Sajjad Dadkhah
Orcid: 0000-0002-3244-324X
  According to our database1,
  Sajjad Dadkhah
  authored at least 41 papers
  between 2014 and 2024.
  
  
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
  2024
    IEEE Trans. Comput. Soc. Syst., August, 2024
    
  
    IEEE Trans. Comput. Soc. Syst., June, 2024
    
  
    IEEE Trans. Comput. Soc. Syst., February, 2024
    
  
Transferability of Machine Learning Algorithm for IoT Device Profiling and Identification.
    
  
    IEEE Internet Things J., January, 2024
    
  
A review of Machine Learning (ML)-based IoT security in healthcare: A dataset perspective.
    
  
    Comput. Commun., January, 2024
    
  
CICIoV2024: Advancing realistic IDS approaches against DoS and spoofing attack in IoV CAN bus.
    
  
    Internet Things, 2024
    
  
    Internet Things, 2024
    
  
IoT-PRIDS: Leveraging packet representations for intrusion detection in IoT networks.
    
  
    Comput. Secur., 2024
    
  
    Proceedings of the IEEE Conference on Dependable and Secure Computing, 2024
    
  
Enhancing EV Charging Station Security Using a Multi-dimensional Dataset: CICEVSE2024.
    
  
    Proceedings of the Data and Applications Security and Privacy XXXVIII, 2024
    
  
  2023
CICIoT2023: A Real-Time Dataset and Benchmark for Large-Scale Attacks in IoT Environment.
    
  
    Sensors, July, 2023
    
  
    Internet Things, July, 2023
    
  
Internet of Things (IoT) security dataset evolution: Challenges and future directions.
    
  
    Internet Things, July, 2023
    
  
UCreDiSSiT: User Credibility Measurement incorporating Domain interest, Semantics in Social interactions, and Temporal factor.
    
  
    Proceedings of the 20th Annual International Conference on Privacy, Security and Trust, 2023
    
  
Human-Centric Machine Learning: The Role of Users in the Development of IoT Device Identification and Vulnerability Assessment.
    
  
    Proceedings of the HCI for Cybersecurity, Privacy and Trust, 2023
    
  
ImageFed: Practical Privacy Preserving Intrusion Detection System for In-Vehicle CAN Bus Protocol.
    
  
    Proceedings of the 9th Intl Conference on Big Data Security on Cloud, 2023
    
  
  2022
    ACM Trans. Internet Things, 2022
    
  
An entity matching-based image topic verification framework for online fact-checking.
    
  
    Int. J. Multim. Intell. Secur., 2022
    
  
    Int. J. Inf. Comput. Secur., 2022
    
  
Collaborative DDoS Detection in Distributed Multi-Tenant IoT using Federated Learning.
    
  
    Proceedings of the 19th Annual International Conference on Privacy, Security & Trust, 2022
    
  
    Proceedings of the 19th Annual International Conference on Privacy, Security & Trust, 2022
    
  
    Proceedings of the ICMLT 2022: 7th International Conference on Machine Learning Technologies, Rome, Italy, March 11, 2022
    
  
Classification and Analysis of Adversarial Machine Learning Attacks in IoT: a Label Flipping Attack Case Study.
    
  
    Proceedings of the 32nd Conference of Open Innovations Association, 2022
    
  
  2021
Robust Black-box Watermarking for Deep NeuralNetwork using Inverse Document Frequency.
    
  
    CoRR, 2021
    
  
    Appl. Soft Comput., 2021
    
  
    Proceedings of the 2021 IEEE 23rd Int Conf on High Performance Computing & Communications; 7th Int Conf on Data Science & Systems; 19th Int Conf on Smart City; 7th Int Conf on Dependability in Sensor, 2021
    
  
Robust Black-box Watermarking for Deep Neural Network using Inverse Document Frequency.
    
  
    Proceedings of the IEEE Intl Conf on Dependable, 2021
    
  
    Proceedings of the IEEE Intl Conf on Dependable, 2021
    
  
    Proceedings of the BDCAT '21: 2021 IEEE/ACM 8th International Conference on Big Data Computing, Applications and Technologies, Leicester, United Kingdom, December 6, 2021
    
  
  2019
    Proceedings of the IEEE Congress on Evolutionary Computation, 2019
    
  
  2018
State of the art in passive digital image forgery detection: copy-move image forgery.
    
  
    Pattern Anal. Appl., 2018
    
  
Bad Ai: Investigating the Effect of Half-Toning Techniques on Unwanted Face Detection Systems.
    
  
    Proceedings of the 9th IFIP International Conference on New Technologies, 2018
    
  
    Proceedings of the Advances in Intelligent Networking and Collaborative Systems, 2018
    
  
    Proceedings of the Advances in Intelligent Networking and Collaborative Systems, 2018
    
  
  2017
An efficient ward-based copy-move forgery detection method for digital image forensic.
    
  
    Proceedings of the 2017 International Conference on Image and Vision Computing New Zealand, 2017
    
  
Electromagnetismlike Mechanism Descriptor with Fourier Transform for a Passive Copy-move Forgery Detection in Digital Image Forensics.
    
  
    Proceedings of the 6th International Conference on Pattern Recognition Applications and Methods, 2017
    
  
  2014
Efficient Image Authentication and Tamper Localization Algorithm Using Active Watermarking.
    
  
    Proceedings of the Bio-inspiring Cyber Security and Cloud Services: Trends and Innovations, 2014
    
  
An effective SVD-based image tampering detection and self-recovery using active watermarking.
    
  
    Signal Process. Image Commun., 2014
    
  
    Proceedings of the Image Analysis and Recognition - 11th International Conference, 2014