Milad Taleby Ahvanooey

Orcid: 0000-0002-5052-5492

According to our database1, Milad Taleby Ahvanooey authored at least 26 papers between 2016 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
PrFAHP-GT: A New Privacy Risk Analysis Framework Using FAHP and Game Theory for Digital Supply Chain Management.
IEEE Trans. Engineering Management, 2024

HS-McHF: Hypersharpening With Multicomponent-Based Hierarchical Features Fusion Network.
IEEE J. Sel. Top. Appl. Earth Obs. Remote. Sens., 2024

2023
Privacy-Preserving Techniques in Cloud/Fog and Internet of Things.
Cryptogr., September, 2023

Multimodal sentiment analysis for social media contents during public emergencies.
J. Data Inf. Sci., June, 2023

AFPr-AM: A novel Fuzzy-AHP based privacy risk assessment model for strategic information management of social media platforms.
Comput. Secur., 2023

Deepfakes, Misinformation, and Disinformation in the Era of Frontier AI, Generative AI, and Large AI Models.
Proceedings of the International Conference on Computer and Applications, 2023

2022
AITSteg: An Innovative Text Steganography Technique for Hidden Transmission of Text Message via Social Media.
Dataset, May, 2022

Misinformation Detection on Social Media: Challenges and the Road Ahead.
IT Prof., 2022

CovertSYS: A systematic covert communication approach for providing secure end-to-end conversation via social networks.
J. Inf. Secur. Appl., 2022

Modern Authentication Schemes in Smartphones and IoT Devices: An Empirical Survey.
IEEE Internet Things J., 2022

Classification of ADHD Patients Using Kernel Hierarchical Extreme Learning Machine.
CoRR, 2022

Information Hiding in Digital Textual Contents: Techniques and Current Challenges.
Computer, 2022

Opinion mining towards blockchain technology adoption for accessing digital library resources.
Aslib J. Inf. Manag., 2022

2021
Do Dark Web and Cryptocurrencies Empower Cybercriminals?
Proceedings of the Digital Forensics and Cyber Crime - 12th EAI International Conference, 2021

2020
A New Gene Selection Algorithm using Fuzzy-Rough Set Theory for Tumor Classification.
CoRR, 2020

An Overview of Two Age Synthesis and Estimation Techniques.
CoRR, 2020

An Effective Automatic Image Annotation Model Via Attention Model and Data Equilibrium.
CoRR, 2020

A Survey on Smartphones Security: Software Vulnerabilities, Malware, and Attacks.
CoRR, 2020

ANiTW: A Novel Intelligent Text Watermarking technique for forensic identification of spurious information on social media.
Comput. Secur., 2020

2019
A Survey of Genetic Programming and Its Applications.
KSII Trans. Internet Inf. Syst., 2019

Modern Text Hiding, Text Steganalysis, and Applications: A Comparative Analysis.
Entropy, 2019

EACMS: Emergency Access Control Management System for Personal Health Record Based on Blockchain.
IEEE Access, 2019

Safety Risk Monitoring of Cyber-Physical Power Systems Based on Ensemble Learning Algorithm.
IEEE Access, 2019

2018
A Comparative Analysis of Information Hiding Techniques for Copyright Protection of Text Documents.
Secur. Commun. Networks, 2018

AITSteg: An Innovative Text Steganography Technique for Hidden Transmission of Text Message via Social Media.
IEEE Access, 2018

2016
An innovative technique for web text watermarking (AITW).
Inf. Secur. J. A Glob. Perspect., 2016


  Loading...