Mohammad Ali Akhaee

Orcid: 0000-0003-3753-5618

According to our database1, Mohammad Ali Akhaee authored at least 87 papers between 2006 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
A blockchain-based privacy-preserving anti-collusion data auction mechanism with an off-chain approach.
J. Supercomput., April, 2024

Reversible data hiding in encrypted images using histogram modification and MSBs integration.
Multim. Tools Appl., January, 2024

JABS: A Blockchain Simulator for Researching Consensus Algorithms.
IEEE Trans. Netw. Sci. Eng., 2024

Face manifold: manifold learning for synthetic face generation.
Multim. Tools Appl., 2024

Brand Visibility in Packaging: A Deep Learning Approach for Logo Detection, Saliency-Map Prediction, and Logo Placement Analysis.
CoRR, 2024

2023
A scalable decentralized privacy-preserving e-voting system based on zero-knowledge off-chain computations.
J. Inf. Secur. Appl., December, 2023

Analysis of IOTA Tangle Stability in High Transaction Rates.
ISC Int. J. Inf. Secur., July, 2023

Multimodal movie genre classification using recurrent neural network.
Multim. Tools Appl., February, 2023

Breast Cancer Detection with an Ensemble of Deep Learning Networks Using a Consensus-Adaptive Weighting Method.
J. Imaging, 2023

2022
Compression of EMG Signals Using Deep Convolutional Autoencoders.
IEEE J. Biomed. Health Informatics, 2022

Keyword spotting in continuous speech using convolutional neural network.
Speech Commun., 2022

Fast and accurate spectral clustering via augmented Lagrangian.
J. Comput. Sci., 2022

A Novel Framework for Dataset Generation for profiling Disassembly attacks using Side-Channel Leakages and Deep Neural Networks.
CoRR, 2022

Brain-inspired feedback for spatial frequency aware artificial networks.
Proceedings of the 56th Asilomar Conference on Signals, Systems, and Computers, ACSSC 2022, Pacific Grove, CA, USA, October 31, 2022

2021
Time-frequency analysis of keystroke dynamics for user authentication.
Future Gener. Comput. Syst., 2021

Soccer Event Detection Using Deep Learning.
CoRR, 2021

Optimum Group Pixel Matching Strategies for Image Steganography.
Proceedings of the 18th International ISC Conference on Information Security and Cryptology, 2021

Side-Channel based Disassembler for AVR Micro-Controllers using Convolutional Neural Networks.
Proceedings of the 18th International ISC Conference on Information Security and Cryptology, 2021

2020
A High-Capacity Reversible Data Hiding in Encrypted Images Employing Local Difference Predictor.
IEEE Trans. Circuits Syst. Video Technol., 2020

EfficientNet-Absolute Zero for Continuous Speech Keyword Spotting.
CoRR, 2020

Improvements on Easypaysy: The Bitcoin's Layer-2 Accounts Protocol.
Proceedings of the 17th International ISC Conference on Information Security and Cryptology, 2020

2019
Joint Compensation of Jitter Noise and Time-Shift Errors in Multichannel Sampling System.
IEEE Trans. Instrum. Meas., 2019

Blind gain invariant image watermarking using random projection approach.
Signal Process., 2019

Robust image watermarking using sample area quantization.
Multim. Tools Appl., 2019

Improved ensemble growing method for steganalysis of digital media.
Multim. Tools Appl., 2019

A fast video watermarking algorithm using dual tree complex wavelet transform.
Multim. Tools Appl., 2019

2018
Source-channel coding-based watermarking for self-embedding of JPEG images.
Signal Process. Image Commun., 2018

A multiplicative video watermarking robust to H.264/AVC compression standard.
Signal Process. Image Commun., 2018

Improvement on Bitcoin's Verifiable Public Randomness with Semi-Trusted Delegates.
Proceedings of the 9th International Symposium on Telecommunications, 2018

Robust Stochastic Maximum Likelihood Algorithm for DOA Estimation of Acoustic Sources in the Spherical Harmonic Domain.
Proceedings of the 26th European Signal Processing Conference, 2018

Application Detection in Anonymous Communication Networks.
Proceedings of the Central European Cybersecurity Conference 2018, 2018

2017
A joint source-channel coding approach to digital image self-recovery.
Signal Image Video Process., 2017

Analytic model for network resource management between ISPs and users.
IET Networks, 2017

Utilizing Features of Aggregated Flows to Identify Botnet Network Traffic.
Proceedings of the 14th International ISC (Iranian Society of Cryptology) Conference on Information Security and Cryptology, 2017

2016
Data Hiding Robust to Mobile Communication Vocoders.
IEEE Trans. Multim., 2016

Obstacle mapping in wireless sensor networks via minimum number of measurements.
IET Signal Process., 2016

Digital video steganalysis toward spread spectrum data hiding.
IET Image Process., 2016

Covert communications through mobile voice channels.
IET Inf. Secur., 2016

Deniable Encryption based on Standard RSA with OAEP.
Proceedings of the 8th International Symposium on Telecommunications, 2016

PapiaPass: Sentence-based passwords using dependency trees.
Proceedings of the 13th International Iranian Society of Cryptology Conference on Information Security and Cryptology, 2016

Spread spectrum watermarking robust to silk vocoder using sub-optimal detectors.
Proceedings of the 13th International Iranian Society of Cryptology Conference on Information Security and Cryptology, 2016

Video watermarking in the DT-CWT domain using hyperbolic function.
Proceedings of the 13th International Iranian Society of Cryptology Conference on Information Security and Cryptology, 2016

Approximateml estimator for compensation oftiming mismatch and jitter noise in TI-ADCS.
Proceedings of the 24th European Signal Processing Conference, 2016

2015
A Source-Channel Coding Approach to Digital Image Protection and Self-Recovery.
IEEE Trans. Image Process., 2015

A Watermarking Method for Digital Speech Self-Recovery.
IEEE ACM Trans. Audio Speech Lang. Process., 2015

Images steganalysis using GARCH model for feature selection.
Signal Process. Image Commun., 2015

Vertex angle image watermarking with optimal detector.
Multim. Tools Appl., 2015

Scaling-based watermarking with universally optimum decoder.
Multim. Tools Appl., 2015

Steganalysis of JPEG images using enhanced neighbouring joint density features.
IET Image Process., 2015

Information hiding with maximum likelihood detector for correlated signals.
Digit. Signal Process., 2015

Combined classification and regression for simultaneous and proportional EMG control of wrist forces.
Proceedings of the 23rd European Signal Processing Conference, 2015

Digital image self-recovery using unequal error protection.
Proceedings of the 23rd European Signal Processing Conference, 2015

Timing mismatch compensation in TI-ADCS using Bayesian approach.
Proceedings of the 23rd European Signal Processing Conference, 2015

2014
One-third probability embedding: a new ±1 histogram compensating image least significant bit steganography scheme.
IET Image Process., 2014

Geometric modelling of the wavelet coefficients for image watermarking using optimum detector.
IET Image Process., 2014

Secure and privacy preserving keyword searching cryptography.
Proceedings of the 11th International ISC Conference on Information Security and Cryptology, 2014

Interference alignment for two-user two-hop interference X-channel with delayed and No CSIT.
Proceedings of the 6th International Congress on Ultra Modern Telecommunications and Control Systems and Workshops, 2014

Blind interference alignment for three-user multi-hop SISO interference channel.
Proceedings of the 6th International Congress on Ultra Modern Telecommunications and Control Systems and Workshops, 2014

Source-channel coding approach to generate tamper-proof images.
Proceedings of the IEEE International Conference on Acoustics, 2014

Video steganalysis of multiplicative spread spectrum steganography.
Proceedings of the 22nd European Signal Processing Conference, 2014

Performance improvement of spread spectrum additive data hiding over codec-distorted voice channels.
Proceedings of the 22nd European Signal Processing Conference, 2014

Universal image steganalysis based on GARCH model.
Proceedings of the 22nd European Signal Processing Conference, 2014

2013
Robust multiplicative video watermarking using statistical modeling.
ISC Int. J. Inf. Secur., 2013

A survey on digital data hiding schemes: principals, algorithms, and applications.
ISC Int. J. Inf. Secur., 2013

Robust image watermarking using dihedral angle based on maximum-likelihood detector.
IET Image Process., 2013

Optimum decoder for an additive video watermarking with Laplacian noise in H.264.
Proceedings of the 10th International ISC Conference on Information Security and Cryptology, 2013

2012
Improved iterative techniques to compensate for interpolation distortions.
Signal Process., 2012

2011
Blind Image Watermarking Using a Sample Projection Approach.
IEEE Trans. Inf. Forensics Secur., 2011

Robust video watermarking using maximum likelihood decoder.
Proceedings of the 19th European Signal Processing Conference, 2011

2010
Contourlet-Based Image Watermarking Using Optimum Detector in a Noisy Environment.
IEEE Trans. Image Process., 2010

Robust audio and speech watermarking using Gaussian and Laplacian modeling.
Signal Process., 2010

Improved Iterative Techniques to Compensate for Interpolation Distortions
CoRR, 2010

Compensating for distortions in interpolation of two-dimensional signals using improved iterative techniques.
Proceedings of the 17th International Conference on Telecommunications, 2010

A solution to gain attack onwatermarking systems: Logarithmic Homogeneous Rational Dither Modulation.
Proceedings of the IEEE International Conference on Acoustics, 2010

2009
Robust Scaling-Based Image Watermarking Using Maximum-Likelihood Decoder With Optimum Strength Factor.
IEEE Trans. Multim., 2009

Robust Audio Data Hiding Using Correlated Quantization With Histogram-Based Detector.
IEEE Trans. Multim., 2009

Robust Multiplicative Patchwork Method for Audio Watermarking.
IEEE Trans. Speech Audio Process., 2009

Semi-reversible quantization based data hiding using missing samples recovery technique.
Proceedings of the 2009 International Conference on Telecommunications, 2009

Distribution independent blind watermarking.
Proceedings of the International Conference on Image Processing, 2009

Information Hiding with Optimal Detector for Highly Correlated Signals.
Proceedings of IEEE International Conference on Communications, 2009

Robust Multiplicative Audio and Speech Watermarking Using Statistical Modeling.
Proceedings of IEEE International Conference on Communications, 2009

Robust Image Data Hiding Using Geometric Mean Quantization.
Proceedings of the Global Communications Conference, 2009. GLOBECOM 2009, Honolulu, Hawaii, USA, 30 November, 2009

Blind image watermarking based on sample rotation with optimal detector.
Proceedings of the 17th European Signal Processing Conference, 2009

2008
Contourlet based image watermarking using optimum detector in the noisy environment.
Proceedings of the International Conference on Image Processing, 2008

An invertible quantization based watermarking approach.
Proceedings of the IEEE International Conference on Acoustics, 2008

Robust multiplicative watermarking technique with Maximum Likelihood detector.
Proceedings of the 2008 16th European Signal Processing Conference, 2008

2006
Design of interpolation functions using iterative methods.
Proceedings of the 14th European Signal Processing Conference, 2006


  Loading...