Reza M. Parizi

Affiliations:
  • Kennesaw State University Marietta, Department of Software Engineering and Game Development, GA, USA
  • New York Institute of Technology (former)


According to our database1, Reza M. Parizi authored at least 145 papers between 2007 and 2023.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
An optimized fuzzy deep learning model for data classification based on NSGA-II.
Neurocomputing, 2023

Blockchain Education: Current State, Limitations, Career Scope, Challenges, and Future Directions.
CoRR, 2023

Secure Intelligent Fuzzy Blockchain Framework: Effective Threat Detection in IoT Networks.
Comput. Ind., 2023

2022
Block Hunter: Federated Learning for Cyber Threat Hunting in Blockchain-Based IIoT Networks.
IEEE Trans. Ind. Informatics, 2022

Editorial: Blockchain Ecosystem - Technological and Management Opportunities and Challenges: Part II.
IEEE Trans. Engineering Management, 2022

FabricFL: Blockchain-in-the-Loop Federated Learning for Trusted Decentralized Systems.
IEEE Syst. J., 2022

An efficient packet parser architecture for software-defined 5G networks.
Phys. Commun., 2022

Federated-Learning-Based Anomaly Detection for IoT Security Attacks.
IEEE Internet Things J., 2022

Crypto Makes AI Evolve.
CoRR, 2022

Fairness in Federated Learning for Spatial-Temporal Applications.
CoRR, 2022

A Secured Certificateless Sign-encrypted Blockchain Communication for Intelligent Transport System.
Proceedings of the 10th IEEE Conference on Communications and Network Security, 2022

Performance Improvement of Blockchain-based IoT Applications using Deep Learning Techniques.
Proceedings of the Fourth International Conference on Blockchain Computing and Applications, 2022

CloudFL: A Zero-Touch Federated Learning Framework for Privacy-aware Sensor Cloud.
Proceedings of the ARES 2022: The 17th International Conference on Availability, Reliability and Security, Vienna,Austria, August 23, 2022

2021
Signcryption Based Authenticated and Key Exchange Protocol for EI-Based V2G Environment.
IEEE Trans. Smart Grid, 2021

Introduction to the Special Issue on Decentralized Blockchain Applications and Infrastructures for Next Generation Cyber-Physical Systems.
ACM Trans. Internet Techn., 2021

Blockchain-Enabled Authentication Handover With Efficient Privacy Protection in SDN-Based 5G Networks.
IEEE Trans. Netw. Sci. Eng., 2021

Classification-Based and Energy-Efficient Dynamic Task Scheduling Scheme for Virtualized Cloud Data Center.
IEEE Trans. Cloud Comput., 2021

Root causing, detecting, and fixing flaky tests: State of the art and future roadmap.
Softw. Pract. Exp., 2021

Physical layer attack identification and localization in cyber-physical grid: An ensemble deep learning based approach.
Phys. Commun., 2021

Mining of High-Utility Patterns in Big IoT-based Databases.
Mob. Networks Appl., 2021

A Deep Neural Network Combined with Radial Basis Function for Abnormality Classification.
Mob. Networks Appl., 2021

Machine learning research towards combating COVID-19: Virus detection, spread prevention, and medical assistance.
J. Biomed. Informatics, 2021

Enabling Drones in the Internet of Things With Decentralized Blockchain-Based Security.
IEEE Internet Things J., 2021

Security aspects of Internet of Things aided smart grids: A bibliometric survey.
Internet Things, 2021

A survey on internet of things security: Requirements, challenges, and solutions.
Internet Things, 2021

A survey on security and privacy of federated learning.
Future Gener. Comput. Syst., 2021

Communication Efficiency in Federated Learning: Achievements and Challenges.
CoRR, 2021

A survey of machine learning techniques in adversarial image forensics.
Comput. Secur., 2021

Multi-source fusion for weak target images in the Industrial Internet of Things.
Comput. Commun., 2021

A kangaroo-based intrusion detection system on software-defined networks.
Comput. Networks, 2021

