A
-
Abbasi, Fereshteh
Intrusion Detection in IoT With Logistic Regression and Artificial Neural Network: Further Investigations on N-BaIoT Dataset Devices [Volume 8, Issue 2, 2021, Pages 27-42]
-
Abdellahi Khorasgani, Alireza
A Lightweight Authentication Scheme for RFID with Permutation Operation on Passive Tags [Volume 8, Issue 2, 2021, Pages 71-86]
-
Alavi, Seyyed Enayatallah
Intrusion Detection in IoT With Logistic Regression and Artificial Neural Network: Further Investigations on N-BaIoT Dataset Devices [Volume 8, Issue 2, 2021, Pages 27-42]
-
Ali Asgari Renani, Fatemeh
Indoor Path Tracking Using Combination of Viterbi and WKNN [Volume 8, Issue 2, 2021, Pages 19-26]
B
-
Bahraman, Kaveh
Momentum Contrast Self-Supervised Based Training for Adversarial Robustness [Volume 8, Issue 1, 2021, Pages 33-43]
-
Barangi, Hamed
Model-Driven Software Engineering: A Bibliometric Analysis [Volume 8, Issue 1, 2021, Pages 93-108]
C
-
Chegeni, Mastaneh
Indoor Path Tracking Using Combination of Viterbi and WKNN [Volume 8, Issue 2, 2021, Pages 19-26]
E
-
Eftekhari, Mahdi
Momentum Contrast Self-Supervised Based Training for Adversarial Robustness [Volume 8, Issue 1, 2021, Pages 33-43]
F
-
Farahani, Gholamreza
Scalability Analysis of a LoRa Network Under Inter-SF and Co-SF Interference with Poisson Point Process Model [Volume 8, Issue 2, 2021, Pages 43-57]
-
Fatemi, Afsaneh
BAS: An Answer Selection Method Using BERT Language Model [Volume 8, Issue 2, 2021, Pages 1-18]
-
Fathi, Abdolhossein
Combination of Genetic Programming and Support Vector Machine-Based Prediction of Protein-Peptide Binding Sites With Sequence and Structure-Based Features [Volume 8, Issue 1, 2021, Pages 45-63]
G
-
Ghaffarian, Hossein
Indoor Path Tracking Using Combination of Viterbi and WKNN [Volume 8, Issue 2, 2021, Pages 19-26]
-
Ghiasian, Ali
Analyzing the Impact of Wireless Channels on the Efficiency of Edge Computing in IoT Applications [Volume 8, Issue 2, 2021, Pages 59-70]
H
-
Hadavi, Mohammad Ali
Automatic Black-Box Detection of Resistance Against CSRF Vulnerabilities in Web Applications [Volume 8, Issue 1, 2021, Pages 19-32]
J
-
Jabbari, Ghazal
Analyzing the Impact of Wireless Channels on the Efficiency of Edge Computing in IoT Applications [Volume 8, Issue 2, 2021, Pages 59-70]
K
-
Khasseh, Ali Akbar
Model-Driven Software Engineering: A Bibliometric Analysis [Volume 8, Issue 1, 2021, Pages 93-108]
-
Kolahdouz Rahimi, Shekoufeh
Model-Driven Software Engineering: A Bibliometric Analysis [Volume 8, Issue 1, 2021, Pages 93-108]
M
-
Moghissi, Gholam Reza
Rejecting Claimed Speedup of 2^𝛽/2 in Extreme Pruning and Revising BKZ 2.0 for Better Speedup [Volume 8, Issue 1, 2021, Pages 65-91]
-
Mohammadi, Solmaz
Scalability Analysis of a LoRa Network Under Inter-SF and Co-SF Interference with Poisson Point Process Model [Volume 8, Issue 2, 2021, Pages 43-57]
-
Moshavash, Monireh
Momentum Contrast Self-Supervised Based Training for Adversarial Robustness [Volume 8, Issue 1, 2021, Pages 33-43]
-
Mozafari, Jamshid
BAS: An Answer Selection Method Using BERT Language Model [Volume 8, Issue 2, 2021, Pages 1-18]
N
-
Naderan, Marjan
Intrusion Detection in IoT With Logistic Regression and Artificial Neural Network: Further Investigations on N-BaIoT Dataset Devices [Volume 8, Issue 2, 2021, Pages 27-42]
-
Nematbakhsh, Mohammad Ali
BAS: An Answer Selection Method Using BERT Language Model [Volume 8, Issue 2, 2021, Pages 1-18]
P
-
Payandeh, Ali
Rejecting Claimed Speedup of 2^𝛽/2 in Extreme Pruning and Revising BKZ 2.0 for Better Speedup [Volume 8, Issue 1, 2021, Pages 65-91]
R
-
Rezaei, Hashem
Bit-Parallel ECC Coprocessor resistant to Differential Power Analysis Attacks in GF(2m) [Volume 8, Issue 1, 2021, Pages 1-18]
S
-
Sadeghi, Samira
Automatic Black-Box Detection of Resistance Against CSRF Vulnerabilities in Web Applications [Volume 8, Issue 1, 2021, Pages 19-32]
-
Sadjadieh, Mahdi
A Lightweight Authentication Scheme for RFID with Permutation Operation on Passive Tags [Volume 8, Issue 2, 2021, Pages 71-86]
-
Shafieinejad, Alireza
Bit-Parallel ECC Coprocessor resistant to Differential Power Analysis Attacks in GF(2m) [Volume 8, Issue 1, 2021, Pages 1-18]
Y
-
Yazdani, Mohammad Rohollah
A Lightweight Authentication Scheme for RFID with Permutation Operation on Passive Tags [Volume 8, Issue 2, 2021, Pages 71-86]
Z
-
Zamani, Bahman
Model-Driven Software Engineering: A Bibliometric Analysis [Volume 8, Issue 1, 2021, Pages 93-108]
Your query does not match with any item