Ali Miri

Orcid: 0000-0001-5991-7188

According to our database1, Ali Miri authored at least 159 papers between 2004 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
PETRIoT - A Privacy Enhancing Technology Recommendation Framework for IoT Computing.
Proceedings of the 10th International Conference on Information Systems Security and Privacy, 2024

Preserving Privacy in High-Dimensional Data Publishing.
Proceedings of the 10th International Conference on Information Systems Security and Privacy, 2024

Building Detection-Resistant Reconnaissance Attacks Based on Adversarial Explainability.
Proceedings of the 10th ACM Cyber-Physical System Security Workshop, 2024

2023
XMal: A lightweight memory-based explainable obfuscated-malware detector.
Comput. Secur., October, 2023

A Model-Driven-Reverse Engineering Approach for Detecting Privilege Escalation in IoT Systems.
J. Object Technol., 2023

Adversarial Explainability: Utilizing Explainable Machine Learning in Bypassing IoT Botnet Detection Systems.
CoRR, 2023

XMeDNN: An Explainable Deep Neural Network System for Intrusion Detection in Internet of Medical Things.
Proceedings of the 9th International Conference on Information Systems Security and Privacy, 2023

Evaluating Generative Adversarial Networks: A Topological Approach.
Proceedings of the International Conference on Computing, Networking and Communications, 2023

Explainable Ensemble-Based Detection of Cyber Attacks on Internet of Medical Things.
Proceedings of the IEEE Intl Conf on Dependable, 2023

Forensic Identification of Android Trojans Using Stacked Ensemble of Deep Neural Networks.
Proceedings of the Applied Cryptography and Network Security Workshops, 2023

2022
Towards an Explainable Universal Feature Set for IoT Intrusion Detection.
Sensors, 2022

A Model-Driven-Engineering Approach for Detecting Privilege Escalation in IoT Systems.
CoRR, 2022

Replication management in peer-to-peer cloud storage systems.
Clust. Comput., 2022

Resilience of GANs against Adversarial Attacks.
Proceedings of the 19th International Conference on Security and Cryptography, 2022

Parasite Chain Attack Detection in the IOTA Network.
Proceedings of the 2022 International Wireless Communications and Mobile Computing, 2022

Publishing Private High-dimensional Datasets: A Topological Approach.
Proceedings of the 2022 International Wireless Communications and Mobile Computing, 2022

2021
User and Event Behavior Analytics on Differentially Private Data for Anomaly Detection.
Proceedings of the 7th IEEE International Conference on Big Data Security on Cloud, 2021

Mutually Private Verifiable Machine Learning As-a-service: A Distributed Approach.
Proceedings of the IEEE World AI IoT Congress, 2021

2020
A cloud dynamic online double auction mechanism (DODAM) for sustainable pricing.
Telecommun. Syst., 2020

On defending against label flipping attacks on malware detection systems.
Neural Comput. Appl., 2020

A cloud priority-based dynamic online double auction mechanism (PB-DODAM).
J. Cloud Comput., 2020

Timely Classification and Verification of Network Traffic Using Gaussian Mixture Models.
IEEE Access, 2020

Secure Digital Service as a Utility and the Unit of Measure.
Proceedings of the 11th IEEE Annual Ubiquitous Computing, 2020

A Decentralized, Privacy-preserving and Crowdsourcing-based Approach to Medical Research.
Proceedings of the 2020 IEEE International Conference on Systems, Man, and Cybernetics, 2020

An Emerging Strategy for Privacy Preserving Databases: Differential Privacy.
Proceedings of the HCI for Cybersecurity, Privacy and Trust, 2020

Enabling Medical Research Through Privacy-Preserving Data Markets.
Proceedings of the HCI for Cybersecurity, Privacy and Trust, 2020

Cross-Scenario Performance Modelling for Big Data Ecosystems.
Proceedings of the Artificial Intelligence in HCI, 2020

2019
Fast Phrase Search for Encrypted Cloud Storage.
IEEE Trans. Cloud Comput., 2019

Output and Input Data Perturbations for Differentially Private Databases.
Proceedings of the 2019 IEEE World Congress on Services, 2019

A Systematic Cloud Workload Clustering Technique in Large Scale Data Centers.
Proceedings of the 2019 IEEE World Congress on Services, 2019

Automated Identification of Over-Privileged SmartThings Apps.
Proceedings of the 2019 IEEE International Conference on Software Maintenance and Evolution, 2019

