Iman Vakilinia

Orcid: 0000-0003-3015-2518

According to our database1, Iman Vakilinia authored at least 36 papers between 2013 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Crowdsensing the Speed Violation Detection with Privacy Preservation.
Proceedings of the 100th IEEE Vehicular Technology Conference, 2024

Adaptive Row Activation and Refresh a Hybrid Approach to Mitigate RowHammer.
Proceedings of the 15th IEEE Annual Ubiquitous Computing, 2024

Handling Imbalanced Data for Detecting Scams in Ethereum Transactions Using Sampling Techniques.
Proceedings of the 12th International Symposium on Digital Forensics and Security, 2024

Analyzing Cryptocurrency Social Media for Price Forecasting and Scam Detection.
Proceedings of the 12th International Symposium on Digital Forensics and Security, 2024

2023
LoRa Technology in Flying Ad Hoc Networks: A Survey of Challenges and Open Issues.
Sensors, March, 2023

An Incentive-Compatible Mechanism for Decentralized Storage Network.
IEEE Trans. Netw. Sci. Eng., 2023

Scams and Solutions in Cryptocurrencies - A Survey Analyzing Existing Machine Learning Models.
Inf., 2023

2022
RewardRating: A Mechanism Design Approach to Improve Rating Systems.
Games, 2022

Cryptocurreny Giveaway Scam with YouTube Live Stream.
CoRR, 2022

Cryptocurrency Giveaway Scam with YouTube Live Stream.
Proceedings of the 13th IEEE Annual Ubiquitous Computing, 2022

Building Framework and Infrastructure to Assist a Minority Serving Institution (MSI) in Cybersecurity Program Development.
Proceedings of the International Conference on Computational Science and Computational Intelligence, 2022

2021
Trading Privacy through Randomized Response.
Proceedings of the 2021 IEEE Conference on Computer Communications Workshops, 2021

A Mechanism Design Approach to Solve Ransomware Dilemmas.
Proceedings of the Decision and Game Theory for Security - 12th International Conference, 2021

2020
Vulnerability market as a public-good auction with privacy preservation.
Comput. Secur., 2020

Privacy Preserving Path Planning in an Adversarial Zone.
Proceedings of the 2020 International Symposium on Networks, Computers and Communications, 2020

Analyzing Variation Among IoT Botnets Using Medium Interaction Honeypots.
Proceedings of the 10th Annual Computing and Communication Workshop and Conference, 2020

BloCyNfo-Share: Blockchain based Cybersecurity Information Sharing with Fine Grained Access Control.
Proceedings of the 10th Annual Computing and Communication Workshop and Conference, 2020

2019
Collaborative Analysis of Cybersecurity Information Sharing.
PhD thesis, 2019

A Coalitional Cyber-Insurance Framework for a Common Platform.
IEEE Trans. Inf. Forensics Secur., 2019

Fair and private rewarding in a coalitional game of cybersecurity information sharing.
IET Inf. Secur., 2019

Pooling Approach for Task Allocation in the Blockchain Based Decentralized Storage Network.
Proceedings of the 15th International Conference on Network and Service Management, 2019

Privacy Preserving Cyber Threat Information Sharing and Learning for Cyber Defense.
Proceedings of the IEEE 9th Annual Computing and Communication Workshop and Conference, 2019

2018
Crowdfunding the Insurance of a Cyber-Product Using Blockchain.
Proceedings of the 9th IEEE Annual Ubiquitous Computing, 2018

Automated Structured Threat Information Expression (STIX) Document Generation with Privacy Preservation.
Proceedings of the 9th IEEE Annual Ubiquitous Computing, 2018

Sharing Susceptible Passwords as Cyber Threat Intelligence Feed.
Proceedings of the 2018 IEEE Military Communications Conference, 2018

2017
Privacy-preserving cybersecurity information exchange mechanism.
Proceedings of the International Symposium on Performance Evaluation of Computer and Telecommunication Systems, 2017

Attribute based sharing in cybersecurity information exchange framework.
Proceedings of the International Symposium on Performance Evaluation of Computer and Telecommunication Systems, 2017

Green process offloading in smart home.
Proceedings of the 28th IEEE Annual International Symposium on Personal, 2017

3-Way game model for privacy-preserving cybersecurity information exchange framework.
Proceedings of the 2017 IEEE Military Communications Conference, 2017

A coalitional game theory approach for cybersecurity information sharing.
Proceedings of the 2017 IEEE Military Communications Conference, 2017

Evolving sharing strategies in cybersecurity information exchange framework.
Proceedings of the Genetic and Evolutionary Computation Conference, 2017

Three Layer Game Theoretic Decision Framework for Cyber-Investment and Cyber-Insurance.
Proceedings of the Decision and Game Theory for Security - 8th International Conference, 2017

2016
Privacy-Preserving Data Aggregation over Incomplete Data for Crowdsensing.
Proceedings of the 2016 IEEE Global Communications Conference, 2016

2013
Cross-Layered Secure and QoS Aware Design of VOIP over Wireless Ad-Hoc Networks.
Int. J. Bus. Data Commun. Netw., 2013

QoS aware energy efficient resource allocation in wireless cooperative OFDMA relay networks.
Proceedings of the 6th Joint IFIP Wireless and Mobile Networking Conference, 2013

Multi-path multi-channel protocol design for secure qos-aware VOIP in wireless ad-hoc networks.
Proceedings of the 6th Joint IFIP Wireless and Mobile Networking Conference, 2013


  Loading...