Ali Shahidinejad
Orcid: 0000-0003-4856-9119
According to our database1,
Ali Shahidinejad
authored at least 54 papers
between 2012 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
2012
2014
2016
2018
2020
2022
2024
0
5
10
15
9
6
11
16
8
1
1
1
1
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2024
A learning-based data and task placement mechanism for IoT applications in fog computing: a context-aware approach.
J. Supercomput., October, 2024
An All-Inclusive Taxonomy and Critical Review of Blockchain-Assisted Authentication and Session Key Generation Protocols for IoT.
ACM Comput. Surv., July, 2024
Efficient Provably Secure Authentication Protocol for Multidomain IIoT Using a Combined Off-Chain and On-Chain Approach.
IEEE Internet Things J., May, 2024
An Efficient and Autonomous Planning Scheme for Deploying IoT Services in Fog Computing: A Metaheuristic-Based Approach.
IEEE Trans. Comput. Soc. Syst., February, 2024
IEEE Trans. Consumer Electron., February, 2024
Veh. Commun., 2024
Anonymous Blockchain-Assisted Authentication Protocols for Secure Cross-Domain IoD Communications.
IEEE Trans. Netw. Sci. Eng., 2024
Highly-Secure Yet Efficient Blockchain-Based CRL-Free Key Management Protocol for IoT-Enabled Smart Grid Environments.
IEEE Trans. Inf. Forensics Secur., 2024
Untraceable blockchain-assisted authentication and key exchange in medical consortiums.
J. Syst. Archit., 2024
2023
Decentralized Lattice-Based Device-to-Device Authentication for the Edge-Enabled IoT.
IEEE Syst. J., December, 2023
An autonomous proactive content caching method in edge computing environment: a learning-based approach.
Multim. Tools Appl., November, 2023
An Intrusion Detection System using Deep Cellular Learning Automata and Semantic Hierarchy for Enhancing RPL Protocol Security.
Clust. Comput., August, 2023
Softw. Pract. Exp., March, 2023
An efficient data replica placement mechanism using biogeography-based optimization technique in the fog computing environment.
J. Ambient Intell. Humaniz. Comput., 2023
J. Ambient Intell. Humaniz. Comput., 2023
2022
Multim. Tools Appl., November, 2022
ProVerif codes for "Ultra-Lightweight and Secure Blockchain-Assisted Charging Scheduling Scheme For Vehicular Edge Networks By Utilization of NanoPi NEO" (10.1109/TVT.2022.3173076).
Dataset, May, 2022
Ultra-Lightweight and Secure Blockchain-Assisted Charging Scheduling Scheme for Vehicular Edge Networks by Utilization of NanoPi NEO.
IEEE Trans. Veh. Technol., 2022
A metaheuristic-based data replica placement approach for data-intensive IoT applications in the fog computing environment.
Softw. Pract. Exp., 2022
Real-time face detection using circular sliding of the Gabor energy and neural networks.
Signal Image Video Process., 2022
Peer-to-Peer Netw. Appl., 2022
J. Ambient Intell. Humaniz. Comput., 2022
An efficient dynamic service provisioning mechanism in fog computing environment: A learning automata approach.
Expert Syst. Appl., 2022
A cost-efficient IoT service placement approach using whale optimization algorithm in fog computing environment.
Expert Syst. Appl., 2022
Light-Edge: A Lightweight Authentication Protocol for IoT Devices in an Edge-Cloud Environment.
IEEE Consumer Electron. Mag., 2022
An Evolutionary Multi-objective Optimization Technique to Deploy the IoT Services in Fog-enabled Networks: An Autonomous Approach.
Appl. Artif. Intell., 2022
2021
Resource discovery in the Internet of Things integrated with fog computing using Markov learning model.
J. Supercomput., 2021
A latency-aware and energy-efficient computation offloading in mobile fog computing: a hidden Markov model-based approach.
J. Supercomput., 2021
An efficient resource provisioning approach for analyzing cloud workloads: a metaheuristic-based clustering approach.
J. Supercomput., 2021
Toward an autonomic approach for Internet of Things service placement using gray wolf optimization in the fog computing environment.
Softw. Pract. Exp., 2021
An autonomous computation offloading strategy in Mobile Edge Computing: A deep learning-based hybrid approach.
J. Netw. Comput. Appl., 2021
J. Exp. Theor. Artif. Intell., 2021
Autonomous computation offloading and auto-scaling the in the mobile fog computing: a deep reinforcement learning-based approach.
J. Ambient Intell. Humaniz. Comput., 2021
Int. J. Commun. Syst., 2021
Energy-efficient fault-tolerant scheduling in a fog-based smart monitoring application.
Int. J. Ad Hoc Ubiquitous Comput., 2021
Context-Aware Multi-User Offloading in Mobile Edge Computing: a Federated Learning-Based Approach.
J. Grid Comput., 2021
Multiuser context-aware computation offloading in mobile edge computing based on Bayesian learning automata.
Trans. Emerg. Telecommun. Technol., 2021
An efficient method to minimize cross-entropy for selecting multi-level threshold values using an improved human mental search algorithm.
Expert Syst. Appl., 2021
A Technical Report for Light-Edge: A Lightweight Authentication Protocol for IoT Devices in an Edge-Cloud Environment.
CoRR, 2021
Resource provisioning using workload clustering in cloud computing environment: a hybrid approach.
Clust. Comput., 2021
A cost-efficient auto-scaling mechanism for IoT applications in fog computing environment: a deep learning-based approach.
Clust. Comput., 2021
2020
A review on the computation offloading approaches in mobile edge computing: A game-theoretic perspective.
Softw. Pract. Exp., 2020
Joint computation offloading and resource provisioning for edge-cloud computing environment: A machine learning-based approach.
Softw. Pract. Exp., 2020
Sink selection and clustering using fuzzy-based controller for wireless sensor networks.
Int. J. Commun. Syst., 2020
IET Commun., 2020
Resource provisioning for IoT services in the fog computing environment: An autonomic approach.
Comput. Commun., 2020
A survey on the computation offloading approaches in mobile edge computing: A machine learning-based perspective.
Comput. Networks, 2020
Clust. Comput., 2020
Artif. Intell. Rev., 2020
2018
Microprocess. Microsystems, 2018
2013
Generation of potential wells used for quantum codes transmission via a TDMA network communication system.
Secur. Commun. Networks, 2013
2012
IET Commun., 2012