Secure intelligent fuzzy blockchain framework: Effective threat detection in iot networks

A Yazdinejad, A Dehghantanha, RM Parizi… - Computers in …, 2023 - Elsevier
Integrating blockchain into the Internet of Things (IoT) for security is a new development in
computational communication systems. While security threats are changing their strategies …

An optimized fuzzy deep learning model for data classification based on NSGA-II

A Yazdinejad, A Dehghantanha, RM Parizi… - Neurocomputing, 2023 - Elsevier
As a powerful paradigm, deep learning (DL) models have been used in many applications
for classification tasks in images, text, and audio. Through DL models, we can learn task …

Hybrid privacy preserving federated learning against irregular users in next-generation Internet of Things

A Yazdinejad, A Dehghantanha, G Srivastava… - Journal of Systems …, 2024 - Elsevier
While federated learning (FL) is a well-known privacy-preserving (PP) solution, recent
studies demonstrate that it still has privacy problems and vulnerabilities, particularly in the …

Analyzing xai metrics: Summary of the literature review

M Sisk, M Majlis, C Page, A Yazdinejad - Authorea Preprints, 2023 - techrxiv.org
The widespread adoption of Artificial Intelligence (AI) models by various industries in recent
years have made Explainable Artificial Intelligence (XAI) an active field of research. This …

Ai in software engineering: A survey on project management applications

T Crawford, S Duong, R Fueston, A Lawani… - arXiv preprint arXiv …, 2023 - arxiv.org
Artificial Intelligence (AI) refers to the intelligence demonstrated by machines, and within the
realm of AI, Machine Learning (ML) stands as a notable subset. ML employs algorithms that …

Generative adversarial networks for cyber threat hunting in ethereum blockchain

E Rabieinejad, A Yazdinejad, RM Parizi… - … : Research and Practice, 2023 - dl.acm.org
Ethereum blockchain has shown great potential in providing the next generation of the
decentralized platform beyond crypto payments. Recently, it has attracted researchers and …

A bert-based recommender system for secure blockchain-based cyber physical drug supply chain management

A Yazdinejad, E Rabieinejad, T Hasani, G Srivastava - Cluster Computing, 2023 - Springer
Abstract Drug Supply Chain Management (DSCM) can be one of the most affected streams
in healthcare due to pandemics. The delivery of medicine to patients through DSCM is a …

Designing the future of coopetition: An IIoT approach for empowering SME networks

A da Silva, AJ Marques Cardoso - The International Journal of Advanced …, 2024 - Springer
In an era where Information and Communication Technologies (ICT) redefine the
boundaries of competition and collaboration, the concept of coopetition—simultaneous …

DDoS attacks and machine‐learning‐based detection methods: A survey and taxonomy

M Najafimehr, S Zarifzadeh, S Mostafavi - Engineering Reports, 2023 - Wiley Online Library
Distributed denial of service (DDoS) attacks represent a significant cybersecurity challenge,
posing a critical risk to computer networks. Developing an effective defense mechanism …

Systemization of Knowledge (SoK)-Cross Impact of Transfer Learning in Cybersecurity: Offensive, Defensive and Threat Intelligence Perspectives

S Makar, A Dehghantanha, F Zarrinkalam… - arXiv preprint arXiv …, 2023 - arxiv.org
Recent literature highlights a significant cross-impact between transfer learning and
cybersecurity. Many studies have been conducted on using transfer learning to enhance …