Machine learning for network application security: Empirical evaluation and optimization.
Comput. Electr. Eng., 2021

Federated learning for drone authentication.
Ad Hoc Networks, 2021

Methods for Proteogenomics Data Analysis, Challenges, and Scalability Bottlenecks: A Survey.
IEEE Access, 2021

An Ensemble Multi-View Federated Learning Intrusion Detection for IoT.
IEEE Access, 2021

Sensor Fusion for Drone Detection.
Proceedings of the 93rd IEEE Vehicular Technology Conference, 2021

Multimodal Machine Learning for Pedestrian Detection.
Proceedings of the 93rd IEEE Vehicular Technology Conference, 2021

A Deep Learning Model for Threat Hunting in Ethereum Blockchain.
Proceedings of the 20th IEEE International Conference on Trust, 2021

Detecting Network Attacks using Federated Learning for IoT Devices.
Proceedings of the 29th IEEE International Conference on Network Protocols, 2021

An Efficient DeFi-based Data Warehousing Approach in Supply Chain Finance.
Proceedings of the ICFNDS 2021: The 5th International Conference on Future Networks & Distributed Systems, Dubai United Arab Emirates, December 15, 2021

Introduction to the Minitrack on Decentralized Federated Learning: Applications, Solutions, and Challenges.
Proceedings of the 54th Hawaii International Conference on System Sciences, 2021

A Machine Learning-based SDN Controller Framework for Drone Management.
Proceedings of the IEEE Globecom 2021 Workshops, Madrid, Spain, December 7-11, 2021, 2021

Secure AI and Blockchain-enabled Framework in Smart Vehicular Networks.
Proceedings of the IEEE Globecom 2021 Workshops, Madrid, Spain, December 7-11, 2021, 2021

2020
Secure Blockchain-Based Traffic Load Balancing Using Edge Computing and Reinforcement Learning.
Proceedings of the Blockchain Cybersecurity, Trust and Privacy, 2020

The Future of Blockchain Technology in Healthcare Internet of Things Security.
Proceedings of the Blockchain Cybersecurity, Trust and Privacy, 2020

Public Blockchains Scalability: An Examination of Sharding and Segregated Witness.
Proceedings of the Blockchain Cybersecurity, Trust and Privacy, 2020

Blockchain Applications in Power Systems: A Bibliometric Analysis.
Proceedings of the Blockchain Cybersecurity, Trust and Privacy, 2020

Blockchain in Cybersecurity Realm: An Overview.
Proceedings of the Blockchain Cybersecurity, Trust and Privacy, 2020

Blockchain-Based Certification for Education, Employment, and Skill with Incentive Mechanism.
Proceedings of the Blockchain Cybersecurity, Trust and Privacy, 2020

A Systematic Literature Review of Integration of Blockchain and Artificial Intelligence.
Proceedings of the Blockchain Cybersecurity, Trust and Privacy, 2020

Immutable and Secure IP Address Protection Using Blockchain.
Proceedings of the Blockchain Cybersecurity, Trust and Privacy, 2020

A multiview learning method for malware threat hunting: windows, IoT and android as case studies.
World Wide Web, 2020

An Energy-Efficient SDN Controller Architecture for IoT Networks With Blockchain-Based Security.
IEEE Trans. Serv. Comput., 2020

Decentralized Authentication of Distributed Patients in Hospital Networks Using Blockchain.
IEEE J. Biomed. Health Informatics, 2020

An Enhanced Stacked LSTM Method With No Random Initialization for Malware Threat Hunting in Safety and Time-Critical Systems.
IEEE Trans. Emerg. Top. Comput. Intell., 2020

Editorial: Blockchain Ecosystem - Technological and Management Opportunities and Challenges.
IEEE Trans. Engineering Management, 2020

A Provably Secure Two-Factor Authentication Scheme for USB Storage Devices.
IEEE Trans. Consumer Electron., 2020

AI4SAFE-IoT: an AI-powered secure architecture for edge layer of Internet of things.
Neural Comput. Appl., 2020

Cost optimization of secure routing with untrusted devices in software defined networking.
J. Parallel Distributed Comput., 2020

