Hamid Haj Seyyed Javadi
Orcid: 0000-0003-0082-036XAffiliations:
- Shahed University, Tehran, Iran
- Amirkabir University of Technology, Tehran, Iran (PhD 2002)
According to our database1,
Hamid Haj Seyyed Javadi
authored at least 84 papers
between 2009 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2024
A semantic model based on ensemble learning and attribute-based encryption to increase security of smart buildings in fog computing.
J. Supercomput., December, 2024
Identifying People's Faces in Smart Banking Systems Using Artificial Neural Networks.
Int. J. Comput. Intell. Syst., December, 2024
An efficient optimization algorithm for nonlinear 2D fractional optimal control problems.
J. Supercomput., April, 2024
An efficient edge caching approach for SDN-based IoT environments utilizing the moth flame clustering algorithm.
Clust. Comput., April, 2024
Toward caching techniques in edge computing over SDN-IoT architecture: a review of challenges, solutions, and open issues.
Multim. Tools Appl., January, 2024
IEEE Trans. Affect. Comput., 2024
Social networks data analytical approaches for trust-based recommender systems: A systematic literature review.
Int. J. Commun. Syst., 2024
IACR Cryptol. ePrint Arch., 2024
Reducing the computational complexity of fuzzy identity-based encryption from lattice.
IACR Cryptol. ePrint Arch., 2024
2023
Neural Process. Lett., December, 2023
Composition of caching and classification in edge computing based on quality optimization for SDN-based IoT healthcare solutions.
J. Supercomput., October, 2023
Correction to: Personality-based and trust-aware products recommendation in social networks.
Appl. Intell., July, 2023
Wirel. Pers. Commun., June, 2023
Using recommender clustering to improve quality of services with sustainable virtual machines in cloud computing.
Clust. Comput., April, 2023
J. Supercomput., 2023
A secure remote health monitoring model for early disease diagnosis in cloud-based IoT environment.
Pers. Ubiquitous Comput., 2023
Localization of sensor nodes in the Internet of Things using fuzzy logic and learning automata.
J. Intell. Fuzzy Syst., 2023
Extended array model of star capacity-aware delay-based next controller placement problem for multiple controller failures in software-defined wide area networks.
J. Ambient Intell. Humaniz. Comput., 2023
Fuzzy Q-learning approach for autonomic resource provisioning of IoT applications in fog computing environments.
J. Ambient Intell. Humaniz. Comput., 2023
Appl. Intell., 2023
2022
Trans. Emerg. Telecommun. Technol., December, 2022
A High Resilience and High Scalable Key Pre-distribution Scheme Based on Combinatorial Designs for Resource-Constrained Devices in IoT Networks.
Wirel. Pers. Commun., 2022
Star capacity-aware latency-based next controller placement problem with considering single controller failure in software-defined wide-area networks.
J. Supercomput., 2022
A self-learning approach for proactive resource and service provisioning in fog environment.
J. Supercomput., 2022
Privacy-aware cloud service composition based on QoS optimization in Internet of Things.
J. Ambient Intell. Humaniz. Comput., 2022
Performance improvement of Routing Protocol for Low-Power and Lossy Networks protocol in an Internet of Things-based smart retail system.
Int. J. Commun. Syst., 2022
Analytical model for task offloading in a fog computing system with batch-size-dependent service.
Comput. Commun., 2022
A cooperative approach for combining particle swarm optimization and differential evolution algorithms to solve single-objective optimization problems.
Appl. Intell., 2022
2021
A survey of key pre-distribution schemes based on combinatorial designs for resource-constrained devices in the IoT network.
Wirel. Networks, 2021
Efficient and dynamic verifiable multi-keyword searchable symmetric encryption with full security.
Multim. Tools Appl., 2021
J. Intell. Fuzzy Syst., 2021
J. Inf. Secur. Appl., 2021
Privacy Preserving Attribute-Based Encryption with Conjunctive Keyword Search for E-health Records in Cloud.
ISC Int. J. Inf. Secur., 2021
Providing a Hybrid Cryptography Algorithm for Lightweight Authentication Protocol in RFID with Urban Traffic Usage Case.
ISC Int. J. Inf. Secur., 2021
Int. J. Commun. Syst., 2021
Fair multi-owner search over encrypted data with forward and backward privacy in cloud-assisted Internet of Things.
Future Gener. Comput. Syst., 2021
A proactive fog service provisioning framework for Internet of Things applications: An autonomic approach.
Trans. Emerg. Telecommun. Technol., 2021
Comput. Sci. Rev., 2021
Lightweight Key-Dependent Dynamic S-Boxes based on Hyperelliptic Curve for IoT Devices.
CoRR, 2021
A novel key pre-distribution scheme based on μ-PBIBD combinatorial design in the resource-constrained IoT network.
CoRR, 2021
Edge computing in SDN-IoT networks: a systematic review of issues, challenges and solutions.
Clust. Comput., 2021
2020
A Full Connectable and High Scalable Key Pre-distribution Scheme Based on Combinatorial Designs for Resource-Constrained Devices in IoT Network.
Wirel. Pers. Commun., 2020
A secure key-aggregate authentication cryptosystem for data sharing in dynamic cloud storage.
Multim. Tools Appl., 2020
KSII Trans. Internet Inf. Syst., 2020
Key pre-distribution scheme based on transversal design in large mobile fog networks with multi-clouds.
J. Inf. Secur. Appl., 2020
Corrigendum to "Preventing Sybil Attacks in P2P File Sharing Networks Based on the Evolutionary Game Model" [Information Sciences 470 (2019) 94-108].
Inf. Sci., 2020
Int. J. Commun. Syst., 2020
2019
Wirel. Pers. Commun., 2019
J. Supercomput., 2019
Cyber Kill Chain-Based Taxonomy of Advanced Persistent Threat Actors: Analogy of Tactics, Techniques, and Procedures.
J. Inf. Process. Syst., 2019
J. High Speed Networks, 2019
Preventing Sybil attacks in P2P file sharing networks based on the evolutionary game model.
Inf. Sci., 2019
Future Gener. Comput. Syst., 2019
A medical monitoring scheme and health-medical service composition model in cloud-based IoT platform.
Trans. Emerg. Telecommun. Technol., 2019
Concurr. Comput. Pract. Exp., 2019
A layered security architecture based on cyber kill chain against advanced persistent threats.
Proceedings of the Security and Privacy for Big Data, Cloud Computing and Applications, 2019
2018
Cog-MAC Protocol: Channel Allocation in Cognitive Ad Hoc Networks Based on the Game of Learning Automata.
Wirel. Pers. Commun., 2018
Key-management scheme for wireless sensor networks based on merging blocks of symmetric design.
Wirel. Networks, 2018
Load balancing in reducers for skewed data in MapReduce systems by using scalable simple random sampling.
J. Supercomput., 2018
Identification of Sybil attacks on social networks using a framework based on user interactions.
Secur. Priv., 2018
A new method of trust mirroring estimation based on social networks parameters by fuzzy system.
Int. J. Mach. Learn. Cybern., 2018
TCLAB: A New Topology Control Protocol in Cognitive MANETs Based on Learning Automata.
J. Netw. Syst. Manag., 2018
J. Netw. Comput. Appl., 2018
Detection and mitigation of pulse-delay attacks in pairwise-secured wireless sensor networks.
Int. J. High Perform. Comput. Netw., 2018
IEEE Access, 2018
2017
A Novel Scalable Key Pre-distribution Scheme for Wireless Sensor Networks Based on Residual Design.
Wirel. Pers. Commun., 2017
Wirel. Pers. Commun., 2017
J. Intell. Fuzzy Syst., 2017
J. Exp. Theor. Artif. Intell., 2017
2016
2015
Secur. Commun. Networks, 2015
Application-specific hybrid symmetric design of key pre-distribution for wireless sensor networks.
Secur. Commun. Networks, 2015
Appl. Math. Comput., 2015
2014
Key Predistribution Scheme for Clustered Hierarchical Wireless Sensor Networks based on Combinatorial Designs.
Secur. Commun. Networks, 2014
2013
Optimistic Selection of Cluster Heads Based on Facility Location Problem in Cluster-Based Routing Protocols.
Wirel. Pers. Commun., 2013
J. Exp. Theor. Artif. Intell., 2013
2012
Int. J. Artif. Intell. Tools, 2012
2010
Proceedings of the Fourth UKSim European Symposium on Computer Modeling and Simulation, 2010
Proceedings of the Distributed Computing and Artificial Intelligence, 2010
Proceedings of the Distributed Computing and Artificial Intelligence, 2010
2009
Proceedings of the UKSim'11, 2009
Using Particle Swarm Optimization for Robot Path Planning in Dynamic Environments with Moving Obstacles and Target.
Proceedings of the EMS 2009, 2009