Privacy and Security of Connected Vehicles in Intelligent Transportation System.
Proceedings of the 49th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2019

Ransomware Triage Using Deep Learning: Twitter as a Case Study.
Proceedings of the Cybersecurity and Cyberforensics Conference, 2019

Cybersecurity Indexes for eHealth.
Proceedings of the Australasian Computer Science Week Multiconference, 2019

2018
Secure Passive Keyless Entry and Start System Using Machine Learning.
Proceedings of the Security, Privacy, and Anonymity in Computation, Communication, and Storage, 2018

Data Exchange in Delay Tolerant Networks using Joint Inter- and Intra-Flow Network Coding.
Proceedings of the 37th IEEE International Performance Computing and Communications Conference, 2018

2017
A Lightweight Integrity Protection Scheme for Fast Communications in Smart Grid.
Proceedings of the 14th International Joint Conference on e-Business and Telecommunications (ICETE 2017), 2017

2016
On the Security of Permutation-Only Image Encryption Schemes.
IEEE Trans. Inf. Forensics Secur., 2016

Comments on an image encryption scheme based on a chaotic Tent map.
CoRR, 2016

2015
A 3D Object Encryption Scheme Which Maintains Dimensional and Spatial Stability.
IEEE Trans. Inf. Forensics Secur., 2015

Preserving the confidentiality of digital images using a chaotic encryption scheme.
Int. J. Electron. Secur. Digit. Forensics, 2015

A Secure Lightweight Texture Encryption Scheme.
Proceedings of the Image and Video Technology - PSIVT 2015 Workshops, 2015

2014
Comments on the security of "Diffusion-substitution based gray image encryption" scheme.
Digit. Signal Process., 2014

2013
On the Feasibility and Performance of Pass-Thought Authentication Systems.
Proceedings of the Fourth International Conference on Emerging Security Technologies, 2013

2012
Image encryption using HC-128 and HC-256 stream ciphers.
Int. J. Electron. Secur. Digit. Forensics, 2012

2011
Image Encryption Using Chaos and Block Cipher.
Comput. Inf. Sci., 2011


  Loading...