A high-performance framework for a network programmable packet processor using P4 and FPGA.
J. Netw. Comput. Appl., 2020

Sidechain technologies in blockchain networks: An examination and state-of-the-art review.
J. Netw. Comput. Appl., 2020

Internet of Things for Current COVID-19 and Future Pandemics: an Exploratory Study.
J. Heal. Informatics Res., 2020

An incentive-aware blockchain-based solution for internet of fake media things.
Inf. Process. Manag., 2020

An Ensemble of Deep Recurrent Neural Networks for Detecting IoT Cyber Attacks Using Network Traffic.
IEEE Internet Things J., 2020

Detecting Cryptomining Malware: a Deep Learning Approach for Static and Dynamic Analysis.
J. Grid Comput., 2020

A systematic literature review of blockchain cyber security.
Digit. Commun. Networks, 2020

A Federated Approach for Fine-Grained Classification of Fashion Apparel.
CoRR, 2020

On Security Measures for Containerized Applications Imaged with Docker.
CoRR, 2020

P4-to-blockchain: A secure blockchain-enabled packet parser for software defined networking.
Comput. Secur., 2020

Blockchain smart contracts formalization: Approaches and challenges to address vulnerabilities.
Comput. Secur., 2020

An improved two-hidden-layer extreme learning machine for malware hunting.
Comput. Secur., 2020

VANETomo: A congestion identification and control scheme in connected vehicles using network tomography.
Comput. Commun., 2020

Green communication in IoT networks using a hybrid optimization algorithm.
Comput. Commun., 2020

Cryptocurrency malware hunting: A deep Recurrent Neural Network approach.
Appl. Soft Comput., 2020

MVFCC: A Multi-View Fuzzy Consensus Clustering Model for Malware Threat Attribution.
IEEE Access, 2020

Federated Learning: A Survey on Enabling Technologies, Protocols, and Applications.
IEEE Access, 2020

An Ensemble Deep Learning-Based Cyber-Attack Detection in Industrial Control System.
IEEE Access, 2020

SLPoW: Secure and Low Latency Proof of Work Protocol for Blockchain in Green IoT Networks.
Proceedings of the 91st IEEE Vehicular Technology Conference, 2020

Budget Feasible Roadside Unit Allocation Mechanism in Vehicular Ad-Hoc Networks.
Proceedings of the 91st IEEE Vehicular Technology Conference, 2020

Blockchain Technology and Neural Networks for the Internet of Medical Things.
Proceedings of the 39th IEEE Conference on Computer Communications, 2020

Deep Neural Networks for Detecting Real Emotions Using Biofeedback and Voice.
Proceedings of the Pattern Recognition. ICPR International Workshops and Challenges, 2020

Making Sense of Blockchain for AI Deepfakes Technology.
Proceedings of the IEEE Globecom Workshops, 2020

An Empirical Evaluation of AI Deep Explainable Tools.
Proceedings of the IEEE Globecom Workshops, 2020

A Deep Recurrent Neural Network to Support Guidelines and Decision Making of Social Distancing.
Proceedings of the 2020 IEEE International Conference on Big Data (IEEE BigData 2020), 2020

Comparing Performance of Malware Classification on Automated Stacking.
Proceedings of the 2020 ACM Southeast Conference, 2020

AI and Security of Critical Infrastructure.
Proceedings of the Handbook of Big Data Privacy., 2020

A Hybrid Deep Generative Local Metric Learning Method for Intrusion Detection.
Proceedings of the Handbook of Big Data Privacy., 2020

A Comparison of State-of-the-Art Machine Learning Models for OpCode-Based IoT Malware Detection.
Proceedings of the Handbook of Big Data Privacy., 2020

Malware Elimination Impact on Dynamic Analysis: An Experimental Machine Learning Approach.
Proceedings of the Handbook of Big Data Privacy., 2020

Big-Data and Cyber-Physical Systems in Healthcare: Challenges and Opportunities.
Proceedings of the Handbook of Big Data Privacy., 2020

