Mohsen Rezvani

According to our database1, Mohsen Rezvani authored at least 36 papers between 2002 and 2022.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.



In proceedings 
PhD thesis 




Truss decomposition using triangle graphs.
Soft Comput., 2022

A Deep Learning Approach for Botnet Detection Using Raw Network Traffic Data.
J. Netw. Syst. Manag., 2022

ResBCDU-Net: A Deep Learning Framework for Lung CT Image Segmentation.
Sensors, 2021

YAICD: Yet Another IMSI Catcher Detector in GSM.
Secur. Commun. Networks, 2021

A New Method of Coding for Steganography Based on LSB Matching Revisited.
Secur. Commun. Networks, 2021

A Reinforcement Learning-Based Configuring Approach in Next-Generation Wireless Networks Using Software-Defined Metasurface.
Secur. Commun. Networks, 2021

Lung CT Image Segmentation Using Reinforcement Learning.
Int. J. Artif. Intell. Tools, 2021

A Novel Wireless Network-on-Chip Architecture for Multicore Systems.
Proceedings of the 26th International Computer Conference, Computer Society of Iran, 2021

A Randomized Reputation System in the Presence of Unfair Ratings.
ACM Trans. Manag. Inf. Syst., 2020

XACBench: a XACML policy benchmark.
Soft Comput., 2020

Broadcast Complexity and Adaptive Adversaries in Verifiable Secret Sharing.
Secur. Commun. Networks, 2020

ASCRClu: an adaptive subspace combination and reduction algorithm for clustering of high-dimensional data.
Pattern Anal. Appl., 2020

Scalable THz Network-On-Chip Architecture for Multichip Systems.
J. Comput. Networks Commun., 2020

Deep recurrent-convolutional neural network for classification of simultaneous EEG-fNIRS signals.
IET Signal Process., 2020

Printed Persian OCR system using deep learning.
IET Image Process., 2020

Spatio-temporal deep learning for EEG-fNIRS brain computer interface.
Proceedings of the 42nd Annual International Conference of the IEEE Engineering in Medicine & Biology Society, 2020

Routing-Aware and Malicious Node Detection in a Concealed Data Aggregation for WSNs.
ACM Trans. Sens. Networks, 2019

Analyzing XACML policies using answer set programming.
Int. J. Inf. Sec., 2019

Light Weight Write Mechanism for Cloud Data.
IEEE Trans. Parallel Distributed Syst., 2018

A Provenance-Aware Multi-dimensional Reputation System for Online Rating Systems.
ACM Trans. Internet Techn., 2018

Subspace Clustering for High-Dimensional Data Using Cluster Structure Similarity.
Int. J. Intell. Inf. Technol., 2018

A Robust and Fast Reputation System for Online Rating Systems.
Proceedings of the Web Information Systems Engineering - WISE 2017, 2017

Anomaly-free policy composition in software-defined networks.
Proceedings of the 2016 IFIP Networking Conference, 2016

Trust-Based Data Aggregation for WSNs in the Presence of Faults and Collusion Attacks.
PhD thesis, 2015

Interdependent Security Risk Analysis of Hosts and Flows.
IEEE Trans. Inf. Forensics Secur., 2015

Secure Data Aggregation Technique for Wireless Sensor Networks in the Presence of Collusion Attacks.
IEEE Trans. Dependable Secur. Comput., 2015

An Iterative Algorithm for Reputation Aggregation in Multi-dimensional and Multinomial Rating Systems.
Proceedings of the ICT Systems Security and Privacy Protection, 2015

Method for providing secure and private fine-grained access to outsourced data.
Proceedings of the 40th IEEE Conference on Local Computer Networks, 2015

A trust assessment framework for streaming data in WSNs using iterative filtering.
Proceedings of the Tenth IEEE International Conference on Intelligent Sensors, 2015

A Collaborative Reputation System Based on Credibility Propagation in WSNs.
Proceedings of the 21st IEEE International Conference on Parallel and Distributed Systems, 2015

Provenance-aware security risk analysis for hosts and network flows.
Proceedings of the 2014 IEEE Network Operations and Management Symposium, 2014

MalwareMonitor: An SDN-based Framework for Securing Large Networks.
Proceedings of the 2014 CoNEXT on Student Workshop, 2014

A robust iterative filtering technique for wireless sensor networks in the presence of malicious attacks.
Proceedings of the 11th ACM Conference on Embedded Network Sensor Systems, 2013

Iterative Security Risk Analysis for Network Flows Based on Provenance and Interdependency.
Proceedings of the IEEE International Conference on Distributed Computing in Sensor Systems, 2013

Specification of channel codes types using the PSD and histogram attributes of the received signal.
Proceedings of the Fifth International Workshop on Signal Design and its Applications in Communications, 2011

Specification and Verification of Security Policies in Firewalls.
Proceedings of the EurAsia-ICT 2002: Information and Communication Technology, 2002