default search action
Mohsen Rezvani
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j27]Yeganeh Jalali, Mansoor Fateh, Mohsen Rezvani:
VGA-Net: Vessel graph based attentional U-Net for retinal vessel segmentation. IET Image Process. 18(8): 2191-2213 (2024) - 2023
- [j26]Zahra Katebi, Mohammad Nassiri, Mohsen Rezvani:
XACSim: a new tool for measuring similarity of XACML security policies. Clust. Comput. 26(6): 3957-3972 (2023) - [j25]Esmaeel Tahanian, Alireza Tajary, Mohsen Rezvani:
Game-based congestion-aware routing algorithm in wireless network on chips. Int. J. Ad Hoc Ubiquitous Comput. 42(4): 258-268 (2023) - [j24]Pouria Parhami, Mansoor Fateh, Mohsen Rezvani, Hamid Alinejad-Rokny:
A comparison of deep neural network models for cluster cancer patients through somatic point mutations. J. Ambient Intell. Humaniz. Comput. 14(8): 10883-10898 (2023) - [j23]Amirreza Fateh, Mohsen Rezvani, Alireza Tajary, Mansoor Fateh:
Persian printed text line detection based on font size. Multim. Tools Appl. 82(2): 2393-2418 (2023) - [i1]Mohammadhossein Amouei, Mohsen Rezvani, Mansoor Fateh:
RAT: Reinforcement-Learning-Driven and Adaptive Testing for Vulnerability Discovery in Web Application Firewalls. CoRR abs/2312.07885 (2023) - 2022
- [j22]Mohaddeseh Shahhosseini, Hoda Mashayekhi, Mohsen Rezvani:
A Deep Learning Approach for Botnet Detection Using Raw Network Traffic Data. J. Netw. Syst. Manag. 30(3): 44 (2022) - [j21]Mohsen Rezvani, Mojtaba Rezvani:
Truss decomposition using triangle graphs. Soft Comput. 26(1): 55-68 (2022) - [j20]Mohammadhossein Amouei, Mohsen Rezvani, Mansoor Fateh:
RAT: Reinforcement-Learning-Driven and Adaptive Testing for Vulnerability Discovery in Web Application Firewalls. IEEE Trans. Dependable Secur. Comput. 19(5): 3371-3386 (2022) - 2021
- [j19]Parnia Gheysari, Mansoor Fateh, Mohsen Rezvani:
Lung CT Image Segmentation Using Reinforcement Learning. Int. J. Artif. Intell. Tools 30(2): 2150005:1-2150005:31 (2021) - [j18]Fatemeh Aliannejad, Esmaeel Tahanian, Mansoor Fateh, Mohsen Rezvani:
A Reinforcement Learning-Based Configuring Approach in Next-Generation Wireless Networks Using Software-Defined Metasurface. Secur. Commun. Networks 2021: 5587656:1-5587656:13 (2021) - [j17]Mansoor Fateh, Mohsen Rezvani, Yasser Irani:
A New Method of Coding for Steganography Based on LSB Matching Revisited. Secur. Commun. Networks 2021: 6610678:1-6610678:15 (2021) - [j16]Parimah Ziayi, Seyed Mostafa Farmanbar, Mohsen Rezvani:
YAICD: Yet Another IMSI Catcher Detector in GSM. Secur. Commun. Networks 2021: 8847803:1-8847803:13 (2021) - [j15]Yeganeh Jalali, Mansoor Fateh, Mohsen Rezvani, Vahid Abolghasemi, Mohammad Hossein Anisi:
ResBCDU-Net: A Deep Learning Framework for Lung CT Image Segmentation. Sensors 21(1): 268 (2021) - [c14]Esmaeel Tahanian, Mohsen Rezvani, Mansoor Fateh:
A Novel Wireless Network-on-Chip Architecture for Multicore Systems. CSICC 2021: 1-8 - 2020
- [j14]Marziye Rahmati, Mansoor Fateh, Mohsen Rezvani, Alireza Tajary, Vahid Abolghasemi:
Printed Persian OCR system using deep learning. IET Image Process. 14(15): 3920-3931 (2020) - [j13]Hamidreza Ghonchi, Mansoor Fateh, Vahid Abolghasemi, Saideh Ferdowsi, Mohsen Rezvani:
Deep recurrent-convolutional neural network for classification of simultaneous EEG-fNIRS signals. IET Signal Process. 14(3): 142-153 (2020) - [j12]Esmaeel Tahanian, Alireza Tajary, Mohsen Rezvani, Mansoor Fateh:
Scalable THz Network-On-Chip Architecture for Multichip Systems. J. Comput. Networks Commun. 2020: 8823938:1-8823938:15 (2020) - [j11]Kavan Fatehi, Mohsen Rezvani, Mansoor Fateh:
ASCRClu: an adaptive subspace combination and reduction algorithm for clustering of high-dimensional data. Pattern Anal. Appl. 23(4): 1651-1663 (2020) - [j10]Seyed Amir Hosseini Beghaeiraveri, Mohammad Izadi, Mohsen Rezvani:
Broadcast Complexity and Adaptive Adversaries in Verifiable Secret Sharing. Secur. Commun. Networks 2020: 9428457:1-9428457:10 (2020) - [j9]Shayan Ahmadi, Mohammad Nassiri, Mohsen Rezvani:
XACBench: a XACML policy benchmark. Soft Comput. 24(21): 16081-16096 (2020) - [j8]Mohsen Rezvani, Mojtaba Rezvani:
A Randomized Reputation System in the Presence of Unfair Ratings. ACM Trans. Manag. Inf. Syst. 11(1): 2:1-2:16 (2020) - [c13]Hamidreza Ghonchi, Mansoor Fateh, Vahid Abolghasemi, Saideh Ferdowsi, Mohsen Rezvani:
Spatio-temporal deep learning for EEG-fNIRS brain computer interface. EMBC 2020: 124-127
2010 – 2019
- 2019
- [j7]Mohsen Rezvani, David Rajaratnam, Aleksandar Ignjatovic, Maurice Pagnucco, Sanjay Jha:
Analyzing XACML policies using answer set programming. Int. J. Inf. Sec. 18(4): 465-479 (2019) - [j6]Wael Y. Alghamdi, Mohsen Rezvani, Hui Wu, Salil S. Kanhere:
Routing-Aware and Malicious Node Detection in a Concealed Data Aggregation for WSNs. ACM Trans. Sens. Networks 15(2): 18:1-18:20 (2019) - 2018
- [j5]Kavan Fatehi, Mohsen Rezvani, Mansoor Fateh, Mohammad-Reza Pajoohan:
Subspace Clustering for High-Dimensional Data Using Cluster Structure Similarity. Int. J. Intell. Inf. Technol. 14(3): 38-55 (2018) - [j4]Mohsen Rezvani, Aleksandar Ignjatovic, Elisa Bertino:
A Provenance-Aware Multi-dimensional Reputation System for Online Rating Systems. ACM Trans. Internet Techn. 18(4): 55:1-55:20 (2018) - [j3]Mosarrat Jahan, Mohsen Rezvani, Qianrui Zhao, Partha Sarathi Roy, Kouichi Sakurai, Aruna Seneviratne, Sanjay K. Jha:
Light Weight Write Mechanism for Cloud Data. IEEE Trans. Parallel Distributed Syst. 29(5): 1131-1146 (2018) - 2017
- [c12]Mohsen Rezvani, Mojtaba Rezvani:
A Robust and Fast Reputation System for Online Rating Systems. WISE (2) 2017: 175-183 - 2016
- [c11]Mohsen Rezvani, Aleksandar Ignjatovic, Maurice Pagnucco, Sanjay K. Jha:
Anomaly-free policy composition in software-defined networks. Networking 2016: 28-36 - 2015
- [b1]Mohsen Rezvani:
Trust-Based Data Aggregation for WSNs in the Presence of Faults and Collusion Attacks. University of New South Wales, Sydney, Australia, 2015 - [j2]Mohsen Rezvani, Aleksandar Ignjatovic, Elisa Bertino, Sanjay K. Jha:
Secure Data Aggregation Technique for Wireless Sensor Networks in the Presence of Collusion Attacks. IEEE Trans. Dependable Secur. Comput. 12(1): 98-110 (2015) - [j1]Mohsen Rezvani, Verica Sekulic, Aleksandar Ignjatovic, Elisa Bertino, Sanjay K. Jha:
Interdependent Security Risk Analysis of Hosts and Flows. IEEE Trans. Inf. Forensics Secur. 10(11): 2325-2339 (2015) - [c10]Mohsen Rezvani, Aleksandar Ignjatovic, Elisa Bertino, Sanjay K. Jha:
A Collaborative Reputation System Based on Credibility Propagation in WSNs. ICPADS 2015: 1-8 - [c9]Mohsen Rezvani, Aleksandar Ignjatovic, Elisa Bertino, Sanjay K. Jha:
A trust assessment framework for streaming data in WSNs using iterative filtering. ISSNIP 2015: 1-6 - [c8]Mosarrat Jahan, Mohsen Rezvani, Aruna Seneviratne, Sanjay K. Jha:
Method for providing secure and private fine-grained access to outsourced data. LCN 2015: 406-409 - [c7]Mohsen Rezvani, Mohammad Allahbakhsh, Lorenzo Vigentini, Aleksandar Ignjatovic, Sanjay K. Jha:
An Iterative Algorithm for Reputation Aggregation in Multi-dimensional and Multinomial Rating Systems. SEC 2015: 189-203 - 2014
- [c6]Zainab Abaid, Mohsen Rezvani, Sanjay K. Jha:
MalwareMonitor: An SDN-based Framework for Securing Large Networks. CoNEXT Student Workshop 2014: 40-42 - [c5]Mohsen Rezvani, Aleksandar Ignjatovic, Elisa Bertino, Sanjay K. Jha:
Provenance-aware security risk analysis for hosts and network flows. NOMS 2014: 1-8 - 2013
- [c4]Mohsen Rezvani, Aleksandar Ignjatovic, Sanjay K. Jha:
Iterative Security Risk Analysis for Network Flows Based on Provenance and Interdependency. DCOSS 2013: 286-288 - [c3]Mohsen Rezvani, Aleksandar Ignjatovic, Elisa Bertino, Sanjay K. Jha:
A robust iterative filtering technique for wireless sensor networks in the presence of malicious attacks. SenSys 2013: 30:1-30:2 - 2011
- [c2]Gholam Reza Mohammad-Khani, Mohsen Rezvani, Armin Morattab:
Specification of channel codes types using the PSD and histogram attributes of the received signal. IWSDA 2011: 146-149
2000 – 2009
- 2002
- [c1]Rasool Jalili, Mohsen Rezvani:
Specification and Verification of Security Policies in Firewalls. EurAsia-ICT 2002: 154-163
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-07-20 20:35 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint