Alireza Jolfaei

Dr

20102019
If you made any changes in Pure these will be visible here soon.

Research Outputs 2010 2019

2019

A lightweight integrity protection scheme for low latency smart grid applications

Jolfaei, A. & Kant, K., 1 Sep 2019, In : Computers and Security. 86, p. 471-483 13 p.

Research output: Contribution to journalArticleResearchpeer-review

Phasor measurement units
integrity
Communication
Electric potential
Time measurement

Cybersecurity indexes for eHealth

Burke, W., Oseni, T., Jolfaei, A. & Gondal, I., 29 Jan 2019, ACSW 2019 Proceedings of the Australasian Computer Science Week Multiconference . New York: ACM Press, p. 1-8 8 p. a17

Research output: Chapter in Book/Report/Conference proceedingConference proceeding contributionResearchpeer-review

health industry
security sector
community
ranking
threat

DBD: deep learning DGA-based botnet detection

Vinayakumar, R., Soman, K. P., Poornachandran, P., Alazab, M. & Jolfaei, A., Aug 2019, Deep learning applications for cyber security. Alazab, M. & Tang, M. (eds.). Switzerland: Springer, p. 127-149 23 p. (Advanced Sciences and Technologies for Security Applications).

Research output: Chapter in Book/Report/Conference proceedingChapterResearchpeer-review

Internet
Reverse engineering
Inspection
Deep learning
Botnet

Detection and compensation of covert service-degrading intrusions in cyber physical systems through intelligent adaptive control

Farivar, F., Sayad Haghighi, M., Barchinezhad, S. & Jolfaei, A., 2019, Proceedings 20th IEEE International Conference on Industrial Technology (ICIT). Institute of Electrical and Electronics Engineers (IEEE), p. 1143-1148 6 p.

Research output: Chapter in Book/Report/Conference proceedingConference proceeding contributionResearchpeer-review

Error statistics
Critical infrastructures
Controllers
Networked control systems
DC motors

Differentially private streaming to untrusted edge servers in intelligent transportation system

Ghane, S., Jolfaei, A., Kulik, L. & Ramamohanarao, K., 2019, Proceedings 2019 18th IEEE International Conference on Trust, Security and Privacy in Computing and Communications / 13th IEEE International Conference on Big Data Science and Engineering. Los Alamitos: Institute of Electrical and Electronics Engineers (IEEE), p. 781-786 6 p.

Research output: Chapter in Book/Report/Conference proceedingConference proceeding contributionResearchpeer-review

Servers
Dedicated short range communications
Network protocols
Automotive industry
Communication

Privacy and security of connected vehicles in Intelligent Transportation System

Jolfaei, A. & Kant, K., 2019, Proceedings 49th IEEE/IFIP International Conference on Dependable Systems and Networks: DSN 2019 Supplemental Volume. Institute of Electrical and Electronics Engineers (IEEE), p. 9-10 2 p.

Research output: Chapter in Book/Report/Conference proceedingConference proceeding contributionResearchpeer-review

Data privacy
Security of data
Scalability

Secure data streaming to untrusted road side units in intelligent transportation system

Jolfaei, A., Kant, K. & Shafei, H., 2019, Proceedings 2019 18th IEEE International Conference on Trust, Security and Privacy in Computing and Communications / 13th IEEE International Conference on Big Data Science and Engineering. Los Alamitos: Institute of Electrical and Electronics Engineers (IEEE), p. 793-798 6 p.

Research output: Chapter in Book/Report/Conference proceedingConference proceeding contributionResearchpeer-review

Security of data
Scalability
Communication

Security hardening of implantable cardioverter defibrillators

Jaffar, I., Usman, M. & Jolfaei, A., 2019, Proceedings 2019 IEEE International Conference on Industrial Technology (ICIT). Institute of Electrical and Electronics Engineers (IEEE), p. 1173-1178 6 p.

Research output: Chapter in Book/Report/Conference proceedingConference proceeding contributionResearchpeer-review

Implantable cardioverter defibrillators
Hardening
Controllers
Communication

Vulnerability modelling for hybrid IT systems

Ur-Rehman, A., Gondal, I., Kamruzzuman, J. & Jolfaei, A., 2019, Proceedings 2019 IEEE International Conference on Industrial Technology (ICIT). Institute of Electrical and Electronics Engineers (IEEE), p. 1186-1191 6 p.

