Ali Miri
Orcid: 0000-0001-5991-7188
According to our database1,
Ali Miri
authored at least 161 papers
between 2004 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
Int. J. Inf. Commun. Technol., 2024
Proceedings of the 21st International Conference on Security and Cryptography, 2024
Proceedings of the 10th International Conference on Information Systems Security and Privacy, 2024
Proceedings of the 10th International Conference on Information Systems Security and Privacy, 2024
Building Detection-Resistant Reconnaissance Attacks Based on Adversarial Explainability.
Proceedings of the 10th ACM Cyber-Physical System Security Workshop, 2024
2023
Comput. Secur., October, 2023
A Model-Driven-Reverse Engineering Approach for Detecting Privilege Escalation in IoT Systems.
J. Object Technol., 2023
Adversarial Explainability: Utilizing Explainable Machine Learning in Bypassing IoT Botnet Detection Systems.
CoRR, 2023
XMeDNN: An Explainable Deep Neural Network System for Intrusion Detection in Internet of Medical Things.
Proceedings of the 9th International Conference on Information Systems Security and Privacy, 2023
Proceedings of the International Conference on Computing, Networking and Communications, 2023
Proceedings of the IEEE Intl Conf on Dependable, 2023
Forensic Identification of Android Trojans Using Stacked Ensemble of Deep Neural Networks.
Proceedings of the Applied Cryptography and Network Security Workshops, 2023
2022
Sensors, 2022
A Model-Driven-Engineering Approach for Detecting Privilege Escalation in IoT Systems.
CoRR, 2022
Proceedings of the 19th International Conference on Security and Cryptography, 2022
Proceedings of the 2022 International Wireless Communications and Mobile Computing, 2022
Proceedings of the 2022 International Wireless Communications and Mobile Computing, 2022
2021
User and Event Behavior Analytics on Differentially Private Data for Anomaly Detection.
Proceedings of the 7th IEEE International Conference on Big Data Security on Cloud, 2021
Proceedings of the IEEE World AI IoT Congress, 2021
2020
Telecommun. Syst., 2020
Neural Comput. Appl., 2020
J. Cloud Comput., 2020
Timely Classification and Verification of Network Traffic Using Gaussian Mixture Models.
IEEE Access, 2020
Proceedings of the 11th IEEE Annual Ubiquitous Computing, 2020
A Decentralized, Privacy-preserving and Crowdsourcing-based Approach to Medical Research.
Proceedings of the 2020 IEEE International Conference on Systems, Man, and Cybernetics, 2020
Proceedings of the HCI for Cybersecurity, Privacy and Trust, 2020
Proceedings of the HCI for Cybersecurity, Privacy and Trust, 2020
Proceedings of the Artificial Intelligence in HCI, 2020
2019
Proceedings of the 2019 IEEE World Congress on Services, 2019
Proceedings of the 2019 IEEE World Congress on Services, 2019
Proceedings of the 2019 IEEE International Conference on Software Maintenance and Evolution, 2019
Proceedings of the IEEE 9th Annual Computing and Communication Workshop and Conference, 2019
Proceedings of the 16th IEEE/ACS International Conference on Computer Systems and Applications, 2019
Proceedings of the 16th IEEE/ACS International Conference on Computer Systems and Applications, 2019
Proceedings of the 16th IEEE/ACS International Conference on Computer Systems and Applications, 2019
Using Honeypots in a Decentralized Framework to Defend Against Adversarial Machine-Learning Attacks.
Proceedings of the Applied Cryptography and Network Security Workshops, 2019
2018
Wirel. Pers. Commun., 2018
Proactive dynamic virtual-machine consolidation for energy conservation in cloud data centres.
J. Cloud Comput., 2018
Proceedings of the IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, 2018
2017
An Analysis of the Security of Compressed Sensing Using an Artificial Neural Network.
Proceedings of the 15th Annual Conference on Privacy, Security and Trust, 2017
2016
Incorporating service and user information and latent features to predict QoS for selecting and recommending cloud service compositions.
Clust. Comput., 2016
Proceedings of the 2016 Intl IEEE Conferences on Ubiquitous Intelligence & Computing, 2016
A Combined Solution for Conjunctive Keyword Search, Phrase Search and Auditing for Encrypted Cloud Storage.
Proceedings of the 2016 Intl IEEE Conferences on Ubiquitous Intelligence & Computing, 2016
Proceedings of the 14th Annual Conference on Privacy, Security and Trust, 2016
Proceedings of the 14th Annual Conference on Privacy, Security and Trust, 2016
Proceedings of the Human Aspects of Information Security, Privacy, and Trust, 2016
Energy-Efficient Resource Allocation for Cloud Data Centres Using a Multi-way Data Analysis Technique.
Proceedings of the Human-Computer Interaction. Theory, Design, Development and Practice, 2016
Proceedings of the Human-Computer Interaction. Theory, Design, Development and Practice, 2016
Proceedings of the 2016 IEEE International Congress on Big Data, San Francisco, CA, USA, June 27, 2016
2015
PESCA: a peer-to-peer social network architecture with privacy-enabled social communication and data availability.
IET Inf. Secur., 2015
Similarity Measure Based on Low-Rank Approximation for Highly Scalable Recommender Systems.
Proceedings of the 2015 IEEE TrustCom/BigDataSE/ISPA, 2015
Proceedings of the 2015 IEEE Symposium on Service-Oriented System Engineering, 2015
End-to-End QoS Prediction Model of Vertically Composed Cloud Services via Tensor Factorization.
Proceedings of the 2015 International Conference on Cloud and Autonomic Computing, 2015
A Low Storage Phase Search Scheme Based on Bloom Filters for Encrypted Cloud Services.
Proceedings of the IEEE 2nd International Conference on Cyber Security and Cloud Computing, 2015
An Extreme Learning Machine (ELM) Predictor for Electric Arc Furnaces' v-i Characteristics.
Proceedings of the IEEE 2nd International Conference on Cyber Security and Cloud Computing, 2015
Proceedings of the IEEE 2nd International Conference on Cyber Security and Cloud Computing, 2015
Proceedings of the IEEE 2nd International Conference on Cyber Security and Cloud Computing, 2015
A Secure Video Deduplication Scheme in Cloud Storage Environments Using H.264 Compression.
Proceedings of the First IEEE International Conference on Big Data Computing Service and Applications, 2015
Proceedings of the First IEEE International Conference on Big Data Computing Service and Applications, 2015
Proceedings of the 2015 IEEE International Congress on Big Data, New York City, NY, USA, June 27, 2015
Proceedings of the 2015 IEEE International Congress on Big Data, New York City, NY, USA, June 27, 2015
An Efficient Conjunctive Keyword and Phase Search Scheme for Encrypted Cloud Storage Systems.
Proceedings of the 8th IEEE International Conference on Cloud Computing, 2015
Proceedings of the 8th IEEE International Conference on Cloud Computing, 2015
2014
ISC Int. J. Inf. Secur., 2014
Proceedings of the 2014 Twelfth Annual International Conference on Privacy, 2014
Proceedings of the 2014 IEEE International Conference on High Performance Computing and Communications, 2014
Proceedings of the Foundations and Practice of Security - 7th International Symposium, 2014
Efficient pairing-free, certificateless two-party authenticated key agreement protocol for grid computing.
Proceedings of the Fourth International Conference on Digital Information and Communication Technology and its Applicationsm DICTAP 2014, 2014
Proceedings of the 2014 International Conference on Collaboration Technologies and Systems, 2014
2013
Secur. Commun. Networks, 2013
Secur. Commun. Networks, 2013
Comput. Electr. Eng., 2013
Appl. Soft Comput., 2013
Proceedings of the IEEE Ninth World Congress on Services, 2013
Proceedings of the Center for Advanced Studies on Collaborative Research, 2013
Proceedings of the 2013 IEEE Sixth International Conference on Cloud Computing, Santa Clara, CA, USA, June 28, 2013
2012
Pattern Recognit., 2012
Int. J. Netw. Secur., 2012
Data Knowl. Eng., 2012
Proceedings of the Tenth Annual International Conference on Privacy, Security and Trust, 2012
Proceedings of the 11th International Conference on Information Science, 2012
On the hardware design and implementation of a chaos-based RFID authentication and watermarking scheme.
Proceedings of the 11th International Conference on Information Science, 2012
Proceedings of IEEE International Conference on Communications, 2012
Proceedings of IEEE International Conference on Communications, 2012
Proceedings of the Foundations and Practice of Security - 5th International Symposium, 2012
2011
IACR Cryptol. ePrint Arch., 2011
Discret. Math. Algorithms Appl., 2011
Proceedings of the Structural Information and Communication Complexity, 2011
Proceedings of the 2011 IEEE International Conference on RFID-Technologies and Applications, 2011
Proceedings of the Ninth Annual Conference on Privacy, Security and Trust, 2011
Proceedings of the Multiple Classifier Systems - 10th International Workshop, 2011
Proceedings of IEEE International Conference on Communications, 2011
Proceedings of the Foundations and Practice of Security, 2011
Proceedings of the Foundations and Practice of Security, 2011
2010
Pattern Recognit. Lett., 2010
Iterative Boolean combination of classifiers in the ROC space: An application to anomaly detection with HMMs.
Pattern Recognit., 2010
Proceedings of the IEEE 6th International Conference on Wireless and Mobile Computing, 2010
Proceedings of the IEEE 21st International Symposium on Personal, 2010
Proceedings of the 20th International Conference on Pattern Recognition, 2010
2009
An Application of theBruhat Decomposition to the Design of Full Diversity Unitary Space-Time Codes.
IEEE Trans. Inf. Theory, 2009
Multim. Tools Appl., 2009
DiSEL: a distance based slot selection protocol for framed slotted ALOHA RFID systems.
Proceedings of the 2009 IEEE Wireless Communications and Networking Conference, 2009
Proceedings of IEEE International Conference on Communications, 2009
Proceedings of the 12th IEEE International Conference on Computational Science and Engineering, 2009
Proceedings of the 12th IEEE International Conference on Computational Science and Engineering, 2009
Proceedings of the 2009 IEEE Symposium on Computational Intelligence for Security and Defense Applications, 2009
A comparison of techniques for on-line incremental learning of HMM parameters in anomaly detection.
Proceedings of the 2009 IEEE Symposium on Computational Intelligence for Security and Defense Applications, 2009
2008
IEEE Trans. Inf. Theory, 2008
IEEE Trans. Computers, 2008
New Multibase Non-Adjacent Form Scalar Multiplication and its Application to Elliptic Curve Cryptosystems (extended version).
IACR Cryptol. ePrint Arch., 2008
New Composite Operations and Precomputation Scheme for Elliptic Curve Cryptosystems over Prime Fields (full version).
IACR Cryptol. ePrint Arch., 2008
Comput. Networks, 2008
New Composite Operations and Precomputation Scheme for Elliptic Curve Cryptosystems over Prime Fields.
Proceedings of the Public Key Cryptography, 2008
Proceedings of the Sixth Annual Conference on Communication Networks and Services Research (CNSR 2008), 2008
Proceedings of the 6th ACS/IEEE International Conference on Computer Systems and Applications, 2008
2007
IEEE Trans. Inf. Theory, 2007
Int. J. Netw. Secur., 2007
IET Commun., 2007
Comput. Electr. Eng., 2007
Privacy preserving database access through dynamic privacy filters with stable data randomization.
Proceedings of the IEEE International Conference on Systems, 2007
Privacy Preserving k-Means Clustering in Multi-Party Environment.
Proceedings of the SECRYPT 2007, 2007
Proceedings of the Q2SWinet'07, 2007
Proceedings of the Wireless Sensor and Actor Networks, 2007
Destination Controlled Anonymous Routing in Resource Constrained Multihop Wireless Sensor Networks.
Proceedings of the Wireless Sensor and Actor Networks, 2007
Proceedings of the IEEE International Conference on Acoustics, 2007
2006
IEEE Trans. Wirel. Commun., 2006
Int. J. Netw. Secur., 2006
Int. J. Netw. Manag., 2006
Des. Codes Cryptogr., 2006
Proceedings of the Proceedings 2006 IEEE International Symposium on Information Theory, 2006
Proceedings of the 28th International Conference of the IEEE Engineering in Medicine and Biology Society, 2006
Proceedings of the Canadian Conference on Electrical and Computer Engineering, 2006
2005
Using Threshold Attribute-based Encryption for Practical Biometric-based Access Control.
Int. J. Netw. Secur., 2005
Proceedings of the 2005 IEEE International Conference on Wireless And Mobile Computing, 2005
Proceedings of the 2005 IEEE International Conference on Wireless And Mobile Computing, 2005
An Efficient and Flexible Scheme to Support Biometric-Based and Role-Based Access Control.
Proceedings of the Applied Public Key Infrastructure, 2005
Proceedings of the Information Security, 8th International Conference, 2005
A Real-Time Node-Based Traffic Anomaly Detection Algorithm for Wireless Sensor Networks.
Proceedings of the Systems Communications 2005 (ICW / ICHSN / ICMCS / SENET 2005), 2005
2004
Ad Hoc Networks, 2004
Efficient Revocation of Dynamic Security Privileges in Hierarchically Structured Communities.
Proceedings of the Second Annual Conference on Privacy, 2004
Proceedings of the 3rd IEEE International Symposium on Network Computing and Applications (NCA 2004), 30 August, 2004
Proceedings of the 2004 IEEE Information Theory Workshop, 2004
Proceedings of the Information Security, 7th International Conference, 2004
Proceedings of the 2004 IEEE International Symposium on Information Theory, 2004
Proceedings of IEEE International Conference on Communications, 2004
Proceedings of the 2004 IEEE International Conference on Field-Programmable Technology, 2004
Proceedings of the 2nd Annual Conference on Communication Networks and Services Research (CNSR 2004), 2004