RAT Hunter: Building Robust Models for Detecting Remote Access Trojans Based on Optimum Hybrid Features.
Proceedings of the Handbook of Big Data Privacy., 2020

Active Spectral Botnet Detection Based on Eigenvalue Weighting.
Proceedings of the Handbook of Big Data Privacy., 2020

A Survey on Application of Big Data in Fin Tech Banking Security and Privacy.
Proceedings of the Handbook of Big Data Privacy., 2020

Industrial Big Data Analytics: Challenges and Opportunities.
Proceedings of the Handbook of Big Data Privacy., 2020

2019
Fuzzy pattern tree for edge malware detection and categorization in IoT.
J. Syst. Archit., 2019

Fog data analytics: A taxonomy and process model.
J. Netw. Comput. Appl., 2019

Cyber Kill Chain-Based Taxonomy of Advanced Persistent Threat Actors: Analogy of Tactics, Techniques, and Procedures.
J. Inf. Process. Syst., 2019

Blockchain Applications in Power Systems: A Bibliometric Analysis.
CoRR, 2019

A Deep and Scalable Unsupervised Machine Learning System for Cyber-Attack Detection in Large-Scale Smart Grids.
IEEE Access, 2019

Blockchain Applications for Industry 4.0 and Industrial IoT: A Review.
IEEE Access, 2019

Data Protection with SMSD Labware.
Proceedings of the 50th ACM Technical Symposium on Computer Science Education, 2019

Guideline-Based Approach for IoT Home Application Development.
Proceedings of the 2019 International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, 2019

Data Sharing and Privacy for Patient IoT Devices Using Blockchain.
Proceedings of the Smart City and Informatization - 7th International Conference, 2019

A Hybrid RSA Algorithm in Support of IoT Greenhouse Applications.
Proceedings of the IEEE International Conference on Industrial Internet, 2019

Energy Efficient Decentralized Authentication in Internet of Underwater Things Using Blockchain.
Proceedings of the 2019 IEEE Globecom Workshops, Waikoloa, HI, USA, December 9-13, 2019, 2019

Integrating Privacy Enhancing Techniques into Blockchains Using Sidechains.
Proceedings of the 2019 IEEE Canadian Conference of Electrical and Computer Engineering, 2019

A Blockchain-based Framework for Detecting Malicious Mobile Applications in App Stores.
Proceedings of the 2019 IEEE Canadian Conference of Electrical and Computer Engineering, 2019

BlockIPFS - Blockchain-Enabled Interplanetary File System for Forensic and Trusted Data Traceability.
Proceedings of the IEEE International Conference on Blockchain, 2019

E^2 C-Chain: A Two-Stage Incentive Education Employment and Skill Certification Blockchain.
Proceedings of the IEEE International Conference on Blockchain, 2019

Private Cloud Storage Forensics: Seafile as a Case Study.
Proceedings of the Handbook of Big Data and IoT Security, 2019

Forensic Investigation of Cross Platform Massively Multiplayer Online Games: Minecraft as a Case Study.
Proceedings of the Handbook of Big Data and IoT Security, 2019

Security in Online Games: Current Implementations and Challenges.
Proceedings of the Handbook of Big Data and IoT Security, 2019

Distributed Filesystem Forensics: Ceph as a Case Study.
Proceedings of the Handbook of Big Data and IoT Security, 2019

A Cyber Kill Chain Based Analysis of Remote Access Trojans.
Proceedings of the Handbook of Big Data and IoT Security, 2019

Big Data Forensics: Hadoop Distributed File Systems as a Case Study.
Proceedings of the Handbook of Big Data and IoT Security, 2019

A layered security architecture based on cyber kill chain against advanced persistent threats.
Proceedings of the Security and Privacy for Big Data, Cloud Computing and Applications, 2019

2018
Component-Driven Development in Modern Virtual Assistants: A Mapping Study.
J. Softw., 2018

Microservices as an Evolutionary Architecture of Component-Based Development: A Think-aloud Study.
CoRR, 2018

