Name
Papers
Collaborators
MOHSEN REZVANI
28
43
Citations 
PageRank 
Referers 
82
11.39
229
Referees 
References 
520
259
Search Limit
100520
Title
Citations
PageRank
Year
A Reinforcement Learning-Based Configuring Approach In Next-Generation Wireless Networks Using Software-Defined Metasurface00.342021
A New Method Of Coding For Steganography Based On Lsb Matching Revisited00.342021
Resbcdu-Net: A Deep Learning Framework For Lung Ct Image Segmentation00.342021
Yaicd: Yet Another Imsi Catcher Detector In Gsm00.342021
XACBench: a XACML policy benchmark00.342020
Broadcast Complexity And Adaptive Adversaries In Verifiable Secret Sharing00.342020
Printed Persian Ocr System Using Deep Learning00.342020
Deep Recurrent-Convolutional NeuralNetwork for Classification of SimultaneousEEG-fNIRS Signals30.512020
Spatio-temporal deep learning for EEG-fNIRS brain computer interface00.342020
ASCRClu: an adaptive subspace combination and reduction algorithm for clustering of high-dimensional data00.342020
Routing-Aware and Malicious Node Detection in a Concealed Data Aggregation for WSNs.20.372019
Analyzing XACML policies using answer set programming10.382019
A Provenance-Aware Multi-dimensional Reputation System for Online Rating Systems.10.352018
Subspace Clustering for High-Dimensional Data Using Cluster Structure Similarity00.342018
Light Weight Write Mechanism for Cloud Data.00.342018
A Robust and Fast Reputation System for Online Rating Systems.00.342017
Anomaly-free policy composition in software-defined networks10.352016
Method for providing secure and private fine-grained access to outsourced data00.342015
An Iterative Algorithm For Reputation Aggregation In Multi-Dimensional And Multinomial Rating Systems00.342015
Secure Data Aggregation Technique for Wireless Sensor Networks in the Presence of Collusion Attacks461.302015
A Collaborative Reputation System Based on Credibility Propagation in WSNs40.442015
A trust assessment framework for streaming data in WSNs using iterative filtering20.392015
Provenance-aware security risk analysis for hosts and network flows60.582014
MalwareMonitor: An SDN-based Framework for Securing Large Networks.40.432014
Iterative Security Risk Analysis for Network Flows Based on Provenance and Interdependency00.342013
A robust iterative filtering technique for wireless sensor networks in the presence of malicious attacks100.512013
Specification of channel codes types using the PSD and histogram attributes of the received signal00.342011
Specification and Verification of Security Policies in Firewalls20.372002