Haleh Amintoosi

Orcid: 0000-0002-1447-8086

According to our database1, Haleh Amintoosi authored at least 36 papers between 2005 and 2025.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2025
A robust PRNU-based source camera attribution with convolutional neural networks.
J. Supercomput., January, 2025

2024
A clarity and fairness aware framework for selecting workers in competitive crowdsourcing tasks.
Computing, September, 2024

REACH: Robust Efficient Authentication for Crowdsensing-based Healthcare.
J. Supercomput., April, 2024

2023
DiMo: discovery of microRNA motifs using deep learning and motif embedding.
Briefings Bioinform., May, 2023

Secure communication in CloudIoT through design of a lightweight authentication and session key agreement scheme.
Int. J. Commun. Syst., 2023

Machine Learning in Digital Forensics: A Systematic Literature Review.
CoRR, 2023

2022
A Trust-Based Experience-Aware Framework for Integrating Fuzzy Recommendations.
IEEE Trans. Serv. Comput., 2022

AQA: An Adaptive Quality Assessment Framework for Online Review Systems.
IEEE Trans. Serv. Comput., 2022

On the Suitability of Improved TrustChain for Smartphones.
ISC Int. J. Inf. Secur., 2022

Secure and Authenticated Data Access and Sharing Model for Smart Wearable Systems.
IEEE Internet Things J., 2022

Sharing Reputation Data Across Online Communities.
IEEE Internet Comput., 2022

Slight: A lightweight authentication scheme for smart healthcare services.
Comput. Electr. Eng., 2022

2021
On the Security of "Secure and Lightweight Authentication with Key Agreement for Smart Wearable Systems".
Wirel. Pers. Commun., 2021

A provably secure and lightweight authentication scheme for Internet of Drones for smart city surveillance.
J. Syst. Archit., 2021

SCiMet: Stable, sCalable and reliable Metric-based framework for quality assessment in collaborative content generation systems.
J. Informetrics, 2021

Intrusion Detection System Based on Gradient Corrected Online Sequential Extreme Learning Machine.
IEEE Access, 2021

An Iterative Model for Quality Assessment in Collaborative Content Generation Systems.
Proceedings of the Service-Oriented Computing - ICSOC 2021 Workshops, 2021

2020
A Systematic Literature Review of Integration of Blockchain and Artificial Intelligence.
Proceedings of the Blockchain Cybersecurity, Trust and Privacy, 2020

Perfect forward secrecy via an ECC-based authentication scheme for SIP in VoIP.
J. Supercomput., 2020

A secure and robust elliptic curve cryptography-based mutual authentication scheme for session initiation protocol.
Secur. Priv., 2020

A provably secure ECC-based roaming authentication scheme for global mobility networks.
J. Inf. Secur. Appl., 2020

An efficient storage-optimizing tick data clustering model.
Turkish J. Electr. Eng. Comput. Sci., 2020

Enhanced schemes for data fragmentation, allocation, and replication in distributed database systems.
Comput. Syst. Sci. Eng., 2020

2019
Cryptanalysis of Khatoon et al.'s ECC-based Authentication Protocol for Healthcare Systems.
CoRR, 2019

2018
DNS Tunneling Detection Method Based on Multilabel Support Vector Machine.
Secur. Commun. Networks, 2018

2017
Trust and Privacy Challenges in Social Participatory Networks.
Proceedings of the Service Research and Innovation - 5th and 6th Australasian Symposium, 2017

A Game-Theoretic Approach to Quality Improvement in Crowdsourcing Tasks.
Proceedings of the Service Research and Innovation - 5th and 6th Australasian Symposium, 2017

2015
Trust-based privacy-aware participant selection in social participatory sensing.
J. Inf. Secur. Appl., 2015

A socially-aware incentive scheme for social participatory sensing.
Proceedings of the Tenth IEEE International Conference on Intelligent Sensors, 2015

2014
Trust and Privacy in Social Participatory Sensing.
PhD thesis, 2014

A Reputation Framework for Social Participatory Sensing Systems.
Mob. Networks Appl., 2014

2013
Providing Trustworthy Contributions via a Reputation Framework in Social Participatory Sensing Systems.
CoRR, 2013

Privacy-Aware Trust-Based Recruitment in Social Participatory Sensing.
Proceedings of the Mobile and Ubiquitous Systems: Computing, Networking, and Services, 2013

A Trust-Based Recruitment Framework for Multi-hop Social Participatory Sensing.
Proceedings of the IEEE International Conference on Distributed Computing in Sensor Systems, 2013

2012
A Trust Framework for Social Participatory Sensing Systems.
Proceedings of the Mobile and Ubiquitous Systems: Computing, Networking, and Services, 2012

2005
Design and performance evaluation of a fuzzy based traffic conditioner for differentiated services.
Comput. Networks, 2005


  Loading...