default search action
Haleh Amintoosi
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2025
- [j24]Tahereh Nayerifard, Haleh Amintoosi, Abbas Ghaemi Bafghi:
A robust PRNU-based source camera attribution with convolutional neural networks. J. Supercomput. 81(1): 25 (2025) - 2024
- [j23]Seyyed Javad Bozorg Zadeh Razavi, Haleh Amintoosi, Mohammad Allahbakhsh:
A clarity and fairness aware framework for selecting workers in competitive crowdsourcing tasks. Computing 106(9): 3005-3030 (2024) - [j22]Mahdi Nikooghadam, Haleh Amintoosi, Hamid Reza Shahriari:
REACH: Robust Efficient Authentication for Crowdsensing-based Healthcare. J. Supercomput. 80(6): 8434-8468 (2024) - 2023
- [j21]Fatemeh Farhadi, Mohammad Allahbakhsh, Ali Maghsoudi, Nadieh Armin, Haleh Amintoosi:
DiMo: discovery of microRNA motifs using deep learning and motif embedding. Briefings Bioinform. 24(3) (2023) - [j20]Mahdi Nikooghadam, Haleh Amintoosi:
Secure communication in CloudIoT through design of a lightweight authentication and session key agreement scheme. Int. J. Commun. Syst. 36(1) (2023) - [i4]Tahereh Nayerifard, Haleh Amintoosi, Abbas Ghaemi Bafghi, Ali Dehghantanha:
Machine Learning in Digital Forensics: A Systematic Literature Review. CoRR abs/2306.04965 (2023) - 2022
- [j19]Haleh Amintoosi, Mahdi Nikooghadam, Mohammad Shojafar, Saru Kumari, Mamoun Alazab:
Slight: A lightweight authentication scheme for smart healthcare services. Comput. Electr. Eng. 99: 107803 (2022) - [j18]Mohammad Allahbakhsh, Haleh Amintoosi, Schahram Dustdar, Hamid Reza Motahari-Nezhad:
Sharing Reputation Data Across Online Communities. IEEE Internet Comput. 26(4): 60-67 (2022) - [j17]Haleh Amintoosi, Mahdi Nikooghadam, Saru Kumari, Feng Jun, Hu Xiong, Sachin Kumar, Joel J. P. C. Rodrigues:
Secure and Authenticated Data Access and Sharing Model for Smart Wearable Systems. IEEE Internet Things J. 9(7): 5368-5379 (2022) - [j16]Seyed Salar Ghazi, Haleh Amintoosi, Sahar Pilevar Moakhar:
On the Suitability of Improved TrustChain for Smartphones. ISC Int. J. Inf. Secur. 14(3): 33-42 (2022) - [j15]Mohammad Allahbakhsh, Haleh Amintoosi, Aleksandar Ignjatovic, Elisa Bertino:
A Trust-Based Experience-Aware Framework for Integrating Fuzzy Recommendations. IEEE Trans. Serv. Comput. 15(2): 698-709 (2022) - [j14]Mohammad Allahbakhsh, Haleh Amintoosi, Behshid Behkamal, Salil S. Kanhere, Elisa Bertino:
AQA: An Adaptive Quality Assessment Framework for Online Review Systems. IEEE Trans. Serv. Comput. 15(3): 1486-1497 (2022) - 2021
- [j13]Nedhal Ahmad Hamdi Qaiwmchi, Haleh Amintoosi, Amir Hossein Mohajerzadeh:
Intrusion Detection System Based on Gradient Corrected Online Sequential Extreme Learning Machine. IEEE Access 9: 4983-4999 (2021) - [j12]Mohammad Allahbakhsh, Haleh Amintoosi, Behshid Behkamal, Amin Beheshti, Elisa Bertino:
SCiMet: Stable, sCalable and reliable Metric-based framework for quality assessment in collaborative content generation systems. J. Informetrics 15(2): 101127 (2021) - [j11]Mahdi Nikooghadam, Haleh Amintoosi, SK Hafizul Islam, Mostafa Farhadi Moghadam:
A provably secure and lightweight authentication scheme for Internet of Drones for smart city surveillance. J. Syst. Archit. 115: 101955 (2021) - [j10]Mahdi Nikooghadam, Haleh Amintoosi, Saru Kumari:
On the Security of "Secure and Lightweight Authentication with Key Agreement for Smart Wearable Systems". Wirel. Pers. Commun. 120(1): 1-8 (2021) - [c7]Fariba Abedinzadeh, Haleh Amintoosi, Mohammad Allahbakhsh:
An Iterative Model for Quality Assessment in Collaborative Content Generation Systems. ICSOC Workshops 2021: 125-138 - 2020
- [j9]Masood Niazi Torshiz, Azadeh Salehi Esfaji, Haleh Amintoosi:
Enhanced schemes for data fragmentation, allocation, and replication in distributed database systems. Comput. Syst. Sci. Eng. 35(2) (2020) - [j8]Haleh Amintoosi, Masood Niazi Torshiz, Yahya Forghani, Sara Alinejad:
An efficient storage-optimizing tick data clustering model. Turkish J. Electr. Eng. Comput. Sci. 28(5): 2657-2669 (2020) - [j7]Mahdi Nikooghadam, Haleh Amintoosi, Saru Kumari:
A provably secure ECC-based roaming authentication scheme for global mobility networks. J. Inf. Secur. Appl. 54: 102588 (2020) - [j6]Mahdi Nikooghadam, Haleh Amintoosi:
A secure and robust elliptic curve cryptography-based mutual authentication scheme for session initiation protocol. Secur. Priv. 3(1) (2020) - [j5]Mahdi Nikooghadam, Haleh Amintoosi:
Perfect forward secrecy via an ECC-based authentication scheme for SIP in VoIP. J. Supercomput. 76(4): 3086-3104 (2020) - [p1]Ala Ekramifard, Haleh Amintoosi, Amin Hosseini Seno, Ali Dehghantanha, Reza M. Parizi:
A Systematic Literature Review of Integration of Blockchain and Artificial Intelligence. Blockchain Cybersecurity, Trust and Privacy 2020: 147-160
2010 – 2019
- 2019
- [e1]Abbas Ghaemi Bafghi, Haleh Amintoosi:
16th International ISC (Iranian Society of Cryptology) Conference on Information Security and Cryptology, ISCISC 2019, Mashhad, Iran, August 28-29, 2019. IEEE 2019, ISBN 978-1-7281-4374-3 [contents] - [i3]Mahdi Nikooghadam, Haleh Amintoosi:
Cryptanalysis of Khatoon et al.'s ECC-based Authentication Protocol for Healthcare Systems. CoRR abs/1906.08424 (2019) - 2018
- [j4]Ahmed Almusawi, Haleh Amintoosi:
DNS Tunneling Detection Method Based on Multilabel Support Vector Machine. Secur. Commun. Networks 2018: 6137098:1-6137098:9 (2018) - 2017
- [c6]Mohammad Allahbakhsh, Haleh Amintoosi, Salil S. Kanhere:
A Game-Theoretic Approach to Quality Improvement in Crowdsourcing Tasks. ASSRI 2017: 116-130 - [c5]Haleh Amintoosi, Mohammad Allahbakhsh, Salil S. Kanhere, Aleksandar Ignjatovic:
Trust and Privacy Challenges in Social Participatory Networks. ASSRI 2017: 178-190 - 2015
- [j3]Haleh Amintoosi, Salil S. Kanhere, Mohammad Allahbakhsh:
Trust-based privacy-aware participant selection in social participatory sensing. J. Inf. Secur. Appl. 20: 11-25 (2015) - [c4]Haleh Amintoosi, Salil S. Kanhere, Masood Niazi Torshiz:
A socially-aware incentive scheme for social participatory sensing. ISSNIP 2015: 1-6 - 2014
- [b1]Haleh Amintoosi:
Trust and Privacy in Social Participatory Sensing. University of New South Wales, Sydney, Australia, 2014 - [j2]Haleh Amintoosi, Salil S. Kanhere:
A Reputation Framework for Social Participatory Sensing Systems. Mob. Networks Appl. 19(1): 88-100 (2014) - 2013
- [c3]Haleh Amintoosi, Salil S. Kanhere:
A Trust-Based Recruitment Framework for Multi-hop Social Participatory Sensing. DCOSS 2013: 266-273 - [c2]Haleh Amintoosi, Salil S. Kanhere:
Privacy-Aware Trust-Based Recruitment in Social Participatory Sensing. MobiQuitous 2013: 262-275 - [i2]Haleh Amintoosi, Salil S. Kanhere:
A Trust-based Recruitment Framework for Multi-hop Social Participatory Sensing. CoRR abs/1306.0193 (2013) - [i1]Haleh Amintoosi, Salil S. Kanhere:
Providing Trustworthy Contributions via a Reputation Framework in Social Participatory Sensing Systems. CoRR abs/1311.2349 (2013) - 2012
- [c1]Haleh Amintoosi, Salil S. Kanhere:
A Trust Framework for Social Participatory Sensing Systems. MobiQuitous 2012: 237-249
2000 – 2009
- 2005
- [j1]Mohammad Hossien Yaghmaee, Mohammad Bagher Menhaj, Haleh Amintoosi:
Design and performance evaluation of a fuzzy based traffic conditioner for differentiated services. Comput. Networks 47(6): 847-869 (2005)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-11 22:24 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint