Amir Jalaly Bidgoly

Orcid: 0000-0002-8574-3537

Affiliations:
  • University of Qom, Iran


According to our database1, Amir Jalaly Bidgoly authored at least 39 papers between 2009 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Exploiting Deep Neural Networks as Covert Channels.
IEEE Trans. Dependable Secur. Comput., 2024

Edge model: An efficient method to identify and reduce the effectiveness of malicious clients in federated learning.
Future Gener. Comput. Syst., 2024

Benchmarking robustness and privacy-preserving methods in federated learning.
Future Gener. Comput. Syst., 2024

ASSOCIATE: A simulator for assessing soft security in the Cognitive Internet of Things.
Comput. Commun., 2024

An efficient cloud manufacturing service composition approach using deep reinforcement learning.
Comput. Ind. Eng., 2024

2023
A comprehensive soft security model for Cognitive Internet of Things.
Internet Things, October, 2023

Bit flipping attack detection in low power wide area networks using a deep learning approach.
Peer Peer Netw. Appl., August, 2023

Robustness evaluation of trust and reputation systems using a deep reinforcement learning approach.
Comput. Oper. Res., August, 2023

Multi-thread hierarchical deep model for context-aware sentiment analysis.
J. Inf. Sci., February, 2023

Clustering-based Sequence to Sequence Model for Generative Question Answering in a Low-resource Language.
ACM Trans. Asian Low Resour. Lang. Inf. Process., January, 2023

A Novel Semi-Supervised Adversarially Learned Meta-Classifier for Detecting Neural Trojan Attacks.
IEEE Access, 2023

2022
Zipf's law analysis on the leaked Iranian users' passwords.
J. Comput. Virol. Hacking Tech., 2022

Android malware detection using network traffic based on sequential deep learning models.
Softw. Pract. Exp., 2022

Fake news detection on social media using a natural language inference approach.
Multim. Tools Appl., 2022

Lightweight Identification of Android Malware with Knowledge Distillation and Deep Learning Approach.
ISC Int. J. Inf. Secur., 2022

A fair consensus model in blockchain based on computational reputation.
Expert Syst. Appl., 2022

Personalization of the collaborator recommendation system in multi-layer scientific social networks: A case study of ResearchGate.
Expert Syst. J. Knowl. Eng., 2022

Compromised account detection using authorship verification: a novel approach.
CoRR, 2022

A novel reputation-based consensus framework (RCF) in distributed ledger technology.
Comput. Commun., 2022

Modeling Tweet Dependencies with Graph Convolutional Networks for Sentiment Analysis.
Cogn. Comput., 2022

Recommendation system using a deep learning and graph analysis approach.
Comput. Intell., 2022

2021
Probabilistic analysis of trust based decision making in hostile environments.
Knowl. Based Syst., 2021

A novel method for recommendation systems using invasive weed optimization.
CoRR, 2021

2020
FNID: Fake News Inference Dataset.
Dataset, August, 2020

A new task scheduling mechanism in grid computing using trust model.
Multiagent Grid Syst., 2020

A systematic survey on collaborator finding systems in scientific social networks.
Knowl. Inf. Syst., 2020

A novel reward and penalty trust evaluation model based on confidence interval using Petri Net.
J. Netw. Comput. Appl., 2020

Robustness verification of soft security systems.
J. Inf. Secur. Appl., 2020

A Robust Opinion Spam Detection Method Against Malicious Attackers in Social Media.
CoRR, 2020

A survey on methods and challenges in EEG based authentication.
Comput. Secur., 2020

Cipher chaining key re-synchronization in LPWAN IoT network using a deep learning approach.
Comput. Networks, 2020

2019
Ransomware detection using process mining and classification algorithms.
Proceedings of the 16th International ISC (Iranian Society of Cryptology) Conference on Information Security and Cryptology, 2019

2016
Modeling and Quantitative Verification of Trust Systems Against Malicious Attackers.
Comput. J., 2016

Benchmarking reputation systems: A quantitative verification approach.
Comput. Hum. Behav., 2016

2015
Modelling and Quantitative Verification of Reputation Systems Against Malicious Attackers.
Comput. J., 2015

2013
SimGine: A simulation engine for stochastic discrete-event systems based on SDES description.
Simul., 2013

Quantitative verification of beta reputation system using PRISM probabilistic model checker.
Proceedings of the 10th International ISC Conference on Information Security and Cryptology, 2013

2009
Implementation of Coloured Stochastic Activity Networks within the PDETool Framework.
Proceedings of the Third Asia International Conference on Modelling & Simulation, 2009

PDETool: A Multi-formalism Modeling Tool for Discrete-Event Systems Based on SDES Description.
Proceedings of the Applications and Theory of Petri Nets, 2009


  Loading...