Alireza Jolfaei

According to our database1, Alireza Jolfaei authored at least 61 papers between 2011 and 2021.

Collaborative distances:



In proceedings 
PhD thesis 


Online presence:



Leveraging Energy Function Virtualization With Game Theory for Fault-Tolerant Smart Grid.
IEEE Trans. Ind. Informatics, 2021

Modeling of Human Cognition in Consensus Agreement on Social Media and Its Implications for Smarter Manufacturing.
IEEE Trans. Ind. Informatics, 2021

Automation of Recording in Smart Classrooms via Deep Learning and Bayesian Maximum a Posteriori Estimation of Instructor's Pose.
IEEE Trans. Ind. Informatics, 2021

A Novel Conflict Measurement in Decision-Making and Its Application in Fault Diagnosis.
IEEE Trans. Fuzzy Syst., 2021

Decentralized Opportunistic Channel Access in CRNs Using Big-Data Driven Learning Algorithm.
IEEE Trans. Emerg. Top. Comput. Intell., 2021

Closing the Loop in Feedback Driven Learning Environments Using Trust Decision Making and Utility Theory.
IEEE Trans. Emerg. Top. Comput. Intell., 2021

Hiding sensitive information in eHealth datasets.
Future Gener. Comput. Syst., 2021

Cognitive Popularity Based AI Service Sharing for Software-Defined Information-Centric Networks.
IEEE Trans. Netw. Sci. Eng., 2020

Binary cuckoo search metaheuristic-based supercomputing framework for human behavior analysis in smart home.
J. Supercomput., 2020

Intelligent robust control for cyber-physical systems of rotary gantry type under denial of service attack.
J. Supercomput., 2020

Dynamic clustering method for imbalanced learning based on AdaBoost.
J. Supercomput., 2020

Securing smart vehicles from relay attacks using machine learning.
J. Supercomput., 2020

A Distributed and Anonymous Data Collection Framework Based on Multilevel Edge Computing Architecture.
IEEE Trans. Ind. Informatics, 2020

Artificial Intelligence for Detection, Estimation, and Compensation of Malicious Attacks in Nonlinear Cyber-Physical Systems and Industrial IoT.
IEEE Trans. Ind. Informatics, 2020

A Novel Spectrum Sharing Scheme Using Dynamic Long Short-Term Memory With CP-OFDMA in 5G Networks.
IEEE Trans. Cogn. Commun. Netw., 2020

Elliptic Curve Cryptography Point Multiplication Core for Hardware Security Module.
IEEE Trans. Computers, 2020

Real-time monitoring and operation of microgrid using distributed cloud-fog architecture.
J. Parallel Distributed Comput., 2020

An efficient parallel genetic algorithm solution for vehicle routing problem in cloud implementation of the intelligent transportation systems.
J. Cloud Comput., 2020

On the Lifetime of Asynchronous Software-Defined Wireless Sensor Networks.
IEEE Internet Things J., 2020

Learning-Based Context-Aware Resource Allocation for Edge-Computing-Empowered Industrial IoT.
IEEE Internet Things J., 2020

Integrating NFV and ICN for Advanced Driver-Assistance Systems.
IEEE Internet Things J., 2020

Guest Editorial Special Issue on Privacy and Security in Distributed Edge Computing and Evolving IoT.
IEEE Internet Things J., 2020

Vulnerability Modelling for Hybrid Industrial Control System Networks.
J. Grid Comput., 2020

Detection of Anomalies and Faults in Industrial IoT Systems by Data Mining: Study of CHRIST Osmotron Water Purification System.
CoRR, 2020

A Computationally Intelligent Hierarchical Authentication and Key Establishment Framework for Internet of Things.
CoRR, 2020

On the Security of Networked Control Systems in Smart Vehicle and its Adaptive Cruise Control.
CoRR, 2020

EEG-based Brain-Computer Interfaces (BCIs): A Survey of Recent Studies on Signal Sensing Technologies and Computational Intelligence Approaches and their Applications.
CoRR, 2020

Resource allocation solution for sensor networks using improved chaotic firefly algorithm in IoT environment.
Comput. Commun., 2020

An energy-aware drone trajectory planning scheme for terrestrial sensors localization.
Comput. Commun., 2020

Security analysis of indistinguishable obfuscation for internet of medical things applications.
Comput. Commun., 2020

Efficient resource management and workload allocation in fog-cloud computing paradigm in IoT using learning classifier systems.
Comput. Commun., 2020

Task Offloading Strategy Based on Reinforcement Learning Computing in Edge Computing Architecture of Internet of Vehicles.
IEEE Access, 2020

A Low-Complexity Equalizer for Video Broadcasting in Cyber-Physical Social Systems Through Handheld Mobile Devices.
IEEE Access, 2020

A Systematic Review on Clone Node Detection in Static Wireless Sensor Networks.
IEEE Access, 2020

Attacks on Self-Driving Cars and Their Countermeasures: A Survey.
IEEE Access, 2020

Security Challenges and Solutions for 5G HetNet.
Proceedings of the 19th IEEE International Conference on Trust, 2020

A dynamic deep trust prediction approach for online social networks.
Proceedings of the MoMM '20: The 18th International Conference on Advances in Mobile Computing and Multimedia, Chiang Mai, Thailand, November 30, 2020

Autonomous detection of malicious events using machine learning models in drone networks.
Proceedings of the DroneCom '20: Proceedings of the 2nd ACM MobiCom Workshop on Drone Assisted Wireless Communications for 5G and Beyond, 2020

Blockchain Technology and Neural Networks for the Internet of Medical Things.
Proceedings of the 39th IEEE Conference on Computer Communications, 2020

A lightweight integrity protection scheme for low latency smart grid applications.
Comput. Secur., 2019

A Face Emotion Recognition Method Using Convolutional Neural Network and Image Edge Computing.
IEEE Access, 2019

Secure Data Streaming to Untrusted Road Side Units in Intelligent Transportation System.
Proceedings of the 18th IEEE International Conference On Trust, 2019

Differentially Private Streaming to Untrusted Edge Servers in Intelligent Transportation System.
Proceedings of the 18th IEEE International Conference On Trust, 2019

Vulnerability Modelling for Hybrid IT Systems.
Proceedings of the IEEE International Conference on Industrial Technology, 2019

Security Hardening of Implantable Cardioverter Defibrillators.
Proceedings of the IEEE International Conference on Industrial Technology, 2019

Detection and Compensation of Covert Service-Degrading Intrusions in Cyber Physical Systems through Intelligent Adaptive Control.
Proceedings of the IEEE International Conference on Industrial Technology, 2019

Privacy and Security of Connected Vehicles in Intelligent Transportation System.
Proceedings of the 49th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2019

Ransomware Triage Using Deep Learning: Twitter as a Case Study.
Proceedings of the Cybersecurity and Cyberforensics Conference, 2019

Cybersecurity Indexes for eHealth.
Proceedings of the Australasian Computer Science Week Multiconference, 2019

Secure Passive Keyless Entry and Start System Using Machine Learning.
Proceedings of the Security, Privacy, and Anonymity in Computation, Communication, and Storage, 2018

Data Exchange in Delay Tolerant Networks using Joint Inter- and Intra-Flow Network Coding.
Proceedings of the 37th IEEE International Performance Computing and Communications Conference, 2018

A Lightweight Integrity Protection Scheme for Fast Communications in Smart Grid.
Proceedings of the 14th International Joint Conference on e-Business and Telecommunications (ICETE 2017), 2017

On the Security of Permutation-Only Image Encryption Schemes.
IEEE Trans. Inf. Forensics Secur., 2016

Comments on an image encryption scheme based on a chaotic Tent map.
CoRR, 2016

A 3D Object Encryption Scheme Which Maintains Dimensional and Spatial Stability.
IEEE Trans. Inf. Forensics Secur., 2015

Preserving the confidentiality of digital images using a chaotic encryption scheme.
Int. J. Electron. Secur. Digit. Forensics, 2015

A Secure Lightweight Texture Encryption Scheme.
Proceedings of the Image and Video Technology - PSIVT 2015 Workshops, 2015

Comments on the security of "Diffusion-substitution based gray image encryption" scheme.
Digit. Signal Process., 2014

On the Feasibility and Performance of Pass-Thought Authentication Systems.
Proceedings of the Fourth International Conference on Emerging Security Technologies, 2013

Image encryption using HC-128 and HC-256 stream ciphers.
Int. J. Electron. Secur. Digit. Forensics, 2012

Image Encryption Using Chaos and Block Cipher.
Comput. Inf. Sci., 2011