Остановите войну!
for scientists:
default search action
Reza Javidan
- > Home > Persons > Reza Javidan
Publications
- 2023
- [j43]Hamid Reza Boveiri, Raouf Khayami, Reza Javidan, Alireza Mehdizadeh, Samaneh Abbasi:
A regularization-based deep unsupervised model for affine multimodal co-registration. Expert Syst. J. Knowl. Eng. 40(1) (2023) - [j41]Azadeh Faroughi, Reza Boostani, Hadi Tajalizadeh, Reza Javidan:
ARD-Stream: An adaptive radius density-based stream clustering. Future Gener. Comput. Syst. 149: 416-431 (2023) - [j40]Meysam Ghahramani, Hamed HaddadPajouh, Reza Javidan, Saru Kumari:
VQR: vulnerability analysis in quadratic residues-based authentication protocols. J. Ambient Intell. Humaniz. Comput. 14(6): 7559-7574 (2023) - [j38]Meysam Ghahramani, Reza Javidan:
Time dependency: an efficient biometric-based authentication for secure communication in wireless healthcare sensor networks. J. Comput. Virol. Hacking Tech. 19(2): 303-317 (2023) - 2022
- [j37]Samaneh Abbasi, Meysam Tavakoli, Hamid Reza Boveiri, Mohammad Amin Mosleh Shirazi, Raouf Khayami, Hedieh Khorasani, Reza Javidan, Alireza Mehdizadeh:
Medical image registration using unsupervised deep neural network: A scoping literature review. Biomed. Signal Process. Control. 73: 103444 (2022) - [j36]Reza Mohammadi, Reza Javidan:
EFSUTE: a novel efficient and survivable traffic engineering for software defined networks. J. Reliab. Intell. Environ. 8(3): 247-260 (2022) - [i6]Meysam Ghahramani, Rahim Taheri, Mohammad Shojafar, Reza Javidan, Shaohua Wan:
Deep Image: A precious image based deep learning method for online malware detection in IoT Environment. CoRR abs/2204.01690 (2022) - [i5]Samaneh Abbasi, Meysam Tavakoli, Hamid Reza Boveiri, Mohammad Amin Mosleh Shirazi, Raouf Khayami, Hedieh Khorasani, Reza Javidan, Alireza Mehdizadeh:
Medical image registration using unsupervised deep neural network: A scoping literature review. CoRR abs/2208.01825 (2022) - 2021
- [j35]Azadeh Faroughi, Andrea Morichetta, Luca Vassio, Flavio V. D. de Figueiredo, Marco Mellia, Reza Javidan:
Towards website domain name classification using graph based semi-supervised learning. Comput. Networks 188: 107865 (2021) - [j34]Hamid Reza Boveiri, Reza Javidan, Raouf Khayami:
An intelligent hybrid approach for task scheduling in cluster computing environments as an infrastructure for biomedical applications. Expert Syst. J. Knowl. Eng. 38(1) (2021) - [j32]Meysam Ghahramani, Reza Javidan, Mohammad Shojafar, Rahim Taheri, Mamoun Alazab, Rahim Tafazolli:
RSS: An Energy-Efficient Approach for Securing IoT Service Protocols Against the DoS Attack. IEEE Internet Things J. 8(5): 3619-3635 (2021) - [j31]Rahim Taheri, Reza Javidan, Zahra Pooranian:
Adversarial android malware detection for mobile multimedia applications in IoT environments. Multim. Tools Appl. 80(11): 16713-16729 (2021) - [j28]Meysam Ghahramani, Reza Javidan:
A Robust Anonymous Remote User Authentication Protocol for IoT Services. Wirel. Pers. Commun. 121(3): 2347-2369 (2021) - 2020
- [j27]Hamid Reza Boveiri, Raouf Khayami, Reza Javidan, Ali Reza MehdiZadeh:
Medical image registration using deep neural networks: A comprehensive review. Comput. Electr. Eng. 87: 106767 (2020) - [j26]Rahim Taheri, Reza Javidan, Mohammad Shojafar, P. Vinod, Mauro Conti:
Can machine learning model with static features be fooled: an adversarial machine learning approach. Clust. Comput. 23(4): 3233-3253 (2020) - [j25]Rahim Taheri, Meysam Ghahramani, Reza Javidan, Mohammad Shojafar, Zahra Pooranian, Mauro Conti:
Similarity-based Android malware detection using Hamming distance of static binary features. Future Gener. Comput. Syst. 105: 230-247 (2020) - [j23]Nahid Hajizadeh, Reza Javidan, Pirooz Shamsinejad, Reza Akbari:
Node deployment in wireless sensor networks using the new multi-objective Levy flight bee algorithm. IET Wirel. Sens. Syst. 10(2): 78-87 (2020) - [j22]Mohammad Reza Parsaei, Hamid Reza Boveiri, Reza Javidan, Raouf Khayami:
Telesurgery QoS improvement over SDN based on a Type-2 fuzzy system and enhanced cuckoo optimization algorithm. Int. J. Commun. Syst. 33(11) (2020) - [j20]Rahim Taheri, Reza Javidan, Mohammad Shojafar, Zahra Pooranian, Ali Miri, Mauro Conti:
On defending against label flipping attacks on malware detection systems. Neural Comput. Appl. 32(18): 14781-14800 (2020) - [j19]Esmaeil Amiri, Reza Javidan:
A new method for layer 2 loop prevention in software defined networks. Telecommun. Syst. 73(1): 47-57 (2020) - [j18]Meysam Ghahramani, Reza Javidan, Mohammad Shojafar:
A secure biometric-based authentication protocol for global mobility networks in smart cities. J. Supercomput. 76(11): 8729-8755 (2020) - [i4]Hamid Reza Boveiri, Raouf Khayami, Reza Javidan, Ali Reza MehdiZadeh:
Medical Image Registration Using Deep Neural Networks: A Comprehensive Review. CoRR abs/2002.03401 (2020) - 2019
- [j17]Ahmad Jalili, Manijeh Keshtgari, Reza Akbari, Reza Javidan:
Multi criteria analysis of Controller Placement Problem in Software Defined Networks. Comput. Commun. 133: 115-128 (2019) - [j16]Mohsen Emami, Reza Akbari, Reza Javidan, Ali Zamani:
A new approach for traffic matrix estimation in high load computer networks based on graph embedding and convolutional neural network. Trans. Emerg. Telecommun. Technol. 30(6) (2019) - [j15]Hamed Haddad Pajouh, Reza Javidan, Raouf Khayami, Ali Dehghantanha, Kim-Kwang Raymond Choo:
A Two-Layer Dimension Reduction and Two-Tier Classification Model for Anomaly-Based Intrusion Detection in IoT Backbone Networks. IEEE Trans. Emerg. Top. Comput. 7(2): 314-323 (2019) - [c9]Mohammad Shojafar, Rahim Taheri, Zahra Pooranian, Reza Javidan, Ali Miri, Yaser Jararweh:
Automatic Clustering of Attacks in Intrusion Detection Systems. AICCSA 2019: 1-8 - [i3]Rahim Taheri, Reza Javidan, Mohammad Shojafar, Vinod P, Mauro Conti:
Can Machine Learning Model with Static Features be Fooled: an Adversarial Machine Learning Approach. CoRR abs/1904.09433 (2019) - [i2]Rahim Taheri, Reza Javidan, Mohammad Shojafar, Zahra Pooranian, Ali Miri, Mauro Conti:
On Defending Against Label Flipping Attacks on Malware Detection Systems. CoRR abs/1908.04473 (2019) - [i1]Rahim Taheri, Meysam Ghahramani, Reza Javidan, Mohammad Shojafar, Zahra Pooranian, Mauro Conti:
Similarity-based Android Malware Detection Using Hamming Distance of Static Binary Features. CoRR abs/1908.05759 (2019) - 2018
- [j14]Azadeh Faroughi, Reza Javidan:
CANF: Clustering and anomaly detection method using nearest and farthest neighbor. Future Gener. Comput. Syst. 89: 166-177 (2018) - [j12]Reza Mohammadi, Reza Javidan, Manijeh Keshtgari:
An intelligent traffic engineering method for video surveillance systems over software defined networks using ant colony optimisation. Int. J. Bio Inspired Comput. 12(3): 173-185 (2018) - [j11]Reza Mohammadi, Reza Javidan:
On the feasibility of telesurgery over software defined networks. Int. J. Intell. Robotics Appl. 2(3): 339-350 (2018) - [j10]Reza Mohammadi, Reza Javidan, Manijeh Keshtgari:
OpenIPTV: a comprehensive SDN-based IPTV service framework. Multim. Syst. 24(3): 313-325 (2018) - [j9]Reza Mohammadi, Reza Javidan, Manijeh Keshtgari, Reza Akbari:
A novel multicast traffic engineering technique in SDN using TLBO algorithm. Telecommun. Syst. 68(3): 583-592 (2018) - [c8]Azadeh Faroughi, Reza Javidan, Marco Mellia, Andrea Morichetta, Francesca Soro, Martino Trevisan:
Achieving Horizontal Scalability in Density-based Clustering for URLs. IEEE BigData 2018: 3841-3846 - 2017
- [j7]Negar Rikhtegar, Reza Javidan, Manijeh Keshtgari:
Mobility management in wireless nano-sensor networks using fuzzy logic. J. Intell. Fuzzy Syst. 32(1): 969-978 (2017) - [j6]Reza Mohammadi, Reza Javidan:
An adaptive type-2 fuzzy traffic engineering method for video surveillance systems over software defined networks. Multim. Tools Appl. 76(22): 23627-23642 (2017) - [j5]Mohammad Reza Parsaei, Reza Javidan, Narges Shayegh Kargar, Hassan Saberi Nik:
On the global stability of an epidemic model of computer viruses. Theory Biosci. 136(3-4): 169-178 (2017) - [j4]Reza Mohammadi, Reza Javidan, Mauro Conti:
SLICOTS: An SDN-Based Lightweight Countermeasure for TCP SYN Flooding Attacks. IEEE Trans. Netw. Serv. Manag. 14(2): 487-497 (2017) - [c6]Reza Mohammadi, Reza Javidan, Manijeh Keshtgari, Mauro Conti, Chhagan Lal:
Practical extensions to countermeasure DoS attacks in software defined networking. NFV-SDN 2017: 1-6 - 2016
- [j3]Reza Mohammadi, Reza Javidan:
An Intelligent Traffic Engineering Method over Software Defined Networks for Video Surveillance Systems Based on Artificial Bee Colony. Int. J. Intell. Inf. Technol. 12(4): 45-62 (2016) - [c5]Azadeh Faroughi, Reza Javidan, Mohsen Emami:
A new density estimator based on nearest and farthest neighbor. IST 2016: 185-190 - 2008
- [c1]Reza Javidan, Mohammad Ali Masnadi-Shirazi, Zohreh Azimifar:
Seabed Image Texture Segmentation and Classification Based on Nonsubsampled Contourlet Transform. CSICC 2008: 186-193
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-25 02:44 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint