Behnam Bahrak

Orcid: 0000-0003-4429-2511

According to our database1, Behnam Bahrak authored at least 58 papers between 2008 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Understanding trends, patterns, and dynamics in global company acquisitions: a network perspective.
EPJ Data Sci., December, 2024

A novel approach to alleviate wealth compounding in proof-of-stake cryptocurrencies.
Peer Peer Netw. Appl., May, 2024

Understanding Trends, Patterns, and Dynamics in Global Acquisitions: A Network Perspective.
CoRR, 2024

2023
A large-scale analysis of Persian Tweets regarding Covid-19 vaccination.
Soc. Netw. Anal. Min., December, 2023

Diversity dilemmas: uncovering gender and nationality biases in graduate admissions across top North American computer science programs.
EPJ Data Sci., December, 2023

Decentralizing the lightning network: a score-based recommendation strategy for the autopilot system.
Appl. Netw. Sci., December, 2023

A network analysis of the non-fungible token (NFT) market: structural characteristics, evolution, and interactions.
Appl. Netw. Sci., December, 2023

Mixing detection on Bitcoin transactions using statistical patterns.
IET Blockchain, September, 2023

Analysis of Research Trends in Computer Science: A Network Approach.
CoRR, 2023

Forecasting Success of Computer Science Professors and Students Based on Their Academic and Personal Backgrounds.
CoRR, 2023

Mixing Solutions in Bitcoin and Ethereum Ecosystems: A Review and Tutorial.
CoRR, 2023

A Social Network Approach to Analyzing Token Properties and Abnormal Events in Decentralized Exchanges.
CoRR, 2023

A Large-Scale Analysis of Persian Tweets Regarding Covid-19 Vaccination.
CoRR, 2023

An exploratory study of diversity among computer science graduate students at top North American universities.
CoRR, 2023

Predicting Users' Demographic Features Based on Searched Queries and Installed Apps and Games.
Proceedings of the 28th International Computer Conference, Computer Society of Iran, 2023

2022
Quantitative analysis of fanfictions' popularity.
Soc. Netw. Anal. Min., 2022

A novel approach to partial coverage in wireless sensor networks via the roman dominating set.
IET Networks, 2022

Multi-Sender Index Coding Over Linear Networks.
IEEE Commun. Lett., 2022

Modeling Effective Lifespan of Payment Channels.
IACR Cryptol. ePrint Arch., 2022

Throughput Limitation of the Off-chain Payment Networks.
IACR Cryptol. ePrint Arch., 2022

Persian Emotion Detection using ParsBERT and Imbalanced Data Handling Approaches.
CoRR, 2022

RPoA: Redefined Proof of Activity.
CoRR, 2022

Approach to Alleviate Wealth Compounding in Proof-of-Stake Cryptocurrencies.
CoRR, 2022

Analysis of the global trade network using exponential random graph models.
Appl. Netw. Sci., 2022

A new insight to the analysis of co-authorship in Google Scholar.
Appl. Netw. Sci., 2022

AliEdalat at SemEval-2022 Task 4: Patronizing and Condescending Language Detection using Fine-tuned Language Models, BERT+BiGRU, and Ensemble Models.
Proceedings of the 16th International Workshop on Semantic Evaluation, SemEval@NAACL 2022, 2022

UTNLP at SemEval-2022 Task 6: A Comparative Analysis of Sarcasm Detection using generative-based and mutation-based data augmentation.
Proceedings of the 16th International Workshop on Semantic Evaluation, SemEval@NAACL 2022, 2022

Exploring the Similarities of Iranian Influencers with Regards to Content, Relationships and Interactions with Users.
Proceedings of the 27th International Computer Conference, Computer Society of Iran, 2022

A decentralized and trustless e-voting system based on blockchain technology.
Proceedings of the 27th International Computer Conference, Computer Society of Iran, 2022

2021
Privacy in Cross-User Data Deduplication.
Mob. Networks Appl., 2021

Zombie number of the Cartesian product of graphs.
Discret. Appl. Math., 2021

UTNLP at SemEval-2021 Task 5: A Comparative Analysis of Toxic Span Detection using Attention-based, Named Entity Recognition, and Ensemble Models.
Proceedings of the 15th International Workshop on Semantic Evaluation, 2021

Bet and Attack: Incentive Compatible Collaborative Attacks Using Smart Contracts.
Proceedings of the Decision and Game Theory for Security - 12th International Conference, 2021

Sentiment Analysis of Persian-English Code-mixed Texts.
Proceedings of the 26th International Computer Conference, Computer Society of Iran, 2021

2020
A cross-country study on cultural similarities based on book preferences.
Soc. Netw. Anal. Min., 2020

Investigating the effects of Goodreads challenges on individuals reading habits.
CoRR, 2020

A Framework for Collaborative Attack based on Criminal Smart Contract.
CoRR, 2020

A regression framework for predicting user's next location using Call Detail Records.
Comput. Networks, 2020

Short-term Demand Forecasting for Online Car-hailing Services Using Recurrent Neural Networks.
Appl. Artif. Intell., 2020

An Analysis of GitLab's Users and Projects Networks.
Proceedings of the 10th International Symposium on Telecommunications, 2020

2019
Evaluation of big data frameworks for analysis of smart grids.
J. Big Data, 2019

Detecting new generations of threats using attribute-based attack graphs.
IET Inf. Secur., 2019

Real-time Travel Time Estimation Using Matrix Factorization.
CoRR, 2019

Predicting passenger origin-destination in online taxi-hailing systems.
CoRR, 2019

Quantitative analysis of cryptocurrencies transaction graph.
Appl. Netw. Sci., 2019

2017
An Oblivious Transfer Protocol Based on Elgamal Encryption for Preserving Location Privacy.
Wirel. Pers. Commun., 2017

An improved authentication protocol for distributed mobile cloud computing services.
Int. J. Crit. Infrastructure Prot., 2017

2016
Security analysis of an RFID tag search protocol.
Inf. Process. Lett., 2016

2015
Multi-tier exclusion zones for dynamic spectrum sharing.
Proceedings of the 2015 IEEE International Conference on Communications, 2015

2014
Coexistence Decision Making for Spectrum Sharing Among Heterogeneous Wireless Systems.
IEEE Trans. Wirel. Commun., 2014

Security and Enforcement in Spectrum Sharing.
Proc. IEEE, 2014

Protecting the primary users' operational privacy in spectrum sharing.
Proceedings of the IEEE International Symposium on Dynamic Spectrum Access Networks, 2014

2013
A GOST-like Blind Signature Scheme Based on Elliptic Curve Discrete Logarithm Problem
CoRR, 2013

Security of Spectrum Learning in Cognitive Radios
CoRR, 2013

2012
Spectrum access policy reasoning for policy-based cognitive radios.
Comput. Networks, 2012

Ontology-based spectrum access policies for policy-based cognitive radios.
Proceedings of the IEEE International Symposium on Dynamic Spectrum Access Networks, 2012

2008
Impossible differential attack on seven-round AES-128.
IET Inf. Secur., 2008

Impossible Differential Cryptanalysis of Safer++.
Proceedings of the 2008 International Conference on Security & Management, 2008


  Loading...