Towards Better Ocular Recognition for Secure Real-World Applications.
Proceedings of the 17th IEEE International Conference On Trust, 2018

Smart Contract Programming Languages on Blockchains: An Empirical Evaluation of Usability and Security.
Proceedings of the Blockchain - ICBC 2018, 2018

Bias-aware guidelines and fairness-preserving Taxonomy in software engineering education.
Proceedings of the IEEE Frontiers in Education Conference, 2018

Authentic Learning Secure Software Development (SSD) in Computing Education.
Proceedings of the IEEE Frontiers in Education Conference, 2018

Measuring Team Members' Contributions in Software Engineering Projects using Git-driven Technology.
Proceedings of the IEEE Frontiers in Education Conference, 2018

On the Understanding of Gamification in Blockchain Systems.
Proceedings of the 6th International Conference on Future Internet of Things and Cloud Workshops, 2018

OWASP Risk Analysis Driven Security Requirements Specification for Secure Android Mobile Software Development.
Proceedings of the IEEE Conference on Dependable and Secure Computing, 2018

Benchmark Requirements for Assessing Software Security Vulnerability Testing Tools.
Proceedings of the 2018 IEEE 42nd Annual Computer Software and Applications Conference, 2018

CyberPDF: Smart and Secure Coordinate-based Automated Health PDF Data Batch Extraction.
Proceedings of the Third IEEE/ACM International Conference on Connected Health: Applications, 2018

Empirical vulnerability analysis of automated smart contracts security testing on blockchains.
Proceedings of the 28th Annual International Conference on Computer Science and Software Engineering, 2018

2017
RAMBUTANS: automatic AOP-specific test generation tool.
Int. J. Softw. Tools Technol. Transf., 2017

Sustainability in intelligent building environments using weighted priority scheduling algorithm.
J. Ambient Intell. Smart Environ., 2017

Secure and quality-of-service-supported service-oriented architecture for mobile cloud handoff process.
Comput. Secur., 2017

2016
Functional and non-functional requirements prioritization: empirical evaluation of IPA, AHP-based, and HAM-based approaches.
Soft Comput., 2016

Cost optimization approaches for scientific workflow scheduling in cloud and grid computing: A review, classifications, and open issues.
J. Syst. Softw., 2016

On the gamification of human-centric traceability tasks in software testing and coding.
Proceedings of the 14th IEEE International Conference on Software Engineering Research, 2016

2015
Automated test generation technique for aspectual features in AspectJ.
Inf. Softw. Technol., 2015

The impact of inadequate and dysfunctional training on Agile transformation process: A Grounded Theory study.
Inf. Softw. Technol., 2015

A test-to-code traceability method using .NET custom attributes.
Proceedings of the 2015 Conference on research in adaptive and convergent systems, 2015

Towards Gamification in Software Traceability: Between Test and Code Artifacts.
Proceedings of the ICSOFT-EA 2015, 2015

2014
Achievements and Challenges in State-of-the-Art Software Traceability Between Test and Code Artifacts.
IEEE Trans. Reliab., 2014

2013
Aspect-Oriented Program Testing: An Annotated Bibliography.
J. Softw., 2013

On the Current Measurement Practices in Agile Software Development
CoRR, 2013

2011
Empirical evaluation of the fault detection effectiveness and test effort efficiency of the automated AOP testing approaches.
Inf. Softw. Technol., 2011

2010
Towards Automated Monitoring and Forecasting of Probabilistic Quality Properties in Open Source Software (OSS): A Striking Hybrid Approach.
Proceedings of the Eighth ACIS International Conference on Software Engineering Research, 2010

2009
Towards a Framework for Automated Random Testing of Aspect-Oriented Programs.
Proceedings of the 18th International Conference on Software Engineering and Data Engineering (SEDE-2009), 2009

2008
An Ensemble of Complexity Metrics for BPEL Web Processes.
Proceedings of the Ninth ACIS International Conference on Software Engineering, 2008

2007
A Survey on Aspect-Oriented Testing Approaches.
Proceedings of the Selected Papers of the Fifth International Conference on, 2007


  Loading...