Reza Javidan

Orcid: 0000-0002-7788-6597

According to our database1, Reza Javidan authored at least 60 papers between 2008 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Leveraging Large Language Models for Clinical Abbreviation Disambiguation.
J. Medical Syst., December, 2024

IoT traffic management using deep learning based on osmotic cloud to edge computing.
Telecommun. Syst., October, 2024

A novel RPL defense mechanism based on trust and deep learning for internet of things.
J. Supercomput., August, 2024

An intelligent behavioral-based DDOS attack detection method using adaptive time intervals.
Peer Peer Netw. Appl., July, 2024

Deep Image: A precious image based deep learning method for online malware detection in IoT environment.
Internet Things, 2024

SIM-FED: Secure IoT malware detection model with federated learning.
Comput. Electr. Eng., 2024

2023
ARD-Stream: An adaptive radius density-based stream clustering.
Future Gener. Comput. Syst., December, 2023

A QoE-driven SDN traffic management for IoT-enabled surveillance systems using deep learning based on edge cloud computing.
J. Supercomput., November, 2023

Time dependency: an efficient biometric-based authentication for secure communication in wireless healthcare sensor networks.
J. Comput. Virol. Hacking Tech., June, 2023

DEMD-IoT: a deep ensemble model for IoT malware detection using CNNs and network traffic.
Evol. Syst., June, 2023

VQR: vulnerability analysis in quadratic residues-based authentication protocols.
J. Ambient Intell. Humaniz. Comput., 2023

A regularization-based deep unsupervised model for affine multimodal co-registration.
Expert Syst. J. Knowl. Eng., 2023

DDoS Attack Detection in a Real Urban IoT Environment Using Federated Deep Learning.
Proceedings of the IEEE International Conference on Cyber Security and Resilience, 2023

2022
EFSUTE: a novel efficient and survivable traffic engineering for software defined networks.
J. Reliab. Intell. Environ., 2022

Cyrus 2D Simulation Team Description Paper 2016.
CoRR, 2022

Medical image registration using unsupervised deep neural network: A scoping literature review.
Biomed. Signal Process. Control., 2022

2021
A Robust Anonymous Remote User Authentication Protocol for IoT Services.
Wirel. Pers. Commun., 2021

An intelligent IoT-based positioning system for theme parks.
J. Supercomput., 2021

A new load balancing clustering method for the RPL protocol.
Telecommun. Syst., 2021

Adversarial android malware detection for mobile multimedia applications in IoT environments.
Multim. Tools Appl., 2021

RSS: An Energy-Efficient Approach for Securing IoT Service Protocols Against the DoS Attack.
IEEE Internet Things J., 2021

A new energy aware cluster head selection for LEACH in wireless sensor networks.
IET Wirel. Sens. Syst., 2021

An intelligent hybrid approach for task scheduling in cluster computing environments as an infrastructure for biomedical applications.
Expert Syst. J. Knowl. Eng., 2021

Towards website domain name classification using graph based semi-supervised learning.
Comput. Networks, 2021

2020
A secure biometric-based authentication protocol for global mobility networks in smart cities.
J. Supercomput., 2020

A new method for layer 2 loop prevention in software defined networks.
Telecommun. Syst., 2020

On defending against label flipping attacks on malware detection systems.
Neural Comput. Appl., 2020

A new objective function for RPL routing protocol in IoT to increase network lifetime.
Int. J. Wirel. Mob. Comput., 2020

Telesurgery QoS improvement over SDN based on a Type-2 fuzzy system and enhanced cuckoo optimization algorithm.
Int. J. Commun. Syst., 2020

Node deployment in wireless sensor networks using the new multi-objective Levy flight bee algorithm.
IET Wirel. Sens. Syst., 2020

Proposing a new method for improving RPL to support mobility in the Internet of things.
IET Networks, 2020

Similarity-based Android malware detection using Hamming distance of static binary features.
Future Gener. Comput. Syst., 2020

Can machine learning model with static features be fooled: an adversarial machine learning approach.
Clust. Comput., 2020

Medical image registration using deep neural networks: A comprehensive review.
Comput. Electr. Eng., 2020

2019
A Two-Layer Dimension Reduction and Two-Tier Classification Model for Anomaly-Based Intrusion Detection in IoT Backbone Networks.
IEEE Trans. Emerg. Top. Comput., 2019

A new approach for traffic matrix estimation in high load computer networks based on graph embedding and convolutional neural network.
Trans. Emerg. Telecommun. Technol., 2019

Multi criteria analysis of Controller Placement Problem in Software Defined Networks.
Comput. Commun., 2019

Automatic Clustering of Attacks in Intrusion Detection Systems.
Proceedings of the 16th IEEE/ACS International Conference on Computer Systems and Applications, 2019

2018
An adaptive target tracking method for 3D underwater wireless sensor networks.
Wirel. Networks, 2018

A novel multicast traffic engineering technique in SDN using TLBO algorithm.
Telecommun. Syst., 2018

OpenIPTV: a comprehensive SDN-based IPTV service framework.
Multim. Syst., 2018

On the feasibility of telesurgery over software defined networks.
Int. J. Intell. Robotics Appl., 2018

An intelligent traffic engineering method for video surveillance systems over software defined networks using ant colony optimisation.
Int. J. Bio Inspired Comput., 2018

Adaptive timing model for improving routing and data aggregation in Internet of things networks using RPL.
IET Networks, 2018

CANF: Clustering and anomaly detection method using nearest and farthest neighbor.
Future Gener. Comput. Syst., 2018

ERA-ContikiMAC: An adaptive radio duty cycling layer in Internet of Things.
Proceedings of the 9th International Symposium on Telecommunications, 2018

Achieving Horizontal Scalability in Density-based Clustering for URLs.
Proceedings of the IEEE International Conference on Big Data (IEEE BigData 2018), 2018

2017
SLICOTS: An SDN-Based Lightweight Countermeasure for TCP SYN Flooding Attacks.
IEEE Trans. Netw. Serv. Manag., 2017

On the global stability of an epidemic model of computer viruses.
Theory Biosci., 2017

An adaptive type-2 fuzzy traffic engineering method for video surveillance systems over software defined networks.
Multim. Tools Appl., 2017

Mobility management in wireless nano-sensor networks using fuzzy logic.
J. Intell. Fuzzy Syst., 2017

Practical extensions to countermeasure DoS attacks in software defined networking.
Proceedings of the 2017 IEEE Conference on Network Function Virtualization and Software Defined Networks, 2017

2016
An Intelligent Traffic Engineering Method over Software Defined Networks for Video Surveillance Systems Based on Artificial Bee Colony.
Int. J. Intell. Inf. Technol., 2016

A new density estimator based on nearest and farthest neighbor.
Proceedings of the 8th International Symposium on Telecommunications, 2016

2015
Spatiotemporal monitoring of Bakhtegan Lake's areal fluctuations and an exploration of its future status by applying a cellular automata model.
Comput. Geosci., 2015

2011
A new method for data filtering in RFID middleware.
Int. J. Radio Freq. Identif. Technol. Appl., 2011

Implementation of a new method for stemming in Persian language.
Proceedings of the International Conference on Web Intelligence, Mining and Semantics, 2011

Seabed Image Texture Analysis Using Subsampled Contourlet Transform.
Proceedings of the e-Technologies and Networks for Development, 2011

2010
Wavelet-based acoustic seabed discrimination system.
Proceedings of the 2nd International Conference on Image Processing Theory Tools and Applications, 2010

2008
Seabed Image Texture Segmentation and Classification Based on Nonsubsampled Contourlet Transform.
Proceedings of the Advances in Computer Science and Engineering, 2008


  Loading...