Research output: Chapter in Book/Report/Conference proceedingConference proceeding contributionResearchpeer-review

Embedded systems
Supply chains
Internet of things
Computer systems
Industry
2018

Data exchange in delay tolerant networks using joint inter-and intra-flow network coding

Ostovari, P., Wu, J. & Jolfaei, A., 2018, 37th IEEE International Performance Computing and Communications Conference (IPCCC). Institute of Electrical and Electronics Engineers (IEEE), p. 1-8 8 p.

Research output: Chapter in Book/Report/Conference proceedingConference proceeding contributionResearchpeer-review

Delay tolerant networks
Network coding
Electronic data interchange
Routing protocols
Data communication systems

Secure passive keyless entry and start system using machine learning

Ahmad, U., Song, H., Bilal, A., Alazab, M. & Jolfaei, A., 2018, Security, Privacy and Anonymity in Computation, Communication and Storage: 11th International Conference and Satellite Workshops, SpaCCS 2018. Proceedings. Wang, G., Chen, J. & Yang, L. T. (eds.). Cham: Springer, p. 304-313 10 p. (Lecture Notes in Computer Science; vol. 11342).

Research output: Chapter in Book/Report/Conference proceedingConference proceeding contributionResearchpeer-review

Learning systems
Supervised learning
Decision trees
Communication
2017

A lightweight integrity protection scheme for fast communications in smart grid

Jolfaei, A. & Kant, K., 2017, Proceedings of the 14th International Joint Conference on e-Business and Telecommunications: Volume 6: SECRYPT. Obaidat, M. S., Samarati, P. & Cabello, E. (eds.). SciTePress, p. 31-42 12 p.

Research output: Chapter in Book/Report/Conference proceedingConference proceeding contributionResearchpeer-review

Phasor measurement units
Communication
Smart power grids
Energy management
Time measurement
2016

On the security of permutation-only image encryption schemes

Jolfaei, A., Wu, X. & Muthukkumarasamy, V., Feb 2016, In : IEEE Transactions on Information Forensics and Security. 11, 2, p. 235-246 12 p.

Research output: Contribution to journalArticleResearchpeer-review

Cryptography
Polynomials
Color
Experiments
2015

3D content encryption in augmented reality

Jolfaei, A., Wu, X. & Muthukkumarasamy, V., 2015, 1 p.

Research output: Other contributionResearch

A 3D object encryption scheme which maintains dimensional and spatial stability

Jolfaei, A., Wu, X-W. & Muthukkumarasamy, V., 2015, WIFS 2015, 7th IEEE International Workshop on Information Forensics and Security: Final Program and Abstract Book. Institute of Electrical and Electronics Engineers (IEEE), p. 53-54 2 p.

Research output: Chapter in Book/Report/Conference proceedingConference abstractResearchpeer-review

A 3D object encryption scheme which maintains dimensional and spatial stability

Jolfaei, A., Wu, X-W. & Muthukkumarasamy, V., Feb 2015, In : IEEE Transactions on Information Forensics and Security. 10, 2, p. 409-422 14 p.

Research output: Contribution to journalArticleResearchpeer-review

Cryptography
Surface reconstruction
Geometry

A secure lightweight texture encryption scheme

Jolfaei, A., Wu, X-W. & Muthukkumarasamy, V., 2015, Image and Video Technology – PSIVT 2015 Workshops: RV 2015, GPID 2013, VG 2015, EO4AS 2015, MCBMIIA 2015, and VSWS 2015. Revised Selected Papers. Huang, F. & Sugimoto, A. (eds.). Switzerland: Springer, p. 344-356 13 p. (Lecture Notes in Computer Science; vol. 9555).

Research output: Chapter in Book/Report/Conference proceedingConference proceeding contributionResearchpeer-review

Cryptography
Textures
Virtual reality
Geometry

Preserving the confidentiality of digital images using a chaotic encryption scheme

Jolfaei, A., Matinfar, A. & Mirghadri, A., 2015, In : International Journal of Electronic Security and Digital Forensics. 7, 3, p. 258-277 20 p.

