Hamid Haj Seyyed Javadi

Orcid: 0000-0003-0082-036X

Affiliations:
  • Shahed University, Tehran, Iran
  • Amirkabir University of Technology, Tehran, Iran (PhD 2002)


According to our database1, Hamid Haj Seyyed Javadi authored at least 84 papers between 2009 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
A semantic model based on ensemble learning and attribute-based encryption to increase security of smart buildings in fog computing.
J. Supercomput., December, 2024

Identifying People's Faces in Smart Banking Systems Using Artificial Neural Networks.
Int. J. Comput. Intell. Syst., December, 2024

An efficient optimization algorithm for nonlinear 2D fractional optimal control problems.
J. Supercomput., April, 2024

An efficient edge caching approach for SDN-based IoT environments utilizing the moth flame clustering algorithm.
Clust. Comput., April, 2024

Toward caching techniques in edge computing over SDN-IoT architecture: a review of challenges, solutions, and open issues.
Multim. Tools Appl., January, 2024

Belief Mining in Persian Texts Based on Deep Learning and Users' Opinions.
IEEE Trans. Affect. Comput., 2024

Social networks data analytical approaches for trust-based recommender systems: A systematic literature review.
Int. J. Commun. Syst., 2024

Fuzzy Identity Based Encryption with a flexible threshold value.
IACR Cryptol. ePrint Arch., 2024

Reducing the computational complexity of fuzzy identity-based encryption from lattice.
IACR Cryptol. ePrint Arch., 2024

2023
Kernel Optimization for Reducing Core Vector Machine Classification Error.
Neural Process. Lett., December, 2023

Composition of caching and classification in edge computing based on quality optimization for SDN-based IoT healthcare solutions.
J. Supercomput., October, 2023

Correction to: Personality-based and trust-aware products recommendation in social networks.
Appl. Intell., July, 2023

Implicit Lightweight Proxy Based Key Agreement for the Internet of Things (ILPKA).
Wirel. Pers. Commun., June, 2023

Using recommender clustering to improve quality of services with sustainable virtual machines in cloud computing.
Clust. Comput., April, 2023

A pricing approach for optimal use of computing resources in cloud federation.
J. Supercomput., 2023

A secure remote health monitoring model for early disease diagnosis in cloud-based IoT environment.
Pers. Ubiquitous Comput., 2023

Localization of sensor nodes in the Internet of Things using fuzzy logic and learning automata.
J. Intell. Fuzzy Syst., 2023

Extended array model of star capacity-aware delay-based next controller placement problem for multiple controller failures in software-defined wide area networks.
J. Ambient Intell. Humaniz. Comput., 2023

Fuzzy Q-learning approach for autonomic resource provisioning of IoT applications in fog computing environments.
J. Ambient Intell. Humaniz. Comput., 2023

Personality-based and trust-aware products recommendation in social networks.
Appl. Intell., 2023

2022
A cost-aware approach for cloud federation formation.
Trans. Emerg. Telecommun. Technol., December, 2022

A High Resilience and High Scalable Key Pre-distribution Scheme Based on Combinatorial Designs for Resource-Constrained Devices in IoT Networks.
Wirel. Pers. Commun., 2022

Star capacity-aware latency-based next controller placement problem with considering single controller failure in software-defined wide-area networks.
J. Supercomput., 2022

A self-learning approach for proactive resource and service provisioning in fog environment.
J. Supercomput., 2022

Privacy-aware cloud service composition based on QoS optimization in Internet of Things.
J. Ambient Intell. Humaniz. Comput., 2022

Performance improvement of Routing Protocol for Low-Power and Lossy Networks protocol in an Internet of Things-based smart retail system.
Int. J. Commun. Syst., 2022

Analytical model for task offloading in a fog computing system with batch-size-dependent service.
Comput. Commun., 2022

A cooperative approach for combining particle swarm optimization and differential evolution algorithms to solve single-objective optimization problems.
Appl. Intell., 2022

2021
A survey of key pre-distribution schemes based on combinatorial designs for resource-constrained devices in the IoT network.
Wirel. Networks, 2021

Efficient and dynamic verifiable multi-keyword searchable symmetric encryption with full security.
Multim. Tools Appl., 2021

A new resource allocation method in fog computing via non-cooperative game theory.
J. Intell. Fuzzy Syst., 2021

Dynamic secure multi-keyword ranked search over encrypted cloud data.
J. Inf. Secur. Appl., 2021

Privacy Preserving Attribute-Based Encryption with Conjunctive Keyword Search for E-health Records in Cloud.
ISC Int. J. Inf. Secur., 2021

Providing a Hybrid Cryptography Algorithm for Lightweight Authentication Protocol in RFID with Urban Traffic Usage Case.
ISC Int. J. Inf. Secur., 2021

Internet of Things architecture challenges: A systematic review.
Int. J. Commun. Syst., 2021

Fair multi-owner search over encrypted data with forward and backward privacy in cloud-assisted Internet of Things.
Future Gener. Comput. Syst., 2021

A proactive fog service provisioning framework for Internet of Things applications: An autonomic approach.
Trans. Emerg. Telecommun. Technol., 2021

Security in fog computing: A systematic review on issues, challenges and solutions.
Comput. Sci. Rev., 2021

Lightweight Key-Dependent Dynamic S-Boxes based on Hyperelliptic Curve for IoT Devices.
CoRR, 2021

A novel key pre-distribution scheme based on μ-PBIBD combinatorial design in the resource-constrained IoT network.
CoRR, 2021

