New constructions for forward and backward private symmetric searchable encryption J Ghareh Chamani, D Papadopoulos, C Papamanthou, R Jalili Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications …, 2018 | 265 | 2018 |
RT-UNNID: A practical solution to real-time network-based intrusion detection using unsupervised neural networks M Amini, R Jalili, HR Shahriari computers & security 25 (6), 459-468, 2006 | 175 | 2006 |
Alert correlation algorithms: A survey and taxonomy SA Mirheidari, S Arshad, R Jalili Cyberspace Safety and Security: 5th International Symposium, CSS 2013 …, 2013 | 96 | 2013 |
Detection of distributed denial of service attacks using statistical pre-processor and unsupervised neural networks R Jalili, F Imani-Mehr, M Amini, HR Shahriari Information Security Practice and Experience: First International Conference …, 2005 | 88 | 2005 |
Adversarial network traffic: Towards evaluating the robustness of deep-learning-based network traffic classification AM Sadeghzadeh, S Shiravi, R Jalili IEEE Transactions on Network and Service Management 18 (2), 1962-1976, 2021 | 72 | 2021 |
Trust inference in web-based social networks using resistive networks M Taherian, M Amini, R Jalili 2008 Third International Conference on Internet and Web Applications and …, 2008 | 69 | 2008 |
On constrained implementation of lattice-based cryptographic primitives and schemes on smart cards A Boorghany, SB Sarmadi, R Jalili ACM Transactions on Embedded Computing Systems (TECS) 14 (3), 1-25, 2015 | 66 | 2015 |
FAST: fast anonymization of big data streams E Mohammadian, M Noferesti, R Jalili Proceedings of the 2014 international conference on big data science and …, 2014 | 51 | 2014 |
Trust-based user-role assignment in role-based access control H Takabi, M Amini, R Jalili 2007 IEEE/ACS International Conference on Computer Systems and Applications …, 2007 | 46 | 2007 |
Sbac: A semantic based access control model S Javanmardi, M Amini, R Jalili, Y GanjiSaffar 11th Nordic Workshop on Secure IT-systems (NordSec’06), Linkping, Sweden 22, 2006 | 46 | 2006 |
Implementation and comparison of lattice-based identification protocols on smart cards and microcontrollers A Boorghany, R Jalili Cryptology ePrint Archive, 2014 | 44 | 2014 |
An access control model for protecting semantic web resources S Javanmardi, M Amini, R Jalili Web policy workshop, 2006 | 43 | 2006 |
Secure data outsourcing based on threshold secret sharing; towards a more practical solution MA Hadavi, R Jalili Proc. VLDB PhD Workshop, 54-59, 2010 | 39 | 2010 |
Network-based intrusion detection using unsupervised adaptive resonance theory (ART) M Amini, R Jalili Proceedings of the 4th Conference on Engineering of Intelligent Systems (EIS …, 2004 | 39 | 2004 |
AS5: A secure searchable secret sharing scheme for privacy preserving database outsourcing MA Hadavi, E Damiani, R Jalili, S Cimato, Z Ganjei Data Privacy Management and Autonomous Spontaneous Security: 7th …, 2013 | 38 | 2013 |
Security and searchability in secret sharing-based data outsourcing MA Hadavi, R Jalili, E Damiani, S Cimato International Journal of Information Security 14, 513-529, 2015 | 36 | 2015 |
Conflict detection and resolution in context-aware authorization A Masoumzadeh, M Amini, R Jalili 21st International Conference on Advanced Information Networking and …, 2007 | 34 | 2007 |
Afmap: Anonymous forward-secure mutual authentication protocols for rfid systems A Sadighian, R Jalili 2009 Third International Conference on Emerging Security Information …, 2009 | 29 | 2009 |
Multi-user dynamic searchable symmetric encryption with corrupted participants JG Chamani, Y Wang, D Papadopoulos, M Zhang, R Jalili IEEE Transactions on Dependable and Secure Computing 20 (1), 114-130, 2021 | 28 | 2021 |
Database as a service: towards a unified solution for security requirements MA Hadavi, M Noferesti, R Jalili, E Damiani 2012 IEEE 36th Annual Computer Software and Applications Conference …, 2012 | 28 | 2012 |