Real-Time Energy-Conserving VM-Provisioning Framework for Cloud-Data Centers.
Proceedings of the IEEE 9th Annual Computing and Communication Workshop and Conference, 2019

Automatic Clustering of Attacks in Intrusion Detection Systems.
Proceedings of the 16th IEEE/ACS International Conference on Computer Systems and Applications, 2019

Cryptographically Enforced Access Control in Blockchain-Based Platforms.
Proceedings of the 16th IEEE/ACS International Conference on Computer Systems and Applications, 2019

SSD: Cache or Tier an Evaluation of SSD Cost and Efficiency using MapReduce.
Proceedings of the 16th IEEE/ACS International Conference on Computer Systems and Applications, 2019

Using Honeypots in a Decentralized Framework to Defend Against Adversarial Machine-Learning Attacks.
Proceedings of the Applied Cryptography and Network Security Workshops, 2019

2018
A New Gradual Secret Sharing Scheme with Diverse Access Structure.
Wirel. Pers. Commun., 2018

Proactive dynamic virtual-machine consolidation for energy conservation in cloud data centres.
J. Cloud Comput., 2018

A Sybil Resistant IoT Trust Model Using Blockchains.
Proceedings of the IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, 2018

2017
An Analysis of the Security of Compressed Sensing Using an Artificial Neural Network.
Proceedings of the 15th Annual Conference on Privacy, Security and Trust, 2017

2016
Secure image deduplication through image compression.
J. Inf. Secur. Appl., 2016

Incorporating service and user information and latent features to predict QoS for selecting and recommending cloud service compositions.
Clust. Comput., 2016

Scanning for Viruses on Encrypted Cloud Storage.
Proceedings of the 2016 Intl IEEE Conferences on Ubiquitous Intelligence & Computing, 2016

A Combined Solution for Conjunctive Keyword Search, Phrase Search and Auditing for Encrypted Cloud Storage.
Proceedings of the 2016 Intl IEEE Conferences on Ubiquitous Intelligence & Computing, 2016

Secure image data deduplication through compressive sensing.
Proceedings of the 14th Annual Conference on Privacy, Security and Trust, 2016

An IoT trust and reputation model based on recommender systems.
Proceedings of the 14th Annual Conference on Privacy, Security and Trust, 2016

Anonymous Authentication with a Bi-directional Identity Federation in the Cloud.
Proceedings of the Human Aspects of Information Security, Privacy, and Trust, 2016

Energy-Efficient Resource Allocation for Cloud Data Centres Using a Multi-way Data Analysis Technique.
Proceedings of the Human-Computer Interaction. Theory, Design, Development and Practice, 2016

Multivariate Time Series ELM for Cloud Data Centre Workload Prediction.
Proceedings of the Human-Computer Interaction. Theory, Design, Development and Practice, 2016

Privacy Preserving Predictive Analytics with Smart Meters.
Proceedings of the 2016 IEEE International Congress on Big Data, San Francisco, CA, USA, June 27, 2016

2015
PESCA: a peer-to-peer social network architecture with privacy-enabled social communication and data availability.
IET Inf. Secur., 2015

Similarity Measure Based on Low-Rank Approximation for Highly Scalable Recommender Systems.
Proceedings of the 2015 IEEE TrustCom/BigDataSE/ISPA, 2015

End-to-End Performance Prediction for Selecting Cloud Services Solutions.
Proceedings of the 2015 IEEE Symposium on Service-Oriented System Engineering, 2015

End-to-End QoS Prediction Model of Vertically Composed Cloud Services via Tensor Factorization.
Proceedings of the 2015 International Conference on Cloud and Autonomic Computing, 2015

A Low Storage Phase Search Scheme Based on Bloom Filters for Encrypted Cloud Services.
Proceedings of the IEEE 2nd International Conference on Cyber Security and Cloud Computing, 2015

An Extreme Learning Machine (ELM) Predictor for Electric Arc Furnaces' v-i Characteristics.
Proceedings of the IEEE 2nd International Conference on Cyber Security and Cloud Computing, 2015

Open Source Cloud Management Platforms: A Review.
Proceedings of the IEEE 2nd International Conference on Cyber Security and Cloud Computing, 2015

Using ELM Techniques to Predict Data Centre VM Requests.
Proceedings of the IEEE 2nd International Conference on Cyber Security and Cloud Computing, 2015

A Secure Video Deduplication Scheme in Cloud Storage Environments Using H.264 Compression.
Proceedings of the First IEEE International Conference on Big Data Computing Service and Applications, 2015

Index Selection on MapReduce Relational-Databases.
Proceedings of the First IEEE International Conference on Big Data Computing Service and Applications, 2015

Proof of Storage for Video Deduplication in the Cloud.
Proceedings of the 2015 IEEE International Congress on Big Data, New York City, NY, USA, June 27, 2015

Computation and Search over Encrypted XML Documents.
Proceedings of the 2015 IEEE International Congress on Big Data, New York City, NY, USA, June 27, 2015

An Efficient Conjunctive Keyword and Phase Search Scheme for Encrypted Cloud Storage Systems.
Proceedings of the 8th IEEE International Conference on Cloud Computing, 2015

End-to-End QoS Prediction of Vertical Service Composition in the Cloud.
Proceedings of the 8th IEEE International Conference on Cloud Computing, 2015

2014
A centralized privacy-preserving framework for online social networks.
ISC Int. J. Inf. Secur., 2014

A note on "Selling multiple secrets to a single buyer".
Inf. Sci., 2014

Welcome message from the general chair.
Proceedings of the 2014 Twelfth Annual International Conference on Privacy, 2014

Proof of Retrieval and Ownership Protocols for Images through SPIHT Compression.
Proceedings of the 2014 IEEE International Conference on High Performance Computing and Communications, 2014

Privacy-Preserving Public Auditing in Cloud Computing with Data Deduplication.
Proceedings of the Foundations and Practice of Security - 7th International Symposium, 2014

Efficient pairing-free, certificateless two-party authenticated key agreement protocol for grid computing.
Proceedings of the Fourth International Conference on Digital Information and Communication Technology and its Applicationsm DICTAP 2014, 2014

End-to-end QoS mapping and aggregation for selecting cloud services.
Proceedings of the 2014 International Conference on Collaboration Technologies and Systems, 2014

2013
DEFF: a new architecture for private online social networks.
Secur. Commun. Networks, 2013

Chaotic masking for securing RFID systems against relay attacks.
Secur. Commun. Networks, 2013

CP2: Cryptographic privacy protection framework for online social networks.
Comput. Electr. Eng., 2013

Incremental learning of privacy-preserving Bayesian networks.
Appl. Soft Comput., 2013

An End-to-End QoS Mapping Approach for Cloud Service Selection.
Proceedings of the IEEE Ninth World Congress on Services, 2013

Proof of retrieval and ownership protocols for enterprise-level data deduplication.
Proceedings of the Center for Advanced Studies on Collaborative Research, 2013

Secure Enterprise Data Deduplication in the Cloud.
Proceedings of the 2013 IEEE Sixth International Conference on Cloud Computing, Santa Clara, CA, USA, June 28, 2013

2012
Adaptive ROC-based ensembles of HMMs applied to anomaly detection.
Pattern Recognit., 2012

A survey of techniques for incremental learning of HMM parameters.
Inf. Sci., 2012

Securing Harari's Authentication Scheme.
Int. J. Netw. Secur., 2012

Adaptively Secure Broadcast Encryption with Short Ciphertexts.
Int. J. Netw. Secur., 2012

Privacy-preserving back-propagation and extreme learning machine algorithms.
Data Knowl. Eng., 2012

Decoding affine reflection group codes with trellises.
Adv. Math. Commun., 2012

A secure data deduplication framework for cloud environments.
Proceedings of the Tenth Annual International Conference on Privacy, Security and Trust, 2012

On efficient decoding for the Fuzzy Vault scheme.
Proceedings of the 11th International Conference on Information Science, 2012

On the hardware design and implementation of a chaos-based RFID authentication and watermarking scheme.
Proceedings of the 11th International Conference on Information Science, 2012

Lightweight mutual RFID authentication.
Proceedings of IEEE International Conference on Communications, 2012

A new image encryption algorithm based on a chaotic DNA substitution method.
Proceedings of IEEE International Conference on Communications, 2012

COMPASS: Authenticated Group Key Agreement from Signcryption.
Proceedings of the Foundations and Practice of Security - 5th International Symposium, 2012

2011
Analysis of the Hamming Weight of the Extended wmbNAF.
IACR Cryptol. ePrint Arch., 2011

Time Optimal Algorithms for Black Hole Search in Rings.
Discret. Math. Algorithms Appl., 2011

Improving the Optimal Bounds for Black Hole Search in Rings.
Proceedings of the Structural Information and Communication Complexity, 2011

Backward Link Authentication For RFID tags.
Proceedings of the 2011 IEEE International Conference on RFID-Technologies and Applications, 2011

Forward secure identity-based key agreement for dynamic groups.
Proceedings of the Ninth Annual Conference on Privacy, Security and Trust, 2011

Incremental Boolean Combination of Classifiers.
Proceedings of the Multiple Classifier Systems - 10th International Workshop, 2011

A Tag Count Estimation Algorithm for Dynamic Framed ALOHA Based RFID MAC Protocols.
Proceedings of IEEE International Conference on Communications, 2011

Preserving Privacy in Online Social Networks.
Proceedings of the Foundations and Practice of Security, 2011

Private Identification of RFID Tags.
Proceedings of the Foundations and Practice of Security, 2011

2010
On the memory complexity of the forward-backward algorithm.
Pattern Recognit. Lett., 2010

Iterative Boolean combination of classifiers in the ROC space: An application to anomaly detection with HMMs.
Pattern Recognit., 2010

NTRU over rings beyond \mathbb<i>Z</i>{\mathbb{Z}}.
Des. Codes Cryptogr., 2010

Welcome message from the general chairs.
Proceedings of the IEEE 6th International Conference on Wireless and Mobile Computing, 2010

Forward-link authentication for RFIDs.
Proceedings of the IEEE 21st International Symposium on Personal, 2010

Boolean Combination of Classifiers in the ROC Space.
Proceedings of the 20th International Conference on Pattern Recognition, 2010

2009
An Application of theBruhat Decomposition to the Design of Full Diversity Unitary Space-Time Codes.
IEEE Trans. Inf. Theory, 2009

Privacy within pervasive communications.
Telecommun. Syst., 2009

An improved watermarking technique for multi-user, multi-right environments.
Multim. Tools Appl., 2009

A collusion attack on the fuzzy vault scheme.
ISC Int. J. Inf. Secur., 2009

Editorial.
Ad Hoc Sens. Wirel. Networks, 2009

DiSEL: a distance based slot selection protocol for framed slotted ALOHA RFID systems.
Proceedings of the 2009 IEEE Wireless Communications and Networking Conference, 2009

Combining Hidden Markov Models for Improved Anomaly Detection.
Proceedings of IEEE International Conference on Communications, 2009

Privacy-Preserving Bayesian Network for Horizontally Partitioned Data.
Proceedings of the 12th IEEE International Conference on Computational Science and Engineering, 2009

Combining Attribute-Based and Access Systems.
Proceedings of the 12th IEEE International Conference on Computational Science and Engineering, 2009

Secure two and multi-party association rule mining.
Proceedings of the 2009 IEEE Symposium on Computational Intelligence for Security and Defense Applications, 2009

A comparison of techniques for on-line incremental learning of HMM parameters in anomaly detection.
Proceedings of the 2009 IEEE Symposium on Computational Intelligence for Security and Defense Applications, 2009

2008
Unitary Space-Time Group Codes: Diversity Sums From Character Tables.
IEEE Trans. Inf. Theory, 2008

Affine Reflection Group Codes.
IEEE Trans. Inf. Theory, 2008

Fast and Flexible Elliptic Curve Point Arithmetic over Prime Fields.
IEEE Trans. Computers, 2008

New Multibase Non-Adjacent Form Scalar Multiplication and its Application to Elliptic Curve Cryptosystems (extended version).
IACR Cryptol. ePrint Arch., 2008

New Composite Operations and Precomputation Scheme for Elliptic Curve Cryptosystems over Prime Fields (full version).
IACR Cryptol. ePrint Arch., 2008

Location privacy and anonymity preserving routing for wireless sensor networks.
Comput. Networks, 2008

New Composite Operations and Precomputation Scheme for Elliptic Curve Cryptosystems over Prime Fields.
Proceedings of the Public Key Cryptography, 2008

Efficient Topology Discovery for Multihop Wireless Sensor Networks.
Proceedings of the Sixth Annual Conference on Communication Networks and Services Research (CNSR 2008), 2008

Privacy preserving ID3 using Gini Index over horizontally partitioned data.
Proceedings of the 6th ACS/IEEE International Conference on Computer Systems and Applications, 2008

2007
Unitary Space-Time Constellation Designs From Group Codes.
IEEE Trans. Inf. Theory, 2007

Authenticated Group Key Agreement Protocols for Ad hoc Wireless Networks.
Int. J. Netw. Secur., 2007

Pairwise error probability of space-time codes for a keyhole channel.
IET Commun., 2007

On efficient implementation of FPGA-based hyperelliptic curve cryptosystems.
Comput. Electr. Eng., 2007

Privacy preserving database access through dynamic privacy filters with stable data randomization.
Proceedings of the IEEE International Conference on Systems, 2007

Privacy Preserving k-Means Clustering in Multi-Party Environment.
Proceedings of the SECRYPT 2007, 2007

Anonymous topology discovery for multihop wireless sensor networks.
Proceedings of the Q2SWinet'07, 2007

Anonymous Proactive Routing for Wireless Infrastructure Mesh Networks.
Proceedings of the Wireless Sensor and Actor Networks, 2007

Destination Controlled Anonymous Routing in Resource Constrained Multihop Wireless Sensor Networks.
Proceedings of the Wireless Sensor and Actor Networks, 2007

A Flexible Design of Filterbank Architectures for Discrete Wavelet Transforms.
Proceedings of the IEEE International Conference on Acoustics, 2007

2006
A New Unitary Space-Time Code with High Diversity Product.
IEEE Trans. Wirel. Commun., 2006

Traffic Filtering and Routing in Partially-Hidden Networks.
Int. J. Netw. Secur., 2006

Scalable and fault-tolerant key agreement protocol for dynamic groups.
Int. J. Netw. Manag., 2006

Hierarchical time-based information release.
Int. J. Inf. Sec., 2006

Applications of representation theory to wireless communications.
Des. Codes Cryptogr., 2006

Secure Dot-product Protocol Using Trace Functions.
Proceedings of the Proceedings 2006 IEEE International Symposium on Information Theory, 2006

Effects of Force and Joint Angle on Fractal Parameters of the Myoelectric Signal.
Proceedings of the 28th International Conference of the IEEE Engineering in Medicine and Biology Society, 2006

A Comprehensive Approach to Designing Internet Security Taxonomy.
Proceedings of the Canadian Conference on Electrical and Computer Engineering, 2006

2005
Using Threshold Attribute-based Encryption for Practical Biometric-based Access Control.
Int. J. Netw. Secur., 2005

Self-healing Group Key Distribution.
Int. J. Netw. Secur., 2005

An intrusion detection system for wireless sensor networks.
Proceedings of the 2005 IEEE International Conference on Wireless And Mobile Computing, 2005

Optimal secure data retrieval using an oblivious transfer scheme.
Proceedings of the 2005 IEEE International Conference on Wireless And Mobile Computing, 2005

An Efficient and Flexible Scheme to Support Biometric-Based and Role-Based Access Control.
Proceedings of the Applied Public Key Infrastructure, 2005

Time-Based Release of Confidential Information in Hierarchical Settings.
Proceedings of the Information Security, 8th International Conference, 2005

A Real-Time Node-Based Traffic Anomaly Detection Algorithm for Wireless Sensor Networks.
Proceedings of the Systems Communications 2005 (ICW / ICHSN / ICMCS / SENET 2005), 2005

2004
Efficient identity-based security schemes for ad hoc network routing protocols.
Ad Hoc Networks, 2004

Efficient Revocation of Dynamic Security Privileges in Hierarchically Structured Communities.
Proceedings of the Second Annual Conference on Privacy, 2004

Self-Healing in Group Key Distribution Using Subset Difference Method.
Proceedings of the 3rd IEEE International Symposium on Network Computing and Applications (NCA 2004), 30 August, 2004

Full diversity unitary space-time Bruhat constellations.
Proceedings of the 2004 IEEE Information Theory Workshop, 2004

Using Mediated Identity-Based Cryptography to Support Role-Based Access Control.
Proceedings of the Information Security, 7th International Conference, 2004

Improving the diversity product of space-time Hamiltonian constellations.
Proceedings of the 2004 IEEE International Symposium on Information Theory, 2004

On the construction of space-time Hamiltonian constellations from group codes.
Proceedings of IEEE International Conference on Communications, 2004

FPGA design of HECC coprocessors.
Proceedings of the 2004 IEEE International Conference on Field-Programmable Technology, 2004

An Authenticated Broadcasting Scheme for Wireless Ad Hoc Network.
Proceedings of the 2nd Annual Conference on Communication Networks and Services Research (CNSR 2004), 2004


  Loading...