Mohammad Sayad Haghighi
Orcid: 0000-0003-1042-837X
According to our database1,
Mohammad Sayad Haghighi
authored at least 63 papers
between 2005 and 2025.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2025
Using attentive temporal GNN for dynamic trust assessment in the presence of malicious entities.
Expert Syst. Appl., 2025
2024
Multihead Attention-Based Multiscale Graph Convolution Network for ITS Traffic Forecasting.
IEEE Syst. J., June, 2024
Is Bitcoin Future as Secure as We Think? Analysis of Bitcoin Vulnerability to Bribery Attacks Launched through Large Transactions.
ACM Trans. Priv. Secur., May, 2024
Federated Learning in Industrial IoT: A Privacy-Preserving Solution That Enables Sharing of Data in Hydrocarbon Explorations.
IEEE Trans. Ind. Informatics, March, 2024
Future Gener. Comput. Syst., January, 2024
Identification and analysis of stochastic deception attacks on cyber-physical systems.
J. Frankl. Inst., 2024
Corrigendum to "IoT-friendly, pre-computed and outsourced attribute based encryption" [Future Generation Computer Systems (FGCS) volume 150 (2024) 115-126/ FGCS-D-23-00424].
Future Gener. Comput. Syst., 2024
2023
Decentralizing the lightning network: a score-based recommendation strategy for the autopilot system.
Appl. Netw. Sci., December, 2023
Building robust neural networks under adversarial machine learning attacks by using biologically-inspired neurons.
Inf. Sci., October, 2023
Application of fuzzy learning in IoT-enabled remote healthcare monitoring and control of anesthetic depth during surgery.
Inf. Sci., May, 2023
Filtering Malicious Messages by Trust-Aware Cognitive Routing in Vehicular Ad Hoc Networks.
IEEE Trans. Intell. Transp. Syst., January, 2023
Cyber Attacks via Consumer Electronics: Studying the Threat of Covert Malware in Smart and Autonomous Vehicles.
IEEE Trans. Consumer Electron., 2023
CoRR, 2023
Proceedings of the 32nd USENIX Security Symposium, 2023
2022
ACM Trans. Internet Techn., 2022
IEEE Trans. Netw. Sci. Eng., 2022
A Quantitative Comparative Study of Data-oriented Trust Management Schemes in Internet of Things.
ACM Trans. Manag. Inf. Syst., 2022
IEEE J. Biomed. Health Informatics, 2022
Missing Value Filling Based on the Collaboration of Cloud and Edge in Artificial Intelligence of Things.
IEEE Trans. Ind. Informatics, 2022
Can Blockchain be Trusted in Industry 4.0? Study of a Novel Misleading Attack on Bitcoin.
IEEE Trans. Ind. Informatics, 2022
High Bandwidth Green Communication With Vehicles by Decentralized Resource Optimization in Integrated Access Backhaul 5G Networks.
IEEE Trans. Green Commun. Netw., 2022
Joint Optimization of Energy Consumption and Data Transmission in Smart Body Area Networks.
Sensors, 2022
Decentralized joint resource allocation and path selection in multi-hop integrated access backhaul 5G networks.
Comput. Networks, 2022
2021
A Privacy-Preserving Homomorphic Scheme With Multiple Dimensions and Fault Tolerance for Metering Data Aggregation in Smart Grid.
IEEE Trans. Smart Grid, 2021
Anomaly Detection in Automated Vehicles Using Multistage Attention-Based Convolutional Neural Network.
IEEE Trans. Intell. Transp. Syst., 2021
On the Security of Networked Control Systems in Smart Vehicle and Its Adaptive Cruise Control.
IEEE Trans. Intell. Transp. Syst., 2021
Modeling of Human Cognition in Consensus Agreement on Social Media and Its Implications for Smarter Manufacturing.
IEEE Trans. Ind. Informatics, 2021
Automation of Recording in Smart Classrooms via Deep Learning and Bayesian Maximum a Posteriori Estimation of Instructor's Pose.
IEEE Trans. Ind. Informatics, 2021
Learning Influential Cognitive Links in Social Networks by a New Hybrid Model for Opinion Dynamics.
IEEE Trans. Comput. Soc. Syst., 2021
Energy-Efficient Drone Trajectory Planning for the Localization of 6G-Enabled IoT Devices.
IEEE Internet Things J., 2021
Intelligent Trust-Based Public-Key Management for IoT by Linking Edge Devices in a Fog Architecture.
IEEE Internet Things J., 2021
Detection of Anomalies in Industrial IoT Systems by Data Mining: Study of CHRIST Osmotron Water Purification System.
IEEE Internet Things J., 2021
Analysis of Bitcoin Vulnerability to Bribery Attacks Launched Through Large Transactions.
CoRR, 2021
Proceedings of the 26th International Computer Conference, Computer Society of Iran, 2021
Proceedings of the 2021 IEEE International Conference on Blockchain, 2021
2020
Intelligent robust control for cyber-physical systems of rotary gantry type under denial of service attack.
J. Supercomput., 2020
Artificial Intelligence for Detection, Estimation, and Compensation of Malicious Attacks in Nonlinear Cyber-Physical Systems and Industrial IoT.
IEEE Trans. Ind. Informatics, 2020
A Computationally Intelligent Hierarchical Authentication and Key Establishment Framework for the Internet of Things.
IEEE Internet Things Mag., 2020
IEEE Internet Things J., 2020
Detection of Anomalies and Faults in Industrial IoT Systems by Data Mining: Study of CHRIST Osmotron Water Purification System.
CoRR, 2020
A Machine Learning-based Approach to Build Zero False-Positive IPSs for Industrial IoT and CPS with a Case Study on Power Grids Security.
CoRR, 2020
Critical Study of Markovian Approaches for Batch Arrival Modeling in IEEE 802.15.4-based Networks.
CoRR, 2020
Compensation of Linear Attacks to Cyber Physical Systems through ARX System Identification.
CoRR, 2020
An energy-aware drone trajectory planning scheme for terrestrial sensors localization.
Comput. Commun., 2020
Comput. Networks, 2020
2019
Bayesian inference of private social network links using prior information and propagated data.
J. Parallel Distributed Comput., 2019
Int. J. Medical Informatics, 2019
A mixed-integer linear programming approach for energy-constrained mobile anchor path planning in wireless sensor networks localization.
Ad Hoc Networks, 2019
Detection and Compensation of Covert Service-Degrading Intrusions in Cyber Physical Systems through Intelligent Adaptive Control.
Proceedings of the IEEE International Conference on Industrial Technology, 2019
2018
A Novel Identity-Based Key Establishment Method for Advanced Metering Infrastructure in Smart Grid.
IEEE Trans. Smart Grid, 2018
2016
On the Race of Worms and Patches: Modeling the Spread of Information in Wireless Sensor Networks.
IEEE Trans. Inf. Forensics Secur., 2016
Proceedings of the 8th International Symposium on Telecommunications, 2016
2015
A Sword with Two Edges: Propagation Studies on Both Positive and Negative Information in Online Social Networks.
IEEE Trans. Computers, 2015
A Stochastic Time-Domain Model for Burst Data Aggregation in IEEE 802.15.4 Wireless Sensor Networks.
IEEE Trans. Computers, 2015
Dynamic and verifiable multi-secret sharing scheme based on Hermite interpolation and bilinear maps.
IET Inf. Secur., 2015
2013
Proceedings of the 2013 IEEE Wireless Communications and Networking Conference (WCNC), 2013
2012
Proceedings of the 6th International Symposium on Telecommunications, 2012
2011
IEEE Trans. Inf. Forensics Secur., 2011
Proceedings of the IEEE 36th Conference on Local Computer Networks, 2011
2010
Proceedings of the IEEE International Conference on Sensor Networks, 2010
2008
Proceedings of the Second International Conference on Future Generation Communication and Networking, 2008
2005
An Optimal SVD-based Watermarking Framework through Linear Programming.
Proceedings of the Internet and Multimedia Systems and Applications, 2005
Towards Energy Optimization of Transparent Watermarks using Entropy Masking.
Proceedings of the Internet and Multimedia Systems and Applications, 2005