default search action
Sajjad Dadkhah
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j18]Euclides Carlos Pinto Neto, Sajjad Dadkhah, Somayeh Sadeghi, Heather Molyneaux, Ali A. Ghorbani:
A review of Machine Learning (ML)-based IoT security in healthcare: A dataset perspective. Comput. Commun. 213: 61-77 (2024) - [j17]Alireza Zohourian, Sajjad Dadkhah, Heather Molyneaux, Euclides Carlos Pinto Neto, Ali A. Ghorbani:
IoT-PRIDS: Leveraging packet representations for intrusion detection in IoT networks. Comput. Secur. 146: 104034 (2024) - [j16]Euclides Carlos Pinto Neto, Hamideh Taslimasa, Sajjad Dadkhah, Shahrear Iqbal, Pulei Xiong, Taufiq Rahman, Ali A. Ghorbani:
CICIoV2024: Advancing realistic IDS approaches against DoS and spoofing attack in IoV CAN bus. Internet Things 26: 101209 (2024) - [j15]Sajjad Dadkhah, Euclides Carlos Pinto Neto, Raphael Ferreira, Reginald C. Molokwu, Somayeh Sadeghi, Ali A. Ghorbani:
CICIoMT2024: A benchmark dataset for multi-protocol security assessment in IoMT. Internet Things 28: 101351 (2024) - [j14]Priscilla Kyei Danso, Sajjad Dadkhah, Euclides Carlos Pinto Neto, Alireza Zohourian, Heather Molyneaux, Rongxing Lu, Ali A. Ghorbani:
Transferability of Machine Learning Algorithm for IoT Device Profiling and Identification. IEEE Internet Things J. 11(2): 2322-2335 (2024) - [j13]Xichen Zhang, Sajjad Dadkhah, Alexander Gerald Weismann, Mohammad Amin Kanaani, Ali A. Ghorbani:
Multimodal Fake News Analysis Based on Image-Text Similarity. IEEE Trans. Comput. Soc. Syst. 11(1): 959-972 (2024) - [j12]Sajjad Dadkhah, Xichen Zhang, Alexander Gerald Weismann, Amir Firouzi, Ali A. Ghorbani:
The Largest Social Media Ground-Truth Dataset for Real/Fake Content: TruthSeeker. IEEE Trans. Comput. Soc. Syst. 11(3): 3376-3390 (2024) - [j11]Asma Sormeily, Sajjad Dadkhah, Xichen Zhang, Ali A. Ghorbani:
MEFaND: A Multimodel Framework for Early Fake News Detection. IEEE Trans. Comput. Soc. Syst. 11(4): 5337-5353 (2024) - [c19]Emmanuel Dana Buedi, Ali A. Ghorbani, Sajjad Dadkhah, Raphael Ferreira:
Enhancing EV Charging Station Security Using a Multi-dimensional Dataset: CICEVSE2024. DBSec 2024: 171-190 - [i2]Erfan Ghiasvand, Suprio Ray, Shahrear Iqbal, Sajjad Dadkhah, Ali A. Ghorbani:
CICAPT-IIOT: A provenance-based APT attack dataset for IIoT environment. CoRR abs/2407.11278 (2024) - 2023
- [j10]Barjinder Kaur, Sajjad Dadkhah, Farzaneh Shoeleh, Euclides Carlos Pinto Neto, Pulei Xiong, Shahrear Iqbal, Philippe Lamontagne, Suprio Ray, Ali A. Ghorbani:
Internet of Things (IoT) security dataset evolution: Challenges and future directions. Internet Things 22: 100780 (2023) - [j9]Alireza Zohourian, Sajjad Dadkhah, Euclides Carlos Pinto Neto, Hassan Mahdikhani, Priscilla Kyei Danso, Heather Molyneaux, Ali A. Ghorbani:
IoT Zigbee device security: A comprehensive review. Internet Things 22: 100791 (2023) - [j8]Hamideh Taslimasa, Sajjad Dadkhah, Euclides Carlos Pinto Neto, Pulei Xiong, Suprio Ray, Ali A. Ghorbani:
Security issues in Internet of Vehicles (IoV): A comprehensive survey. Internet Things 22: 100809 (2023) - [j7]Euclides Carlos Pinto Neto, Sajjad Dadkhah, Raphael Ferreira, Alireza Zohourian, Rongxing Lu, Ali A. Ghorbani:
CICIoT2023: A Real-Time Dataset and Benchmark for Large-Scale Attacks in IoT Environment. Sensors 23(13): 5941 (2023) - [c18]Hamideh Taslimasa, Sajjad Dadkhah, Euclides Carlos Pinto Neto, Pulei Xiong, Shahrear Iqbal, Suprio Ray, Ali A. Ghorbani:
ImageFed: Practical Privacy Preserving Intrusion Detection System for In-Vehicle CAN Bus Protocol. BigDataSecurity/HPSC/IDS 2023: 122-129 - [c17]Priscilla Kyei Danso, Heather Molyneaux, Alireza Zohourian, Euclides Carlos Pinto Neto, Derrick Whalen, Sajjad Dadkhah, Ali A. Ghorbani:
Human-Centric Machine Learning: The Role of Users in the Development of IoT Device Identification and Vulnerability Assessment. HCI (35) 2023: 622-642 - [c16]Rashid Hussain Khokhar, Sajjad Dadkhah, Tianhao Zhao, Xichen Zhang, Ali A. Ghorbani:
UCreDiSSiT: User Credibility Measurement incorporating Domain interest, Semantics in Social interactions, and Temporal factor. PST 2023: 1-11 - 2022
- [j6]Xichen Zhang, Mohammad Mehdi Yadollahi, Sajjad Dadkhah, Haruna Isah, Duc-Phong Le, Ali A. Ghorbani:
Data breach: analysis, countermeasures and challenges. Int. J. Inf. Comput. Secur. 19(3/4): 402-442 (2022) - [j5]Xichen Zhang, Sajjad Dadkhah, Samaneh Mahdavifar, Rongxing Lu, Ali A. Ghorbani:
An entity matching-based image topic verification framework for online fact-checking. Int. J. Multim. Intell. Secur. 4(1): 65-85 (2022) - [j4]Miraqa Safi, Sajjad Dadkhah, Farzaneh Shoeleh, Hassan Mahdikhani, Heather Molyneaux, Ali A. Ghorbani:
A Survey on IoT Profiling, Fingerprinting, and Identification. ACM Trans. Internet Things 3(4): 26:1-26:39 (2022) - [c15]Mahdi Abrishami, Sajjad Dadkhah, Euclides Carlos Pinto Neto, Pulei Xiong, Shahrear Iqbal, Suprio Ray, Ali A. Ghorbani:
Classification and Analysis of Adversarial Machine Learning Attacks in IoT: a Label Flipping Attack Case Study. FRUCT 2022: 3-14 - [c14]Toluwalope David Akande, Barjinder Kaur, Sajjad Dadkhah, Ali A. Ghorbani:
Threshold based Technique to Detect Anomalies using Log Files. ICMLT 2022: 191-198 - [c13]Sajjad Dadkhah, Hassan Mahdikhani, Priscilla Kyei Danso, Alireza Zohourian, Kevin Anh Truong, Ali A. Ghorbani:
Towards the Development of a Realistic Multidimensional IoT Profiling Dataset. PST 2022: 1-11 - [c12]Euclides Carlos Pinto Neto, Sajjad Dadkhah, Ali A. Ghorbani:
Collaborative DDoS Detection in Distributed Multi-Tenant IoT using Federated Learning. PST 2022: 1-10 - 2021
- [j3]Sajjad Dadkhah, Farzaneh Shoeleh, Mohammad Mehdi Yadollahi, Xichen Zhang, Ali A. Ghorbani:
A real-time hostile activities analyses and detection system. Appl. Soft Comput. 104: 107175 (2021) - [c11]Barjinder Kaur, Sajjad Dadkhah, Pulei Xiong, Shahrear Iqbal, Suprio Ray, Ali A. Ghorbani:
Verification Based Scheme to Restrict IoT Attacks. BDCAT 2021: 63-68 - [c10]Mohammad Mehdi Yadollahi, Farzaneh Shoeleh, Sajjad Dadkhah, Ali A. Ghorbani:
Robust Black-box Watermarking for Deep Neural Network using Inverse Document Frequency. DASC/PiCom/CBDCom/CyberSciTech 2021: 574-581 - [c9]Masoud Erfani, Farzaneh Shoeleh, Sajjad Dadkhah, Barjinder Kaur, Pulei Xiong, Shahrear Iqbal, Suprio Ray, Ali A. Ghorbani:
A feature exploration approach for IoT attack type classification. DASC/PiCom/CBDCom/CyberSciTech 2021: 582-588 - [c8]Miraqa Safi, Barjinder Kaur, Sajjad Dadkhah, Farzaneh Shoeleh, Arash Habibi Lashkari, Heather Molyneaux, Ali A. Ghorbani:
Behavioural Monitoring and Security Profiling in the Internet of Things (IoT). HPCC/DSS/SmartCity/DependSys 2021: 1203-1210 - [i1]Mohammad Mehdi Yadollahi, Farzaneh Shoeleh, Sajjad Dadkhah, Ali A. Ghorbani:
Robust Black-box Watermarking for Deep NeuralNetwork using Inverse Document Frequency. CoRR abs/2103.05590 (2021)
2010 – 2019
- 2019
- [c7]Willa Ariela Syafruddin, Sajjad Dadkhah, Mario Köppen:
Blockchain Scheme Based on Evolutionary Proof of Work. CEC 2019: 771-776 - 2018
- [j2]Somayeh Sadeghi, Sajjad Dadkhah, Hamid Abdullah Jalab, Giuseppe Mazzola, Diaa M. Uliyan:
State of the art in passive digital image forgery detection: copy-move image forgery. Pattern Anal. Appl. 21(2): 291-306 (2018) - [c6]Andi Arniaty Arsyad, Sajjad Dadkhah, Mario Köppen:
Two-Factor Blockchain for Traceability Cacao Supply Chain. INCoS 2018: 332-339 - [c5]Andi Arniaty Arsyad, Sajjad Dadkhah, Mario Köppen:
Correction to: Two-Factor Blockchain for Traceability Cacao Supply Chain. INCoS 2018 - [c4]Sajjad Dadkhah, Mario Koeppen, Somayeh Sadeghi, Kaori Yoshida:
Bad Ai: Investigating the Effect of Half-Toning Techniques on Unwanted Face Detection Systems. NTMS 2018: 1-5 - 2017
- [c3]Sajjad Dadkhah, Mario Köppen, Hamid Abdullah Jalab, Somayeh Sadeghi, Azizah Abdul Manaf, Diaa M. Uliyan:
Electromagnetismlike Mechanism Descriptor with Fourier Transform for a Passive Copy-move Forgery Detection in Digital Image Forensics. ICPRAM 2017: 612-619 - [c2]Sajjad Dadkhah, Mario Köppen, Somayeh Sadeghi, Kaori Yoshida, Hamid Abdullah Jalab, Azizah Abdul Manaf:
An efficient ward-based copy-move forgery detection method for digital image forensic. IVCNZ 2017: 1-6 - 2014
- [j1]Sajjad Dadkhah, Azizah Abd Manaf, Yoshiaki Hori, Aboul Ella Hassanien, Somayeh Sadeghi:
An effective SVD-based image tampering detection and self-recovery using active watermarking. Signal Process. Image Commun. 29(10): 1197-1210 (2014) - [c1]Sajjad Dadkhah, Azizah Abd Manaf, Somayeh Sadeghi:
An Efficient Image Self-recovery and Tamper Detection Using Fragile Watermarking. ICIAR (1) 2014: 504-513 - [p1]Sajjad Dadkhah, Azizah Abd Manaf, Somayeh Sadeghi:
Efficient Image Authentication and Tamper Localization Algorithm Using Active Watermarking. Bio-inspiring Cyber Security and Cloud Services 2014: 115-148
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-23 20:35 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint