Mahdi Khosravy

Orcid: 0000-0001-5375-391X

According to our database1, Mahdi Khosravy authored at least 36 papers between 2009 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Deep Learning Security Breach by Evolutionary Universal Perturbation Attack (EUPA).
IEEE Trans. Artif. Intell., November, 2024

Human-Collaborative Artificial Intelligence Along With Social Values in Industry 5.0: A Survey of the State-of-the-Art.
IEEE Trans. Cogn. Dev. Syst., February, 2024

Multi-criteria evolutionary optimization of a traffic light using genetics algorithm and teaching-learning based optimization.
Expert Syst. J. Knowl. Eng., February, 2024

2023
Social IoT Approach to Cyber Defense of a Deep-Learning-Based Recognition System in Front of Media Clones Generated by Model Inversion Attack.
IEEE Trans. Syst. Man Cybern. Syst., May, 2023

2022
Underwater IoT Network by Blind MIMO OFDM Transceiver Based on Probabilistic Stone's Blind Source Separation.
ACM Trans. Sens. Networks, 2022

Lightweight Computational Intelligence for IoT Health Monitoring of Off-Road Vehicles: Enhanced Selection Log-Scaled Mutation GA Structured ANN.
IEEE Trans. Ind. Informatics, 2022

Model Inversion Attack by Integration of Deep Generative Models: Privacy-Sensitive Face Generation From a Face Recognition System.
IEEE Trans. Inf. Forensics Secur., 2022

Lightweight Artificial Intelligence Technology for Health Diagnosis of Agriculture Vehicles: Parallel Evolving Artificial Neural Networks by Genetic Algorithm.
Int. J. Parallel Program., 2022

JCI-CAC: An Efficient Crosstalk Avoidance Code Considering Joint Capacitive and Inductive Effects.
IEEE Access, 2022

UP-Down OLC: New One-Lambda Crosstalk Avoidance Code Design Based on 5-Wire Model.
IEEE Access, 2022

When AI Facilitates Trust Violation: An Ethical Report on Deep Model Inversion Privacy Attack.
Proceedings of the International Conference on Computational Science and Computational Intelligence, 2022

2021
Recognition of Power Quality Issues Associated With Grid Integrated Solar Photovoltaic Plant in Experimental Framework.
IEEE Syst. J., 2021

Model Inversion Attack: Analysis under Gray-box Scenario on Deep Learning based Face Recognition System.
KSII Trans. Internet Inf. Syst., 2021

Optimization of Optical Instruments Under Fluctuations of System Parameters.
Int. J. Ambient Comput. Intell., 2021

Random Acquisition in Compressive Sensing: A Comprehensive Overview.
Int. J. Ambient Comput. Intell., 2021

Smart green ocean underwater IoT network by ICA-based acoustic blind MIMO OFDM transceiver.
Earth Sci. Informatics, 2021

Supraharmonic estimation by polyphase DFT filter bank.
Comput. Electr. Eng., 2021

Neighborhood Base Matched Morphological Filters: Cross-fertilization with Linear Lowpass Filtering.
Proceedings of the International Conference on Computational Science and Computational Intelligence, 2021

2020
Chirp Code Deterministic Compressive Sensing: Analysis on Power Signal.
Information Technology and Intelligent Transportation Systems, 2020

Mendelian evolutionary theory optimization algorithm.
Soft Comput., 2020

Probabilistic Stone's Blind Source Separation with application to channel estimation and multi-node identification in MIMO IoT green communication and multimedia systems.
Comput. Commun., 2020

Economic data analytic AI technique on IoT edge devices for health monitoring of agriculture machines.
Appl. Intell., 2020

Deep Face Recognizer Privacy Attack: Model Inversion Initialization by a Deep Generative Adversarial Data Space Discriminator.
Proceedings of the Asia-Pacific Signal and Information Processing Association Annual Summit and Conference, 2020

2019
In-field failure assessment of tractor hydraulic system operation via pseudospectrum of acoustic measurements.
Turkish J. Electr. Eng. Comput. Sci., 2019

Comprehensive Overview of Low Voltage Ride Through Methods of Grid Integrated Wind Generator.
IEEE Access, 2019

2018
A Bi-Level Evolutionary Optimization for Coordinated Transmission Expansion Planning.
IEEE Access, 2018

Evolutionary Optimization Based on Biological Evolution in Plants.
Proceedings of the Knowledge-Based and Intelligent Information & Engineering Systems: Proceedings of the 22nd International Conference KES-2018, 2018

2017
Perceptual Adaptation of Image Based on Chevreul-Mach Bands Visual Phenomenon.
IEEE Signal Process. Lett., 2017

2015
D-wave quantum computing Ising model: A case study for the forecasting of heat waves.
Proceedings of the 2015 International Conference on Control, 2015

2014
A Tweets Mining Approach to Detection of Critical Events Characteristics using Random Forest.
Int. J. Next Gener. Comput., 2014

2011
A theoretical discussion on the foundation of Stone's blind source separation.
Signal Image Video Process., 2011

2010
An Optimum ICA Based Multiuser Data Separation for Short Message Service.
Proceedings of the Advances in Computer Science and Information Technology, 2010

Removal of Reflection from Window Image by Blind Image Separation with Simultaneous Diagonalization of Low and High Halfbands.
Proceedings of the 2010 International Conference on Artificial Intelligence, 2010

2009
An Efficient ICA Based Approach to Multiuser Detection in MIMO OFDM Systems.
Proceedings of the Multi-Carrier Systems & Solutions 2009, 2009

A PDF-Matched Modification to Stone's Measure of Predictability for Blind Source Separation.
Proceedings of the Advances in Neural Networks, 2009

A Robust and Precise Solution to Permutation Indeterminacy and Complex Scaling Ambiguity in BSS-Based Blind MIMO-OFDM Receiver.
Proceedings of the Independent Component Analysis and Signal Separation, 2009


  Loading...