A survey on methods and challenges in EEG based authentication AJ Bidgoly, HJ Bidgoly, Z Arezoumand Computers & Security 93, 101788, 2020 | 134 | 2020 |
Benchmarking reputation systems: A quantitative verification approach AJ Bidgoly, BT Ladani Computers in Human Behavior 57, 274-291, 2016 | 51 | 2016 |
Fake news detection on social media using a natural language inference approach F Sadeghi, AJ Bidgoly, H Amirkhani Multimedia Tools and Applications, 1-21, 2022 | 40 | 2022 |
Towards a universal and privacy preserving EEG-based authentication system AJ Bidgoly, HJ Bidgoly, Z Arezoumand Scientific Reports 12 (1), 2531, 2022 | 37 | 2022 |
Trust modeling and verification using colored petri nets AJ Bidgoly, BT Ladani 2011 8th International ISC Conference on Information Security and Cryptology …, 2011 | 35 | 2011 |
Modelling and quantitative verification of reputation systems against malicious attackers AJ Bidgoly, BT Ladani The Computer Journal 58 (10), 2567-2582, 2015 | 33 | 2015 |
Modeling and quantitative verification of trust systems against malicious attackers AJ Bidgoly, BT Ladani The Computer Journal 59 (7), 1005-1027, 2016 | 31 | 2016 |
Ransomware detection using process mining and classification algorithms A Bahrani, AJ Bidgly 2019 16th International ISC (Iranian Society of Cryptology) Conference on …, 2019 | 20 | 2019 |
Android malware detection using network traffic based on sequential deep learning models S Fallah, AJ Bidgoly Software: Practice and Experience, 2022 | 19 | 2022 |
PDETool: A multi-formalism modeling tool for discrete-event systems based on SDES description A Khalili, A Jalaly Bidgoly, M Abdollahi Azgomi Applications and Theory of Petri Nets: 30th International Conference, PETRI …, 2009 | 19 | 2009 |
Quantitative verification of beta reputation system using PRISM probabilistic model checker AJ Bidgoly, BT Ladani 2013 10th International ISC Conference on Information Security and …, 2013 | 18 | 2013 |
Recommendation system using a deep learning and graph analysis approach M Kherad, AJ Bidgoly Computational Intelligence 38 (5), 1859-1883, 2022 | 17 | 2022 |
Benchmarking machine learning algorithms for android malware detection S Fallah, AJ Bidgoly Jordanian Journal of Computers and Information Technology 5 (3), 2019 | 16 | 2019 |
A novel chaining encryption algorithm for LPWAN IoT network AJ Bidgoly, HJ Bidgoly IEEE Sensors Journal 19 (16), 7027-7034, 2019 | 15 | 2019 |
Multi-thread hierarchical deep model for context-aware sentiment analysis A Keramatfar, H Amirkhani, A Jalaly Bidgoly Journal of Information Science 49 (1), 133-144, 2023 | 13 | 2023 |
A novel reward and penalty trust evaluation model based on confidence interval using Petri Net A Mohsenzadeh, AJ Bidgoly, Y Farjami Journal of Network and Computer Applications 154, 102533, 2020 | 12 | 2020 |
Probabilistic analysis of trust based decision making in hostile environments AJ Bidgoly Knowledge-Based Systems 211, 106521, 2021 | 11 | 2021 |
A systematic survey on collaborator finding systems in scientific social networks Z Roozbahani, J Rezaeenour, H Emamgholizadeh, A Jalaly Bidgoly Knowledge and Information Systems 62, 3837-3879, 2020 | 11 | 2020 |
Intrusion detection system using soft labeling and stacking ensemble HN Abdoli, AJ Bidgoly, S Fallah International Journal of Information Technology 14 (7), 3711-3718, 2022 | 10 | 2022 |
Modeling tweet dependencies with graph convolutional networks for sentiment analysis A Keramatfar, H Amirkhani, AJ Bidgoly Cognitive Computation 14 (6), 2234-2245, 2022 | 9 | 2022 |