Somayeh Sadeghi
Orcid: 0000-0001-6353-9634
According to our database1,
Somayeh Sadeghi
authored at least 16 papers
between 2014 and 2025.
Collaborative distances:
Collaborative distances:
Timeline
2014
2016
2018
2020
2022
2024
0
1
2
3
4
5
1
1
4
1
1
1
2
1
1
2
1
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2025
Role of cybersecurity for a secure global communication eco-system: A comprehensive cyber risk assessment for satellite communications.
Comput. Secur., 2025
2024
A modified scenario bundling method for shortest path network interdiction under endogenous uncertainty.
Ann. Oper. Res., December, 2024
A review of Machine Learning (ML)-based IoT security in healthcare: A dataset perspective.
Comput. Commun., January, 2024
Internet Things, 2024
Privacy-Preserving for Images in Satellite Communications: A Comprehensive Review of Chaos-Based Encryption.
CoRR, 2024
2022
Diabetes mellitus risk prediction in the presence of class imbalance using flexible machine learning methods.
BMC Medical Informatics Decis. Mak., 2022
2018
State of the art in passive digital image forgery detection: copy-move image forgery.
Pattern Anal. Appl., 2018
Bad Ai: Investigating the Effect of Half-Toning Techniques on Unwanted Face Detection Systems.
Proceedings of the 9th IFIP International Conference on New Technologies, 2018
2017
Comput. Ind. Eng., 2017
An efficient ward-based copy-move forgery detection method for digital image forensic.
Proceedings of the 2017 International Conference on Image and Vision Computing New Zealand, 2017
Electromagnetismlike Mechanism Descriptor with Fourier Transform for a Passive Copy-move Forgery Detection in Digital Image Forensics.
Proceedings of the 6th International Conference on Pattern Recognition Applications and Methods, 2017
2016
Image Region Duplication Forgery Detection Based on Angular Radial Partitioning and Harris Key-Points.
Symmetry, 2016
Expert Syst. Appl., 2016
2014
Efficient Image Authentication and Tamper Localization Algorithm Using Active Watermarking.
Proceedings of the Bio-inspiring Cyber Security and Cloud Services: Trends and Innovations, 2014
An effective SVD-based image tampering detection and self-recovery using active watermarking.
Signal Process. Image Commun., 2014
Proceedings of the Image Analysis and Recognition - 11th International Conference, 2014