Sajjad Dadkhah

Orcid: 0000-0002-5582-0255

According to our database1, Sajjad Dadkhah authored at least 33 papers between 2014 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Multimodal Fake News Analysis Based on Image-Text Similarity.
IEEE Trans. Comput. Soc. Syst., February, 2024

Transferability of Machine Learning Algorithm for IoT Device Profiling and Identification.
IEEE Internet Things J., January, 2024

A review of Machine Learning (ML)-based IoT security in healthcare: A dataset perspective.
Comput. Commun., January, 2024

2023
CICIoT2023: A Real-Time Dataset and Benchmark for Large-Scale Attacks in IoT Environment.
Sensors, July, 2023

IoT Zigbee device security: A comprehensive review.
Internet Things, July, 2023

Security issues in Internet of Vehicles (IoV): A comprehensive survey.
Internet Things, July, 2023

Internet of Things (IoT) security dataset evolution: Challenges and future directions.
Internet Things, July, 2023

UCreDiSSiT: User Credibility Measurement incorporating Domain interest, Semantics in Social interactions, and Temporal factor.
Proceedings of the 20th Annual International Conference on Privacy, Security and Trust, 2023

Human-Centric Machine Learning: The Role of Users in the Development of IoT Device Identification and Vulnerability Assessment.
Proceedings of the HCI for Cybersecurity, Privacy and Trust, 2023

ImageFed: Practical Privacy Preserving Intrusion Detection System for In-Vehicle CAN Bus Protocol.
Proceedings of the 9th Intl Conference on Big Data Security on Cloud, 2023

2022
A Survey on IoT Profiling, Fingerprinting, and Identification.
ACM Trans. Internet Things, 2022

An entity matching-based image topic verification framework for online fact-checking.
Int. J. Multim. Intell. Secur., 2022

Data breach: analysis, countermeasures and challenges.
Int. J. Inf. Comput. Secur., 2022

Collaborative DDoS Detection in Distributed Multi-Tenant IoT using Federated Learning.
Proceedings of the 19th Annual International Conference on Privacy, Security & Trust, 2022

Towards the Development of a Realistic Multidimensional IoT Profiling Dataset.
Proceedings of the 19th Annual International Conference on Privacy, Security & Trust, 2022

Threshold based Technique to Detect Anomalies using Log Files.
Proceedings of the ICMLT 2022: 7th International Conference on Machine Learning Technologies, Rome, Italy, March 11, 2022

Classification and Analysis of Adversarial Machine Learning Attacks in IoT: a Label Flipping Attack Case Study.
Proceedings of the 32nd Conference of Open Innovations Association, 2022

2021
Robust Black-box Watermarking for Deep NeuralNetwork using Inverse Document Frequency.
CoRR, 2021

A real-time hostile activities analyses and detection system.
Appl. Soft Comput., 2021

Behavioural Monitoring and Security Profiling in the Internet of Things (IoT).
Proceedings of the 2021 IEEE 23rd Int Conf on High Performance Computing & Communications; 7th Int Conf on Data Science & Systems; 19th Int Conf on Smart City; 7th Int Conf on Dependability in Sensor, 2021

Robust Black-box Watermarking for Deep Neural Network using Inverse Document Frequency.
Proceedings of the IEEE Intl Conf on Dependable, 2021

A feature exploration approach for IoT attack type classification.
Proceedings of the IEEE Intl Conf on Dependable, 2021

Verification Based Scheme to Restrict IoT Attacks.
Proceedings of the BDCAT '21: 2021 IEEE/ACM 8th International Conference on Big Data Computing, Applications and Technologies, Leicester, United Kingdom, December 6, 2021

2019
Blockchain Scheme Based on Evolutionary Proof of Work.
Proceedings of the IEEE Congress on Evolutionary Computation, 2019

2018
State of the art in passive digital image forgery detection: copy-move image forgery.
Pattern Anal. Appl., 2018

Bad Ai: Investigating the Effect of Half-Toning Techniques on Unwanted Face Detection Systems.
Proceedings of the 9th IFIP International Conference on New Technologies, 2018

Correction to: Two-Factor Blockchain for Traceability Cacao Supply Chain.
Proceedings of the Advances in Intelligent Networking and Collaborative Systems, 2018

Two-Factor Blockchain for Traceability Cacao Supply Chain.
Proceedings of the Advances in Intelligent Networking and Collaborative Systems, 2018

2017
An efficient ward-based copy-move forgery detection method for digital image forensic.
Proceedings of the 2017 International Conference on Image and Vision Computing New Zealand, 2017

Electromagnetismlike Mechanism Descriptor with Fourier Transform for a Passive Copy-move Forgery Detection in Digital Image Forensics.
Proceedings of the 6th International Conference on Pattern Recognition Applications and Methods, 2017

2014
Efficient Image Authentication and Tamper Localization Algorithm Using Active Watermarking.
Proceedings of the Bio-inspiring Cyber Security and Cloud Services: Trends and Innovations, 2014

An effective SVD-based image tampering detection and self-recovery using active watermarking.
Signal Process. Image Commun., 2014

An Efficient Image Self-recovery and Tamper Detection Using Fragile Watermarking.
Proceedings of the Image Analysis and Recognition - 11th International Conference, 2014


  Loading...