Mohammad Sayad Haghighi

Orcid: 0000-0003-1042-837X

According to our database1, Mohammad Sayad Haghighi authored at least 63 papers between 2005 and 2025.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2025
Using attentive temporal GNN for dynamic trust assessment in the presence of malicious entities.
Expert Syst. Appl., 2025

2024
Multihead Attention-Based Multiscale Graph Convolution Network for ITS Traffic Forecasting.
IEEE Syst. J., June, 2024

Is Bitcoin Future as Secure as We Think? Analysis of Bitcoin Vulnerability to Bribery Attacks Launched through Large Transactions.
ACM Trans. Priv. Secur., May, 2024

Federated Learning in Industrial IoT: A Privacy-Preserving Solution That Enables Sharing of Data in Hydrocarbon Explorations.
IEEE Trans. Ind. Informatics, March, 2024

IoT-friendly, pre-computed and outsourced attribute based encryption.
Future Gener. Comput. Syst., January, 2024

Identification and analysis of stochastic deception attacks on cyber-physical systems.
J. Frankl. Inst., 2024

Corrigendum to "IoT-friendly, pre-computed and outsourced attribute based encryption" [Future Generation Computer Systems (FGCS) volume 150 (2024) 115-126/ FGCS-D-23-00424].
Future Gener. Comput. Syst., 2024

2023
Decentralizing the lightning network: a score-based recommendation strategy for the autopilot system.
Appl. Netw. Sci., December, 2023

Building robust neural networks under adversarial machine learning attacks by using biologically-inspired neurons.
Inf. Sci., October, 2023

Application of fuzzy learning in IoT-enabled remote healthcare monitoring and control of anesthetic depth during surgery.
Inf. Sci., May, 2023

Filtering Malicious Messages by Trust-Aware Cognitive Routing in Vehicular Ad Hoc Networks.
IEEE Trans. Intell. Transp. Syst., January, 2023

Cyber Attacks via Consumer Electronics: Studying the Threat of Covert Malware in Smart and Autonomous Vehicles.
IEEE Trans. Consumer Electron., 2023

A Note on the Security of ITS: Car Crash Analysis in Cruise Control Scenarios.
CoRR, 2023

Detecting Union Type Confusion in Component Object Model.
Proceedings of the 32nd USENIX Security Symposium, 2023

2022
On the Neural Backdoor of Federated Generative Models in Edge Computing.
ACM Trans. Internet Techn., 2022

Vulnerability Detection in SIoT Applications: A Fuzzing Method on their Binaries.
IEEE Trans. Netw. Sci. Eng., 2022

A Quantitative Comparative Study of Data-oriented Trust Management Schemes in Internet of Things.
ACM Trans. Manag. Inf. Syst., 2022

A Secure and Decentralized Trust Management Scheme for Smart Health Systems.
IEEE J. Biomed. Health Informatics, 2022

Missing Value Filling Based on the Collaboration of Cloud and Edge in Artificial Intelligence of Things.
IEEE Trans. Ind. Informatics, 2022

Can Blockchain be Trusted in Industry 4.0? Study of a Novel Misleading Attack on Bitcoin.
IEEE Trans. Ind. Informatics, 2022

High Bandwidth Green Communication With Vehicles by Decentralized Resource Optimization in Integrated Access Backhaul 5G Networks.
IEEE Trans. Green Commun. Netw., 2022

Joint Optimization of Energy Consumption and Data Transmission in Smart Body Area Networks.
Sensors, 2022

Decentralized joint resource allocation and path selection in multi-hop integrated access backhaul 5G networks.
Comput. Networks, 2022

2021
A Privacy-Preserving Homomorphic Scheme With Multiple Dimensions and Fault Tolerance for Metering Data Aggregation in Smart Grid.
IEEE Trans. Smart Grid, 2021

Anomaly Detection in Automated Vehicles Using Multistage Attention-Based Convolutional Neural Network.
IEEE Trans. Intell. Transp. Syst., 2021

On the Security of Networked Control Systems in Smart Vehicle and Its Adaptive Cruise Control.
IEEE Trans. Intell. Transp. Syst., 2021

Modeling of Human Cognition in Consensus Agreement on Social Media and Its Implications for Smarter Manufacturing.
IEEE Trans. Ind. Informatics, 2021

Automation of Recording in Smart Classrooms via Deep Learning and Bayesian Maximum a Posteriori Estimation of Instructor's Pose.
IEEE Trans. Ind. Informatics, 2021

Learning Influential Cognitive Links in Social Networks by a New Hybrid Model for Opinion Dynamics.
IEEE Trans. Comput. Soc. Syst., 2021

Energy-Efficient Drone Trajectory Planning for the Localization of 6G-Enabled IoT Devices.
IEEE Internet Things J., 2021

Intelligent Trust-Based Public-Key Management for IoT by Linking Edge Devices in a Fog Architecture.
IEEE Internet Things J., 2021

Detection of Anomalies in Industrial IoT Systems by Data Mining: Study of CHRIST Osmotron Water Purification System.
IEEE Internet Things J., 2021

Analysis of Bitcoin Vulnerability to Bribery Attacks Launched Through Large Transactions.
CoRR, 2021

On the Possibility of Creating Smart Contracts on Bitcoin by MPC-based Approaches.
Proceedings of the 26th International Computer Conference, Computer Society of Iran, 2021

Evaluating Upgradable Smart Contract.
Proceedings of the 2021 IEEE International Conference on Blockchain, 2021

2020
Intelligent robust control for cyber-physical systems of rotary gantry type under denial of service attack.
J. Supercomput., 2020

Artificial Intelligence for Detection, Estimation, and Compensation of Malicious Attacks in Nonlinear Cyber-Physical Systems and Industrial IoT.
IEEE Trans. Ind. Informatics, 2020

A Computationally Intelligent Hierarchical Authentication and Key Establishment Framework for the Internet of Things.
IEEE Internet Things Mag., 2020

Highly Anonymous Mobility-Tolerant Location-Based Onion Routing for VANETs.
IEEE Internet Things J., 2020

Detection of Anomalies and Faults in Industrial IoT Systems by Data Mining: Study of CHRIST Osmotron Water Purification System.
CoRR, 2020

A Machine Learning-based Approach to Build Zero False-Positive IPSs for Industrial IoT and CPS with a Case Study on Power Grids Security.
CoRR, 2020

Critical Study of Markovian Approaches for Batch Arrival Modeling in IEEE 802.15.4-based Networks.
CoRR, 2020

Compensation of Linear Attacks to Cyber Physical Systems through ARX System Identification.
CoRR, 2020

An energy-aware drone trajectory planning scheme for terrestrial sensors localization.
Comput. Commun., 2020

Discrimination-aware trust management for social internet of things.
Comput. Networks, 2020

2019
Bayesian inference of private social network links using prior information and propagated data.
J. Parallel Distributed Comput., 2019

Legal framework for health cloud: A systematic review.
Int. J. Medical Informatics, 2019

A mixed-integer linear programming approach for energy-constrained mobile anchor path planning in wireless sensor networks localization.
Ad Hoc Networks, 2019

Detection and Compensation of Covert Service-Degrading Intrusions in Cyber Physical Systems through Intelligent Adaptive Control.
Proceedings of the IEEE International Conference on Industrial Technology, 2019

2018
A Novel Identity-Based Key Establishment Method for Advanced Metering Infrastructure in Smart Grid.
IEEE Trans. Smart Grid, 2018

2016
On the Race of Worms and Patches: Modeling the Spread of Information in Wireless Sensor Networks.
IEEE Trans. Inf. Forensics Secur., 2016

A conceptual trust model for the Internet of Things interactions.
Proceedings of the 8th International Symposium on Telecommunications, 2016

2015
A Sword with Two Edges: Propagation Studies on Both Positive and Negative Information in Online Social Networks.
IEEE Trans. Computers, 2015

A Stochastic Time-Domain Model for Burst Data Aggregation in IEEE 802.15.4 Wireless Sensor Networks.
IEEE Trans. Computers, 2015

Dynamic and verifiable multi-secret sharing scheme based on Hermite interpolation and bilinear maps.
IET Inf. Secur., 2015

2013
A Markov model of safety message broadcasting for vehicular networks.
Proceedings of the 2013 IEEE Wireless Communications and Networking Conference (WCNC), 2013

2012
Adaptation of LEACH routing protocol to cognitive radio sensor networks.
Proceedings of the 6th International Symposium on Telecommunications, 2012

2011
Stochastic Modeling of Hello Flooding in Slotted CSMA/CA Wireless Sensor Networks.
IEEE Trans. Inf. Forensics Secur., 2011

Analysis of packet loss for batch traffic arrivals in IEEE 802.15.4-based networks.
Proceedings of the IEEE 36th Conference on Local Computer Networks, 2011

2010
Overhearing Gain Analysis in Low-Traffic CDMA Wireless Sensor Networks.
Proceedings of the IEEE International Conference on Sensor Networks, 2010

2008
An Adaptive Network Allocation Vector for IEEE 802.11-based Multi-hop Networks.
Proceedings of the Second International Conference on Future Generation Communication and Networking, 2008

2005
An Optimal SVD-based Watermarking Framework through Linear Programming.
Proceedings of the Internet and Multimedia Systems and Applications, 2005

Towards Energy Optimization of Transparent Watermarks using Entropy Masking.
Proceedings of the Internet and Multimedia Systems and Applications, 2005


  Loading...