Edge computing in SDN-IoT networks: a systematic review of issues, challenges and solutions.
Clust. Comput., 2021

2020
A Full Connectable and High Scalable Key Pre-distribution Scheme Based on Combinatorial Designs for Resource-Constrained Devices in IoT Network.
Wirel. Pers. Commun., 2020

A secure key-aggregate authentication cryptosystem for data sharing in dynamic cloud storage.
Multim. Tools Appl., 2020

Anomaly Detection in Smart Homes Using Bayesian Networks.
KSII Trans. Internet Inf. Syst., 2020

Key pre-distribution scheme based on transversal design in large mobile fog networks with multi-clouds.
J. Inf. Secur. Appl., 2020

Corrigendum to "Preventing Sybil Attacks in P2P File Sharing Networks Based on the Evolutionary Game Model" [Information Sciences 470 (2019) 94-108].
Inf. Sci., 2020

A dynamic fog service provisioning approach for IoT applications.
Int. J. Commun. Syst., 2020

2019
Topology Control in MANETs Using the Bayesian Pursuit Algorithm.
Wirel. Pers. Commun., 2019

Load balancing in join algorithms for skewed data in MapReduce systems.
J. Supercomput., 2019

Cyber Kill Chain-Based Taxonomy of Advanced Persistent Threat Actors: Analogy of Tactics, Techniques, and Procedures.
J. Inf. Process. Syst., 2019

Residual design of sink localization algorithms for wireless sensor networks.
J. High Speed Networks, 2019

Preventing Sybil attacks in P2P file sharing networks based on the evolutionary game model.
Inf. Sci., 2019

Verifiable ranked search over encrypted data with forward and backward privacy.
Future Gener. Comput. Syst., 2019

A medical monitoring scheme and health-medical service composition model in cloud-based IoT platform.
Trans. Emerg. Telecommun. Technol., 2019

A hierarchical key pre-distribution scheme for fog networks.
Concurr. Comput. Pract. Exp., 2019

Internet of Things applications: A systematic review.
Comput. Networks, 2019

A layered security architecture based on cyber kill chain against advanced persistent threats.
Proceedings of the Security and Privacy for Big Data, Cloud Computing and Applications, 2019

2018
Cog-MAC Protocol: Channel Allocation in Cognitive Ad Hoc Networks Based on the Game of Learning Automata.
Wirel. Pers. Commun., 2018

Key-management scheme for wireless sensor networks based on merging blocks of symmetric design.
Wirel. Networks, 2018

Load balancing in reducers for skewed data in MapReduce systems by using scalable simple random sampling.
J. Supercomput., 2018

Identification of Sybil attacks on social networks using a framework based on user interactions.
Secur. Priv., 2018

A new method of trust mirroring estimation based on social networks parameters by fuzzy system.
Int. J. Mach. Learn. Cybern., 2018

TCLAB: A New Topology Control Protocol in Cognitive MANETs Based on Learning Automata.
J. Netw. Syst. Manag., 2018

Service composition approaches in IoT: A systematic review.
J. Netw. Comput. Appl., 2018

Detection and mitigation of pulse-delay attacks in pairwise-secured wireless sensor networks.
Int. J. High Perform. Comput. Netw., 2018

Unital Design Based Sink Location Service for Wireless Sensor Networks.
IEEE Access, 2018

2017
A Novel Scalable Key Pre-distribution Scheme for Wireless Sensor Networks Based on Residual Design.
Wirel. Pers. Commun., 2017

Securing Underwater Sensor Networks Against Routing Attacks.
Wirel. Pers. Commun., 2017

A three level fuzzy system for evaluating the trust of single web services.
J. Intell. Fuzzy Syst., 2017

Trust estimation of the semantic web using semantic web clustering.
J. Exp. Theor. Artif. Intell., 2017

2016
On Complexity of Persian Orthography: L-Systems Approach.
Complex Syst., 2016

2015
A dynamic key management scheme for dynamic wireless sensor networks.
Secur. Commun. Networks, 2015

Application-specific hybrid symmetric design of key pre-distribution for wireless sensor networks.
Secur. Commun. Networks, 2015

The Hidden Subgraph Problem.
CoRR, 2015

Solving the time-fractional diffusion equation via Sinc-Haar collocation method.
Appl. Math. Comput., 2015

2014
Key Predistribution Scheme for Clustered Hierarchical Wireless Sensor Networks based on Combinatorial Designs.
Secur. Commun. Networks, 2014

2013
Optimistic Selection of Cluster Heads Based on Facility Location Problem in Cluster-Based Routing Protocols.
Wirel. Pers. Commun., 2013

Boundary query solution using convex hull algorithm.
J. Exp. Theor. Artif. Intell., 2013

2012
Bee Colony System: Preciseness and Speed in Discrete Optimization.
Int. J. Artif. Intell. Tools, 2012

2010
SIMD Bpriori Algorithms.
Proceedings of the Fourth UKSim European Symposium on Computer Modeling and Simulation, 2010

A Meta Heuristic Solution for Closest String Problem Using Ant Colony System.
Proceedings of the Distributed Computing and Artificial Intelligence, 2010

Multi-Join Query Optimization Using the Bees Algorithm.
Proceedings of the Distributed Computing and Artificial Intelligence, 2010

2009
Design an Efficient System for Intrusion Detection via Evolutionary Fuzzy System.
Proceedings of the UKSim'11, 2009

Using Particle Swarm Optimization for Robot Path Planning in Dynamic Environments with Moving Obstacles and Target.
Proceedings of the EMS 2009, 2009


  Loading...