Sajad Shirali-Shahreza

Orcid: 0000-0003-1654-6385

According to our database1, Sajad Shirali-Shahreza authored at least 44 papers between 2006 and 2024.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Set Up My Smart Home as I Want.
Computer, August, 2024

2023
Better Replacement for TTS Naturalness Evaluation.
Proceedings of the 12th ISCA Speech Synthesis Workshop, 2023

2018
FleXight: Flexible Information Channel for Software-Defined Networking.
PhD thesis, 2018

Delayed Installation and Expedited Eviction: An Alternative Approach to Reduce Flow Table Occupancy in SDN Switches.
IEEE/ACM Trans. Netw., 2018

Protecting Home User Devices with an SDN-Based Firewall.
IEEE Trans. Consumer Electron., 2018

MOS Naturalness and the Quest for Human-Like Speech.
Proceedings of the 2018 IEEE Spoken Language Technology Workshop, 2018

2017
Crowdsourcing the Pronunciation of Out-of-Vocabulary Words.
Proceedings of the Workshops of the The Thirty-First AAAI Conference on Artificial Intelligence, 2017

2015
ReWiFlow: Restricted Wildcard OpenFlow Rules.
Comput. Commun. Rev., 2015

2014
Traffic statistics collection with FleXam.
Proceedings of the ACM SIGCOMM 2014 Conference, 2014

2013
FleXam: flexible sampling extension for monitoring and security applications in openflow.
Proceedings of the Second ACM SIGCOMM Workshop on Hot Topics in Software Defined Networking, 2013

Empowering Software Defined Network controller with packet-level information.
Proceedings of the IEEE International Conference on Communications, 2013

Efficient Implementation of Security Applications in OpenFlow Controller with FleXam.
Proceedings of the IEEE 21st Annual Symposium on High-Performance Interconnects, 2013

SeeSay and HearSay CAPTCHA for mobile interaction.
Proceedings of the 2013 ACM SIGCHI Conference on Human Factors in Computing Systems, 2013

2012
Realistic answer verification: An analysis of user errors in a sentence-repetition task.
Proceedings of the 2012 IEEE Spoken Language Technology Workshop (SLT), 2012

2011
Multilingual Highlighting CAPTCHA.
Proceedings of the Eighth International Conference on Information Technology: New Generations, 2011

Verifying Human Users in Speech-Based Interactions.
Proceedings of the 12th Annual Conference of the International Speech Communication Association, 2011

Accessibility of CAPTCHA methods.
Proceedings of the 4th ACM Workshop on Security and Artificial Intelligence, 2011

Categorizing CAPTCHA.
Proceedings of the 4th ACM Workshop on Security and Artificial Intelligence, 2011

2010
Real-time and MPEG-1 layer III compression resistant steganography in speech.
IET Inf. Secur., 2010

Skin region based method for reducing motion estimation time.
Proceedings of the IEEE International Symposium on Signal Processing and Information Technology, 2010

Effect of MFCC normalization on vector quantization based speaker identification.
Proceedings of the IEEE International Symposium on Signal Processing and Information Technology, 2010

2009
Fast and scalable system for automatic artist identification.
IEEE Trans. Consumer Electron., 2009

Use Speech for User's Group Identification.
Proceedings of the Natural Language Processing and Information Systems, 2009

Compact representation of multimedia files for indexing, classification and retrieval.
Proceedings of the MEDES '09: International ACM Conference on Management of Emergent Digital EcoSystems, 2009

2008
Parental control based on speaker class verification.
IEEE Trans. Consumer Electron., 2008

CAPTCHA for children.
Proceedings of the 3rd IEEE International Conference on System of Systems Engineering, 2008

A CAPTCHA system for Nintendo DS.
Proceedings of the 7th ACM SIGCOMM Workshop on Network and System Support for Games, 2008

Advanced Collage CAPTCHA.
Proceedings of the Fifth International Conference on Information Technology: New Generations (ITNG 2008), 2008

A New Human Interactive Proofs System for Deaf Persons.
Proceedings of the Fifth International Conference on Information Technology: New Generations (ITNG 2008), 2008

Involving computer science students in real-world problems.
Proceedings of the ITI 2008 30th International Conference on Information Technology Interfaces, 2008

Steganography in TeX documents.
Proceedings of the 3rd International Conference on Intelligent System and Knowledge Engineering, 2008

Bibliography of works done on CAPTCHA.
Proceedings of the 3rd International Conference on Intelligent System and Knowledge Engineering, 2008

Steganography in Silence Intervals of Speech.
Proceedings of the 4th International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2008), 2008

Knapsack Model for Pixel Based Skin Detection.
Proceedings of the 4th International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2008), 2008

High capacity error free wavelet Domain Speech Steganography.
Proceedings of the IEEE International Conference on Acoustics, 2008

Encouraging Persons with Hearing Problem to Learn Sign Language by Internet Websites.
Proceedings of the 8th IEEE International Conference on Advanced Learning Technologies, 2008

Using Formal Methods in Component Based Software Development.
Proceedings of the Innovations and Advances in Computer Sciences and Engineering, 2008

Persian/Arabic Unicode Text Steganography.
Proceedings of the Proccedings of the Fourth International Conference on Information Assurance and Security, 2008

Steganography in Textiles.
Proceedings of the Proccedings of the Fourth International Conference on Information Assurance and Security, 2008

2007
Online Collage CAPTCHA.
Proceedings of the Eighth International Workshop on Image Analysis for Multimedia Interactive Services, 2007

Collage CAPTCHA.
Proceedings of the 9th International Symposium on Signal Processing and Its Applications, 2007

A New Anti-Spam Protocol Using CAPTCHA.
Proceedings of the IEEE International Conference on Networking, Sensing and Control, 2007

Restricted Access to Exam Grades on the Web by HIP.
Proceedings of the 6th Annual IEEE/ACIS International Conference on Computer and Information Science (ICIS 2007), 2007

2006
Collage Steganography.
Proceedings of the 5th Annual IEEE/ACIS International Conference on Computer and Information Science (ICIS 2006) and 1st IEEE/ACIS International Workshop on Component-Based Software Engineering, 2006


  Loading...