Follow
Ali Miri
Title
Cited by
Cited by
Year
An intrusion detection system for wireless sensor networks
I Onat, A Miri
WiMob'2005), IEEE International Conference on Wireless And Mobile Computing …, 2005
3772005
System and method for location-based financial transaction authentication
B Malek, A Miri
US Patent App. 14/443,168, 2015
2002015
An end-to-end QoS mapping approach for cloud service selection
R Karim, C Ding, A Miri
2013 IEEE ninth world congress on services, 341-348, 2013
1512013
A survey of techniques for incremental learning of HMM parameters
W Khreich, E Granger, A Miri, R Sabourin
Information Sciences 197, 105-130, 2012
1442012
Iterative Boolean combination of classifiers in the ROC space: An application to anomaly detection with HMMs
W Khreich, E Granger, A Miri, R Sabourin
Pattern Recognition 43 (8), 2732-2752, 2010
1412010
Fast and flexible elliptic curve point arithmetic over prime fields
P Longa, A Miri
IEEE Transactions on computers 57 (3), 289-302, 2008
1142008
Area-efficient FIR filter design on FPGAs using distributed arithmetic
P Longa, A Miri
2006 IEEE International Symposium on Signal Processing and Information …, 2006
1042006
Using the Extreme Learning Machine (ELM) technique for heart disease diagnosis
S Ismaeel, A Miri, D Chourishi
2015 IEEE Canada International Humanitarian Technology Conference (IHTC2015 …, 2015
1002015
New composite operations and precomputation scheme for elliptic curve cryptosystems over prime fields
P Longa, A Miri
Public Key Cryptography–PKC 2008: 11th International Workshop on Practice …, 2008
832008
Location privacy and anonymity preserving routing for wireless sensor networks
AA Nezhad, A Miri, D Makrakis
Computer Networks 52 (18), 3433-3452, 2008
802008
Adaptive ROC-based ensembles of HMMs applied to anomaly detection
W Khreich, E Granger, A Miri, R Sabourin
Pattern Recognition 45 (1), 208-230, 2012
792012
On defending against label flipping attacks on malware detection systems
R Taheri, R Javidan, M Shojafar, Z Pooranian, A Miri, M Conti
Neural Computing and Applications 32, 14781-14800, 2020
782020
Proactive dynamic virtual-machine consolidation for energy conservation in cloud data centres
S Ismaeel, R Karim, A Miri
Journal of Cloud Computing 7, 1-28, 2018
762018
Privacy-preserving back-propagation and extreme learning machine algorithms
S Samet, A Miri
Data & Knowledge Engineering 79, 40-61, 2012
762012
On the memory complexity of the forward–backward algorithm
W Khreich, E Granger, A Miri, R Sabourin
Pattern Recognition Letters 31 (2), 91-99, 2010
672010
An improved visual cryptography scheme for secret hiding
R Youmaran, A Adler, A Miri
23rd Biennial Symposium on Communications, 2006, 340-343, 2006
662006
Privacy preserving ID3 using Gini index over horizontally partitioned data
S Samet, A Miri
2008 IEEE/ACS International Conference on Computer Systems and Applications …, 2008
622008
Fractal analysis of surface electromyography signals: a novel power spectrum-based method
M Talebinejad, ADC Chan, A Miri, RM Dansereau
Journal of electromyography and kinesiology 19 (5), 840-850, 2009
582009
An IoT trust and reputation model based on recommender systems
S Asiri, A Miri
2016 14th Annual Conference on Privacy, Security and Trust (PST), 561-568, 2016
572016
A Lempel–Ziv complexity measure for muscle fatigue estimation
M Talebinejad, ADC Chan, A Miri
Journal of Electromyography and Kinesiology 21 (2), 236-241, 2011
552011
The system can't perform the operation now. Try again later.
Articles 1–20