default search action
Ali Shahidinejad
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j52]Ali Shahidinejad, Jemal H. Abawajy:
An All-Inclusive Taxonomy and Critical Review of Blockchain-Assisted Authentication and Session Key Generation Protocols for IoT. ACM Comput. Surv. 56(7): 186:1-186:38 (2024) - [j51]Ali Shahidinejad, Jemal H. Abawajy:
Efficient Provably Secure Authentication Protocol for Multidomain IIoT Using a Combined Off-Chain and On-Chain Approach. IEEE Internet Things J. 11(9): 15241-15251 (2024) - [j50]Ali Shahidinejad, Jemal H. Abawajy, Shamsul Huda:
Untraceable blockchain-assisted authentication and key exchange in medical consortiums. J. Syst. Archit. 151: 103143 (2024) - [j49]Ali Shahidinejad, Jemal H. Abawajy:
Blockchain-Based Self-Certified Key Exchange Protocol for Hybrid Electric Vehicles. IEEE Trans. Consumer Electron. 70(1): 543-553 (2024) - [j48]Zhen Lin, Liming Lu, Jianping Shuai, Hong Zhao, Ali Shahidinejad:
An Efficient and Autonomous Planning Scheme for Deploying IoT Services in Fog Computing: A Metaheuristic-Based Approach. IEEE Trans. Comput. Soc. Syst. 11(1): 1415-1429 (2024) - [j47]Ali Shahidinejad, Jemal H. Abawajy, Shamsul Huda:
Highly-Secure Yet Efficient Blockchain-Based CRL-Free Key Management Protocol for IoT-Enabled Smart Grid Environments. IEEE Trans. Inf. Forensics Secur. 19: 6738-6750 (2024) - [j46]Esmaeil Torabi, Mostafa Ghobaei-Arani, Ali Shahidinejad:
A learning-based data and task placement mechanism for IoT applications in fog computing: a context-aware approach. J. Supercomput. 80(15): 21726-21763 (2024) - [j45]Ali Shahidinejad, Jemal H. Abawajy:
Anonymous Blockchain-Assisted Authentication Protocols for Secure Cross-Domain IoD Communications. IEEE Trans. Netw. Sci. Eng. 11(3): 2661-2674 (2024) - [j44]Ali Shahidinejad, Jemal H. Abawajy, Shamsul Huda:
Anonymous lattice-based authentication protocol for vehicular communications. Veh. Commun. 48: 100803 (2024) - 2023
- [j43]Mohammad Shirafkan, Ali Shahidinejad, Mostafa Ghobaei-Arani:
An Intrusion Detection System using Deep Cellular Learning Automata and Semantic Hierarchy for Enhancing RPL Protocol Security. Clust. Comput. 26(4): 2443-2461 (2023) - [j42]Jaber Taghizadeh, Mostafa Ghobaei-Arani, Ali Shahidinejad:
An efficient data replica placement mechanism using biogeography-based optimization technique in the fog computing environment. J. Ambient Intell. Humaniz. Comput. 14(4): 3691-3711 (2023) - [j41]Fariba Farahbakhsh, Ali Shahidinejad, Mostafa Ghobaei-Arani:
Context-aware computation offloading for mobile edge computing. J. Ambient Intell. Humaniz. Comput. 14(5): 5123-5135 (2023) - [j40]Rafat Aghazadeh, Ali Shahidinejad, Mostafa Ghobaei-Arani:
An autonomous proactive content caching method in edge computing environment: a learning-based approach. Multim. Tools Appl. 82(27): 42545-42567 (2023) - [j39]Ali Shahidinejad, Jemal H. Abawajy:
Decentralized Lattice-Based Device-to-Device Authentication for the Edge-Enabled IoT. IEEE Syst. J. 17(4): 6623-6633 (2023) - [j38]Rafat Aghazadeh, Ali Shahidinejad, Mostafa Ghobaei-Arani:
Proactive content caching in edge computing environment: A review. Softw. Pract. Exp. 53(3): 811-855 (2023) - 2022
- [j37]Mahboubeh Salimian, Mostafa Ghobaei-Arani, Ali Shahidinejad:
An Evolutionary Multi-objective Optimization Technique to Deploy the IoT Services in Fog-enabled Networks: An Autonomous Approach. Appl. Artif. Intell. 36(1) (2022) - [j36]Ali Shahidinejad, Mostafa Ghobaei-Arani, Alireza Souri, Mohammad Shojafar, Saru Kumari:
Light-Edge: A Lightweight Authentication Protocol for IoT Devices in an Edge-Cloud Environment. IEEE Consumer Electron. Mag. 11(2): 57-63 (2022) - [j35]Esmaeil Torabi, Mostafa Ghobaei-Arani, Ali Shahidinejad:
Data replica placement approaches in fog computing: a review. Clust. Comput. 25(5): 3561-3589 (2022) - [j34]Meysam Tekiyehband, Mostafa Ghobaei-Arani, Ali Shahidinejad:
An efficient dynamic service provisioning mechanism in fog computing environment: A learning automata approach. Expert Syst. Appl. 198: 116863 (2022) - [j33]Mostafa Ghobaei-Arani, Ali Shahidinejad:
A cost-efficient IoT service placement approach using whale optimization algorithm in fog computing environment. Expert Syst. Appl. 200: 117012 (2022) - [j32]Ali Shahidinejad, Mostafa Ghobaei-Arani:
A metaheuristic-based computation offloading in edge-cloud environment. J. Ambient Intell. Humaniz. Comput. 13(5): 2785-2794 (2022) - [j31]Reza Mohammadian Fini, Mahmoud Mahlouji, Ali Shahidinejad:
Performance improvement in face recognition system using optimized Gabor filters. Multim. Tools Appl. 81(27): 38375-38408 (2022) - [j30]Mohammad Shirafkan, Ali Shahidinejad, Mostafa Ghobaei-Arani:
An autonomous intrusion detection system for the RPL protocol. Peer-to-Peer Netw. Appl. 15(1): 484-502 (2022) - [j29]Reza Mohammadian Fini, Mahmoud Mahlouji, Ali Shahidinejad:
Real-time face detection using circular sliding of the Gabor energy and neural networks. Signal Image Video Process. 16(4): 1081-1089 (2022) - [j28]Jaber Taghizadeh, Mostafa Ghobaei-Arani, Ali Shahidinejad:
A metaheuristic-based data replica placement approach for data-intensive IoT applications in the fog computing environment. Softw. Pract. Exp. 52(2): 482-505 (2022) - [j27]Ali Shahidinejad, Dariush Abbasinezhad-Mood:
Ultra-Lightweight and Secure Blockchain-Assisted Charging Scheduling Scheme for Vehicular Edge Networks by Utilization of NanoPi NEO. IEEE Trans. Veh. Technol. 71(8): 8116-8123 (2022) - [d1]Ali Shahidinejad:
ProVerif codes for "Ultra-Lightweight and Secure Blockchain-Assisted Charging Scheduling Scheme For Vehicular Edge Networks By Utilization of NanoPi NEO" (10.1109/TVT.2022.3173076). IEEE DataPort, 2022 - 2021
- [j26]Ali Shahidinejad, Mostafa Ghobaei-Arani, Mohammad Masdari:
Resource provisioning using workload clustering in cloud computing environment: a hybrid approach. Clust. Comput. 24(1): 319-342 (2021) - [j25]Ali Shakarami, Mostafa Ghobaei-Arani, Ali Shahidinejad, Mohammad Masdari, Hamid Shakarami:
Data replication schemes in cloud computing: a survey. Clust. Comput. 24(3): 2545-2579 (2021) - [j24]Masoumeh Etemadi, Mostafa Ghobaei-Arani, Ali Shahidinejad:
A cost-efficient auto-scaling mechanism for IoT applications in fog computing environment: a deep learning-based approach. Clust. Comput. 24(4): 3277-3292 (2021) - [j23]Leila Esmaeili, Seyed Jalaleddin Mousavirad, Ali Shahidinejad:
An efficient method to minimize cross-entropy for selecting multi-level threshold values using an improved human mental search algorithm. Expert Syst. Appl. 182: 115106 (2021) - [j22]Fariba Farahbakhsh, Ali Shahidinejad, Mostafa Ghobaei-Arani:
Multiuser context-aware computation offloading in mobile edge computing based on Bayesian learning automata. Trans. Emerg. Telecommun. Technol. 32(1) (2021) - [j21]Ali Shahidinejad, Fariba Farahbakhsh, Mostafa Ghobaei-Arani, Mazhar Hussain Malik, Toni Anwar:
Context-Aware Multi-User Offloading in Mobile Edge Computing: a Federated Learning-Based Approach. J. Grid Comput. 19(2): 18 (2021) - [j20]Ahmad Sharif, Mohsen Nickray, Ali Shahidinejad:
Energy-efficient fault-tolerant scheduling in a fog-based smart monitoring application. Int. J. Ad Hoc Ubiquitous Comput. 36(1): 32-49 (2021) - [j19]Sadra Zargar, Ali Shahidinejad, Mostafa Ghobaei-Arani:
A lightweight authentication protocol for IoT-based cloud environment. Int. J. Commun. Syst. 34(11) (2021) - [j18]Fatemeh Jazayeri, Ali Shahidinejad, Mostafa Ghobaei-Arani:
Autonomous computation offloading and auto-scaling the in the mobile fog computing: a deep reinforcement learning-based approach. J. Ambient Intell. Humaniz. Comput. 12(8): 8265-8284 (2021) - [j17]Masoumeh Etemadi, Mostafa Ghobaei-Arani, Ali Shahidinejad:
A learning-based resource provisioning approach in the fog computing environment. J. Exp. Theor. Artif. Intell. 33(6): 1033-1056 (2021) - [j16]Ali Shakarami, Ali Shahidinejad, Mostafa Ghobaei-Arani:
An autonomous computation offloading strategy in Mobile Edge Computing: A deep learning-based hybrid approach. J. Netw. Comput. Appl. 178: 102974 (2021) - [j15]Mahboubeh Salimian, Mostafa Ghobaei-Arani, Ali Shahidinejad:
Toward an autonomic approach for Internet of Things service placement using gray wolf optimization in the fog computing environment. Softw. Pract. Exp. 51(8): 1745-1772 (2021) - [j14]Mostafa Ghobaei-Arani, Ali Shahidinejad:
An efficient resource provisioning approach for analyzing cloud workloads: a metaheuristic-based clustering approach. J. Supercomput. 77(1): 711-750 (2021) - [j13]Fatemeh Jazayeri, Ali Shahidinejad, Mostafa Ghobaei-Arani:
A latency-aware and energy-efficient computation offloading in mobile fog computing: a hidden Markov model-based approach. J. Supercomput. 77(5): 4887-4916 (2021) - [j12]Samira Kalantary, Javad Akbari Torkestani, Ali Shahidinejad:
Resource discovery in the Internet of Things integrated with fog computing using Markov learning model. J. Supercomput. 77(12): 13806-13827 (2021) - [i1]Ali Shahidinejad, Mostafa Ghobaei-Arani, Alireza Souri, Mohammad Shojafar, Saru Kumari:
A Technical Report for Light-Edge: A Lightweight Authentication Protocol for IoT Devices in an Edge-Cloud Environment. CoRR abs/2101.06676 (2021) - 2020
- [j11]Ali Noruzi, Mahmoud Mahlouji, Ali Shahidinejad:
Iris recognition in unconstrained environment on graphic processing units with CUDA. Artif. Intell. Rev. 53(5): 3705-3729 (2020) - [j10]Ali Shahidinejad, Mostafa Ghobaei-Arani, Leila Esmaeili:
An elastic controller using Colored Petri Nets in cloud computing environment. Clust. Comput. 23(2): 1045-1071 (2020) - [j9]Ali Shakarami, Mostafa Ghobaei-Arani, Ali Shahidinejad:
A survey on the computation offloading approaches in mobile edge computing: A machine learning-based perspective. Comput. Networks 182: 107496 (2020) - [j8]Masoumeh Etemadi, Mostafa Ghobaei-Arani, Ali Shahidinejad:
Resource provisioning for IoT services in the fog computing environment: An autonomic approach. Comput. Commun. 161: 109-131 (2020) - [j7]Ahmad Sharif, Mohsen Nickray, Ali Shahidinejad:
Fault-tolerant with load balancing scheduling in a fog-based IoT application. IET Commun. 14(16): 2646-2657 (2020) - [j6]Ali Shahidinejad, Saeid Barshandeh:
Sink selection and clustering using fuzzy-based controller for wireless sensor networks. Int. J. Commun. Syst. 33(15) (2020) - [j5]Ali Shakarami, Ali Shahidinejad, Mostafa Ghobaei-Arani:
A review on the computation offloading approaches in mobile edge computing: A game-theoretic perspective. Softw. Pract. Exp. 50(9): 1719-1759 (2020) - [j4]Ali Shahidinejad, Mostafa Ghobaei-Arani:
Joint computation offloading and resource provisioning for edge-cloud computing environment: A machine learning-based approach. Softw. Pract. Exp. 50(12): 2212-2230 (2020)
2010 – 2019
- 2018
- [j3]Ali Shahidinejad, Saeed Fathi:
Wireless-assisted multiple network on chip using microring resonators. Microprocess. Microsystems 63: 190-198 (2018) - 2013
- [j2]Iraj Sadegh Amiri, Mehrnaz Nikmaram, Ali Shahidinejad, Jalil Ali:
Generation of potential wells used for quantum codes transmission via a TDMA network communication system. Secur. Commun. Networks 6(11): 1301-1309 (2013) - 2012
- [j1]Iraj Sadegh Amiri, R. Ahsan, Ali Shahidinejad, Jalil Ali, Preecha P. Yupapin:
Characterisation of bifurcation and chaos in silicon microring resonator. IET Commun. 6(16): 2671-2675 (2012)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 22:16 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint