Остановите войну!
for scientists:
default search action
Alireza Jolfaei
- > Home > Persons > Alireza Jolfaei
Publications
- 2022
- [j110]Samundra Deep, Xi Zheng, Alireza Jolfaei, Dongjin Yu, Pouya Ostovari, Ali Kashif Bashir:
A survey of security and privacy issues in the Internet of Things from the layered context. Trans. Emerg. Telecommun. Technol. 33(6) (2022) - [j106]G. Thippa Reddy, Sweta Bhattacharya, Praveen Kumar Reddy Maddikunta, Saqib Hakak, Wazir Zada Khan, Ali Kashif Bashir, Alireza Jolfaei, Usman Tariq:
Antlion re-sampling based deep neural network model for classification of imbalanced multimodal stroke dataset. Multim. Tools Appl. 81(29): 41429-41453 (2022) - [j93]Mahdi Dibaei, Xi Zheng, Youhua Xia, Xiwei Xu, Alireza Jolfaei, Ali Kashif Bashir, Usman Tariq, Dongjin Yu, Athanasios V. Vasilakos:
Investigating the Prospect of Leveraging Blockchain and Machine Learning to Secure Vehicular Networks: A Survey. IEEE Trans. Intell. Transp. Syst. 23(2): 683-700 (2022) - 2021
- [j64]Feiran Huang, Alireza Jolfaei, Ali Kashif Bashir:
Robust Multimodal Representation Learning With Evolutionary Adversarial Attention Networks. IEEE Trans. Evol. Comput. 25(5): 856-868 (2021) - [j62]Zuohong Xu, Zhou Zhang, Shilian Wang, Alireza Jolfaei, Ali Kashif Bashir, Ye Yan, Shahid Mumtaz:
Decentralized Opportunistic Channel Access in CRNs Using Big-Data Driven Learning Algorithm. IEEE Trans. Emerg. Top. Comput. Intell. 5(1): 57-69 (2021) - [j60]Zhiwei Guo, Keping Yu, Alireza Jolfaei, Ali Kashif Bashir, Alaa Omran Almagrabi, Neeraj Kumar:
Fuzzy Detection System for Rumors Through Explainable Adaptive Learning. IEEE Trans. Fuzzy Syst. 29(12): 3650-3664 (2021) - [j53]Mohamed Abdel-Basset, Reda Mohamed, Mohamed Elhoseny, Ali Kashif Bashir, Alireza Jolfaei, Neeraj Kumar:
Energy-Aware Marine Predators Algorithm for Task Scheduling in IoT-Based Fog Computing Applications. IEEE Trans. Ind. Informatics 17(7): 5068-5076 (2021) - [j42]Tao Wang, Zhigao Zheng, Ali Kashif Bashir, Alireza Jolfaei, Yanyan Xu:
FinPrivacy: A Privacy-preserving Mechanism for Fingerprint Identification. ACM Trans. Internet Techn. 21(3): 56:1-56:15 (2021) - [j37]Azeem Irshad, Muhammad Usman, Shehzad Ashraf Chaudhry, Ali Kashif Bashir, Alireza Jolfaei, Gautam Srivastava:
Fuzzy-in-the-Loop-Driven Low-Cost and Secure Biometric User Access to Server. IEEE Trans. Reliab. 70(3): 1014-1025 (2021) - 2020
- [j26]Haijun Liao, Zhenyu Zhou, Xiongwen Zhao, Lei Zhang, Shahid Mumtaz, Alireza Jolfaei, Syed Hassan Ahmed, Ali Kashif Bashir:
Learning-Based Context-Aware Resource Allocation for Edge-Computing-Empowered Industrial IoT. IEEE Internet Things J. 7(5): 4260-4277 (2020) - [j11]Siyi Liao, Jun Wu, Jianhua Li, Ali Kashif Bashir, Shahid Mumtaz, Alireza Jolfaei, Nida Kvedaraite:
Cognitive Popularity Based AI Service Sharing for Software-Defined Information-Centric Networks. IEEE Trans. Netw. Sci. Eng. 7(4): 2126-2136 (2020)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-25 01:16 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint