关注
Amir Jalaly Bidgoly
Amir Jalaly Bidgoly
Associate Professor at Department of Computer Engineering, University of Qom
在 qom.ac.ir 的电子邮件经过验证 - 首页
标题
引用次数
引用次数
年份
A survey on methods and challenges in EEG based authentication
AJ Bidgoly, HJ Bidgoly, Z Arezoumand
Computers & Security 93, 101788, 2020
1342020
Benchmarking reputation systems: A quantitative verification approach
AJ Bidgoly, BT Ladani
Computers in Human Behavior 57, 274-291, 2016
512016
Fake news detection on social media using a natural language inference approach
F Sadeghi, AJ Bidgoly, H Amirkhani
Multimedia Tools and Applications, 1-21, 2022
402022
Towards a universal and privacy preserving EEG-based authentication system
AJ Bidgoly, HJ Bidgoly, Z Arezoumand
Scientific Reports 12 (1), 2531, 2022
372022
Trust modeling and verification using colored petri nets
AJ Bidgoly, BT Ladani
2011 8th International ISC Conference on Information Security and Cryptology …, 2011
352011
Modelling and quantitative verification of reputation systems against malicious attackers
AJ Bidgoly, BT Ladani
The Computer Journal 58 (10), 2567-2582, 2015
332015
Modeling and quantitative verification of trust systems against malicious attackers
AJ Bidgoly, BT Ladani
The Computer Journal 59 (7), 1005-1027, 2016
312016
Ransomware detection using process mining and classification algorithms
A Bahrani, AJ Bidgly
2019 16th International ISC (Iranian Society of Cryptology) Conference on …, 2019
202019
Android malware detection using network traffic based on sequential deep learning models
S Fallah, AJ Bidgoly
Software: Practice and Experience, 2022
192022
PDETool: A multi-formalism modeling tool for discrete-event systems based on SDES description
A Khalili, A Jalaly Bidgoly, M Abdollahi Azgomi
Applications and Theory of Petri Nets: 30th International Conference, PETRI …, 2009
192009
Quantitative verification of beta reputation system using PRISM probabilistic model checker
AJ Bidgoly, BT Ladani
2013 10th International ISC Conference on Information Security and …, 2013
182013
Recommendation system using a deep learning and graph analysis approach
M Kherad, AJ Bidgoly
Computational Intelligence 38 (5), 1859-1883, 2022
172022
Benchmarking machine learning algorithms for android malware detection
S Fallah, AJ Bidgoly
Jordanian Journal of Computers and Information Technology 5 (3), 2019
162019
A novel chaining encryption algorithm for LPWAN IoT network
AJ Bidgoly, HJ Bidgoly
IEEE Sensors Journal 19 (16), 7027-7034, 2019
152019
Multi-thread hierarchical deep model for context-aware sentiment analysis
A Keramatfar, H Amirkhani, A Jalaly Bidgoly
Journal of Information Science 49 (1), 133-144, 2023
132023
A novel reward and penalty trust evaluation model based on confidence interval using Petri Net
A Mohsenzadeh, AJ Bidgoly, Y Farjami
Journal of Network and Computer Applications 154, 102533, 2020
122020
Probabilistic analysis of trust based decision making in hostile environments
AJ Bidgoly
Knowledge-Based Systems 211, 106521, 2021
112021
A systematic survey on collaborator finding systems in scientific social networks
Z Roozbahani, J Rezaeenour, H Emamgholizadeh, A Jalaly Bidgoly
Knowledge and Information Systems 62, 3837-3879, 2020
112020
Intrusion detection system using soft labeling and stacking ensemble
HN Abdoli, AJ Bidgoly, S Fallah
International Journal of Information Technology 14 (7), 3711-3718, 2022
102022
Modeling tweet dependencies with graph convolutional networks for sentiment analysis
A Keramatfar, H Amirkhani, AJ Bidgoly
Cognitive Computation 14 (6), 2234-2245, 2022
92022
系统目前无法执行此操作,请稍后再试。
文章 1–20