Somayeh Sadeghi

According to our database1, Somayeh Sadeghi authored at least 13 papers between 2014 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
A review of Machine Learning (ML)-based IoT security in healthcare: A dataset perspective.
Comput. Commun., January, 2024

CICIoMT2024: A benchmark dataset for multi-protocol security assessment in IoMT.
Internet Things, 2024

2022
Diabetes mellitus risk prediction in the presence of class imbalance using flexible machine learning methods.
BMC Medical Informatics Decis. Mak., 2022

2018
State of the art in passive digital image forgery detection: copy-move image forgery.
Pattern Anal. Appl., 2018

Bad Ai: Investigating the Effect of Half-Toning Techniques on Unwanted Face Detection Systems.
Proceedings of the 9th IFIP International Conference on New Technologies, 2018

2017
Trilevel shortest path network interdiction with partial fortification.
Comput. Ind. Eng., 2017

An efficient ward-based copy-move forgery detection method for digital image forensic.
Proceedings of the 2017 International Conference on Image and Vision Computing New Zealand, 2017

Electromagnetismlike Mechanism Descriptor with Fourier Transform for a Passive Copy-move Forgery Detection in Digital Image Forensics.
Proceedings of the 6th International Conference on Pattern Recognition Applications and Methods, 2017

2016
Image Region Duplication Forgery Detection Based on Angular Radial Partitioning and Harris Key-Points.
Symmetry, 2016

A novel forged blurred region detection system for image forensic applications.
Expert Syst. Appl., 2016

2014
Efficient Image Authentication and Tamper Localization Algorithm Using Active Watermarking.
Proceedings of the Bio-inspiring Cyber Security and Cloud Services: Trends and Innovations, 2014

An effective SVD-based image tampering detection and self-recovery using active watermarking.
Signal Process. Image Commun., 2014

An Efficient Image Self-recovery and Tamper Detection Using Fragile Watermarking.
Proceedings of the Image Analysis and Recognition - 11th International Conference, 2014


  Loading...