Alireza Jolfaei
Alireza Jolfaei
Chair Security & Privacy IEEE Consumer Technology Society
Verified email at - Homepage
Cited by
Cited by
Artificial intelligence for detection, estimation, and compensation of malicious attacks in nonlinear cyber physical systems and industrial IoT
F Farivar, MS Haghighi, A Jolfaei, M Alazab
IEEE Transactions on Industrial Informatics, 2019
A novel PCA–whale optimization-based deep neural network model for classification of tomato plant diseases using GPU
TR Gadekallu, DS Rajput, MPK Reddy, K Lakshmanna, S Bhattacharya, ...
Journal of Real-Time Image Processing 18, 1383-1396, 2021
EEG-based Brain-Computer Interfaces (BCIs): A survey of recent studies on signal sensing technologies and computational intelligence approaches and their applications
X Gu, Z Cao, A Jolfaei, P Xu, D Wu, TP Jung, CT Lin
IEEE/ACM Transactions on Computational Biology and Bioinformatics, 2021
Learning-Based Context-Aware Resource Allocation for Edge Computing-Empowered Industrial IoT
H Liao, Z Zhou, X Zhao, L Zhang, A Jolfaei
IEEE Internet of Things Journal, 2020
Data Mining and Machine Learning Methods for Sustainable Smart Cities Traffic Classification: A Survey
M Shafiq, Z Tian, A Kashif Bashir, A Jolfaei
Sustainable Cities and Society, 2020
On the security of permutation-only image encryption schemes
A Jolfaei, XW Wu, V Muthukkumarasamy
IEEE transactions on information forensics and security 11 (2), 235-246, 2015
A face emotion recognition method using convolutional neural network and image edge computing
H Zhang, A Jolfaei, M Alazab
IEEE Access 7, 159081-159089, 2019
Privacy-Preserving Federated Learning Framework Based on Chained Secure Multi-Party Computing
Y Li, Y Zhou, A Jolfaei, D Yu, G Xu, X Zheng
IEEE Internet of Things Journal, 2020
Energy-aware marine predators algorithm for task scheduling in IoT-based fog computing applications
M Abdel-Basset, R Mohamed, M Elhoseny, A Jolfaei
IEEE Transactions on Industrial Informatics, 2020
Comments on the security of diffusion–substitution based gray image encryption scheme
A Jolfaei, XW Wu, V Muthukkumarasamy
Digital Signal Processing 32, 34-36, 2014
A systematic review on clone node detection in static wireless sensor networks
M Numan, F Subhan, WZ Khan, A Hakak, Jolfaei
IEEE Access 8, 65450-65461, 2020
A Novel Conflict Measurement in Decision Making and Its Application in Fault Diagnosis
F Xiao, Z Cao, A Jolfaei
IEEE Transactions on Fuzzy Systems, 2020
Consumer, commercial, and industrial iot (in) security: Attack taxonomy and case studies
C Xenofontos, I Zografopoulos, C Konstantinou, A Jolfaei, MK Khan, ...
IEEE Internet of Things Journal 9 (1), 199-221, 2021
An efficient parallel genetic algorithm solution for vehicle routing problem in cloud implementation of the intelligent transportation systems
M Abbasi, M Rafiee, MR Khosravi, A Jolfaei, VG Menon, JM Koushyar
Journal of cloud Computing 9, 1-14, 2020
Attacks on self-driving cars and their countermeasures: A survey
A Chowdhury, G Karmakar, J Kamruzzaman, A Jolfaei, R Das
IEEE Access 8, 207308-207342, 2020
A fuzzy detection system for rumors through explainable adaptive learning
Z Guo, K Yu, A Jolfaei, AK Bashir
IEEE Transactions on Fuzzy Systems, 2021
Image encryption using chaos and block cipher
A Jolfaei, A Mirghadri
Computer and Information Science 4 (1), 172-185, 2011
An image encryption approach using chaos and stream cipher
A Jolfaei, A Mirghadri
Journal of Theoretical and Applied Information Technology 19 (2), 117-125, 2010
A survey of security and privacy issues in the Internet of Things from the layered context
S Deep, X Zheng, A Jolfaei, D Yu, P Ostovari, A Kashif Bashir
Transactions on Emerging Telecommunications Technologies, 2020
Mobility aware blockchain enabled offloading and scheduling in vehicular fog cloud computing
A Lakhan, M Ahmad, M Bilal, A Jolfaei, RM Mehmood
IEEE Transactions on Intelligent Transportation Systems 22 (7), 4212-4223, 2021
The system can't perform the operation now. Try again later.
Articles 1–20