Research output: Contribution to journalArticleResearchpeer-review

Cryptography
Entropy
entropy
Testing
multimedia
2014

Comments on the security of "Diffusion–substitution based gray image encryption" scheme

Jolfaei, A., Wu, X-W. & Muthukkumarasamy, V., 2014, In : Digital Signal Processing: A Review Journal. 32, p. 34-36 3 p.

Research output: Contribution to journalArticleResearchpeer-review

Cryptography
Substitution reactions
Defects
2013

On the feasibility and performance of pass-thought authentication systems

Jolfaei, A., Wu, X-W. & Muthukkumarasamy, V., 2013, Proceedings of the 2013 Fourth International Conference on Emerging Security Technologies. Washington: Institute of Electrical and Electronics Engineers (IEEE), p. 33-38 6 p.

Research output: Chapter in Book/Report/Conference proceedingConference proceeding contributionResearchpeer-review

Authentication
Brain computer interface
Communication
Hinges
Biometrics
2012

Image encryption using HC-128 and HC-256 stream ciphers

Jolfaei, A., Vizandan, A. & Mirghadri, A., 2012, In : International Journal of Electronic Security and Digital Forensics. 4, 1, p. 19-42 24 p.

Research output: Contribution to journalArticleResearchpeer-review

Cryptography
Information analysis
Sensitivity analysis
Entropy
Scanning

Impact of rotations in the Salsa20/8 image encryption scheme

Jolfaei, A., Mirghadri, A. & Vizandan, A., 2012, In : International Journal of Computer Theory and Engineering. 4, 6, p. 938-943 6 p.

Research output: Contribution to journalArticleResearchpeer-review

Cryptography
2011

Enhanced adaptive bandwidth tracking using mean shift algorithm

Mohammadi, S. A., Amoozegar, S., Jolfaei, A. & Mirghadri, A., 2011, IEEE 3rd International Conference on Communication Software and Networks. Institute of Electrical and Electronics Engineers (IEEE), p. 494-498 5 p.

Research output: Chapter in Book/Report/Conference proceedingConference proceeding contributionResearchpeer-review

Bandwidth
Color

Image encryption using chaos and block cipher

Jolfaei, A. & Mirghadri, A., 1 Jan 2011, In : Computer and Information Science. 4, 1, p. 172-185 14 p.

Research output: Contribution to journalArticleResearchpeer-review

Open Access
Chaos theory
Cryptography
Sensitivity analysis
Entropy
Pixels

Impact of Rotations in Salsa20/8 Image Encryption Scheme

Jolfaei, A., Mirghadri, A. & Vizandan, A., 2011, Proceedings of the 4th IEEE International Conference on Computer Science and Information Technology. Institute of Electrical and Electronics Engineers (IEEE), p. 351-357 7 p.

Research output: Chapter in Book/Report/Conference proceedingConference proceeding contributionResearchpeer-review

Cryptography

Substitution-permutation based image cipher using chaotic Henon and Baker’s maps

Jolfaei, A. & Mirghadri, A., 2011, In : International Review on Computers and Software. 6, 1, p. 40-54 15 p.

Research output: Contribution to journalArticleResearchpeer-review

Cryptography
Substitution reactions
Information analysis
Sensitivity analysis
Entropy

تصنيع جهاز محاكاة لإمكانات عمل الخلايا العصبية

Jolfaei, A., 2011, In : The Scientific Journal of Passive Defence Science and Technology. 1, 2, p. 13-23 11 p.

Research output: Contribution to journalArticleResearchpeer-review

Microcontrollers
Neurons
Simulators
Fabrication
Equivalent circuits

طرح جديد رمزنگاري تصوير با استفاده از نگاشتهاي آشوبي

Mirghadri, A. & Jolfaei, A., 2011, In : The Scientific Journal of Passive Defence Science and Technology. 2, 2, p. 111-124 14 p.

Research output: Contribution to journalArticleResearchpeer-review

Cryptography
Information analysis
Security of data
MATLAB
Sensitivity analysis
2010

Ad-hoc بهینه در شبکه های یک روش مسیریابی

Madadi, B., Jolfaei, A., Attaran, A. & Nikan, S., 2010, 15th National Computer Conference. Iran, 5 p.

Research output: Chapter in Book/Report/Conference proceedingConference proceeding contributionResearchpeer-review

An applied imagery encryption algorithm based on shuffling and baker's map

Jolfaei, A. & Mirghadri, A., 2010, International Conference on Artificial Intelligence and Pattern Recognition 2010: (AIPR-10). Majkic, Z., Tamir, D. & Wang, G. (eds.). Curran Associates, p. 279-285 7 p.

Research output: Chapter in Book/Report/Conference proceedingConference proceeding contributionResearchpeer-review

Cryptography
Chaos theory
Pixels

A new approach to measure quality of image encryption

Jolfaei, A. & Mirghadri, A., 2010, In : International Journal of Computer and Network Security. 2, 8, p. 38-43 6 p.

Research output: Contribution to journalArticleResearchpeer-review

Cryptography
Inspection
Security of data
Pixels

A new classification in measurement methods of image encryption quality

Jolfaei, A. & Mirghadri, A., 2010, Proceedings of the 2010 International Conference on Intelligent Network and Computing. 5 p.

Research output: Chapter in Book/Report/Conference proceedingConference proceeding contributionResearchpeer-review

Cryptography
Inspection
Security of data
Pixels

An image encryption approach using chaos and stream cipher

Jolfaei, A. & Mirghadri, A., 2010, In : Journal of Theoretical and Applied Information Technology. 19, 2, p. 117-125 9 p.

Research output: Contribution to journalArticleResearchpeer-review

Image Encryption
Stream Cipher
Chaotic Map
Chaos theory
Cryptography

A novel image encryption scheme using pixel shuffler and A5/1

Jolfaei, A. & Mirghadri, A., 2010, 2010 International Conference on Artificial Intelligence and Computational Intelligence. Institute of Electrical and Electronics Engineers (IEEE), p. 369-373 5 p.

Research output: Chapter in Book/Report/Conference proceedingConference proceeding contributionResearchpeer-review

Cryptography
Pixels
Chaos theory

Survey: image encryption using A5/1 and W7

Jolfaei, A. & Mirghadri, A., 2010, In : Journal of Computing. 2, 8, p. 1-7 7 p.

Research output: Contribution to journalArticleResearchpeer-review

Cryptography
MATLAB
Sensitivity analysis
Entropy

Survey: image encryption using Salsa20

Jolfaei, A. & Mirghadri, A., 2010, In : International Journal of Computer Science Issues. 7, 5, p. 213-220 8 p.

Research output: Contribution to journalArticleResearchpeer-review

Cryptography
Information analysis
Sensitivity analysis
Entropy
Testing

ارائه روشي جديد براي بررسي الكتروفيزيولوژي سلولي با استفاده از ميكروكنترلر

Jolfaei, A., 2010, The First National Congress on Novel Technologies in Engineering Sciences. Iran, 10 p.

Research output: Chapter in Book/Report/Conference proceedingConference proceeding contributionResearchpeer-review

ارائه روشی جدید در طراحی الکترومیوگرافی کانال دوتایی با قابلیت طبقه بندی حرکت با استفاده از منطق فازی

Moharamzadeh, N., Jolfaei, A. & Haghani, N., 2010, The First Student Conference on Electrical Region of Research Achievements. Iran, 11 p.

Research output: Chapter in Book/Report/Conference proceedingConference proceeding contributionResearchpeer-review

ارتباطی نوری هادی در سیستم های کاربرد لیزرهای نیمه

Jolfaei, A., Mirghadri, A. & Madadi, B., 2010, The First Student Conference on Electrical Region of Research Achievements. Iran, 5 p.

Research output: Chapter in Book/Report/Conference proceedingConference proceeding contributionResearchpeer-review

تشخیص قند خون و بارداری با استفاده از نوارهای تشخیصی و نرم افزارMATLAB

Jolfaei, A., Moharamzadeh, N. & Haghani, N., 2010, 13th Iranian Student Conference on Electrical Engineering: ISCEE 2010. 5 p.

Research output: Chapter in Book/Report/Conference proceedingConference proceeding contributionResearchpeer-review

داخلی سیستم ارتباطی بی سیم

Jolfaei, A., Mirghadri, A., Madadi, B. & Naderi, G., 2010, The First Student Conference on Electrical Region of Research Achievements. Iran, 8 p.

Research output: Chapter in Book/Report/Conference proceedingConference proceeding contributionResearchpeer-review