Suivre
Sajjad Dadkhah
Titre
Citée par
Citée par
Année
An effective SVD-based image tampering detection and self-recovery using active watermarking
S Dadkhah, A Abd Manaf, Y Hori, AE Hassanien, S Sadeghi
Signal Processing: Image Communication 29 (10), 1197-1210, 2014
1492014
Towards the development of a realistic multidimensional IoT profiling dataset
S Dadkhah, H Mahdikhani, PK Danso, A Zohourian, KA Truong, ...
2022 19th Annual International Conference on Privacy, Security & Trust (PST …, 2022
822022
State of the art in passive digital image forgery detection: copy-move image forgery
S Sadeghi, S Dadkhah, HA Jalab, G Mazzola, D Uliyan
Pattern Analysis and Applications 21, 291-306, 2018
672018
CICIoT2023: A real-time dataset and benchmark for large-scale attacks in IoT environment
ECP Neto, S Dadkhah, R Ferreira, A Zohourian, R Lu, AA Ghorbani
Preprints, 2023
622023
Internet of things (IoT) security dataset evolution: Challenges and future directions
B Kaur, S Dadkhah, F Shoeleh, ECP Neto, P Xiong, S Iqbal, ...
Internet of Things, 100780, 2023
402023
Efficient copy-move forgery detection for digital images
S Sadeghi, HA Jalab, S Dadkhah
International Journal of Computer and Information Engineering 6 (11), 1339-1342, 2012
282012
A survey on IoT profiling, fingerprinting, and identification
M Safi, S Dadkhah, F Shoeleh, H Mahdikhani, H Molyneaux, AA Ghorbani
ACM Transactions on Internet of Things 3 (4), 1-39, 2022
242022
Keypoint based authentication and localization of copy-move forgery in digital image
S Sadeghi, HA Jalab, KS Wong, D Uliyan, S Dadkhah
Malaysian Journal of Computer Science 30 (2), 117-133, 2017
232017
Efficient digital image authentication and tamper localization technique using 3lsb watermarking
S Dadkhah, A Abd Manaf, S Sadeghi
International Journal of Computer Science Issues (IJCSI) 9 (1), 1, 2012
192012
A real-time hostile activities analyses and detection system
S Dadkhah, F Shoeleh, MM Yadollahi, X Zhang, AA Ghorbani
Applied Soft Computing, 107175, 2021
182021
Blockchain scheme based on evolutionary proof of work
WA Syafruddin, S Dadkhah, M Köppen
2019 IEEE Congress on Evolutionary Computation (CEC), 771-776, 2019
182019
Security issues in Internet of Vehicles (IoV): A comprehensive survey
H Taslimasa, S Dadkhah, ECP Neto, P Xiong, S Ray, AA Ghorbani
Internet of Things, 100809, 2023
162023
IoT Zigbee device security: A comprehensive review
A Zohourian, S Dadkhah, ECP Neto, H Mahdikhani, PK Danso, ...
Internet of Things, 100791, 2023
142023
Two-factor blockchain for traceability cacao supply chain
AA Arsyad, S Dadkhah, M Köppen
Advances in Intelligent Networking and Collaborative Systems: The 10th …, 2019
142019
Robust Black-box Watermarking for Deep Neural Network using Inverse Document Frequency
MM Yadollahi, F Shoeleh, S Dadkhah, AA Ghorbani
2021 IEEE Intl Conf on Dependable, Autonomic and Secure Computing, Intl Conf …, 2021
132021
Collaborative DDoS detection in distributed multi-tenant IoT using federated learning
ECP Neto, S Dadkhah, AA Ghorbani
2022 19th Annual International Conference on Privacy, Security & Trust (PST …, 2022
112022
Ensemble-based intrusion detection for internet of things devices
PK Danso, ECP Neto, S Dadkhah, A Zohourian, H Molyneaux, ...
2022 IEEE 19th International Conference on Smart Communities: Improving …, 2022
102022
A feature exploration approach for IoT attack type classification
M Erfani, F Shoeleh, S Dadkhah, B Kaur, P Xiong, S Iqbal, S Ray, ...
2021 IEEE Intl Conf on Dependable, Autonomic and Secure Computing, Intl Conf …, 2021
102021
An efficient image self-recovery and tamper detection using fragile watermarking
S Dadkhah, AA Manaf, S Sadeghi
International Conference Image Analysis and Recognition, 504-513, 2014
102014
Electromagnetismlike Mechanism Descriptor with Fourier Transform for a Passive Copy-move Forgery Detection in Digital Image Forensics
S Dadkhah, M Köppen, HA Jalab, S Sadeghi, AAMD Uliyan
Proceedings of the 6th International Conference on Pattern Recognition …, 2017
92017
Le système ne peut pas réaliser cette opération maintenant. Veuillez réessayer plus tard.
Articles 1–20