default search action
Mohammad Heydari
This is just a disambiguation page, and is not intended to be the bibliography of an actual person. Any publication listed on this page has not been assigned to an actual author yet. If you know the true author of one of the publications listed below, you are welcome to contact us.
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j13]Farideh Zare, Mohammad Heydari, Ghasem Barid Loghmani:
Convergence analysis of an iterative scheme to solve a family of functional Volterra integral equations. Appl. Math. Comput. 477: 128799 (2024) - [j12]Mohammad Heydari, Ashkan Khalifeh, Laxmi Rathour:
A simple and efficient preprocessing step for convex hull problem. Discret. Math. Algorithms Appl. 16(7): 2350091:1-2350091:9 (2024) - [i10]Reza Sarshar, Mohammad Heydari, Elham Akhondzadeh Noughabi:
Convolutional Neural Networks Towards Facial Skin Lesions Detection. CoRR abs/2402.08592 (2024) - [i9]Mohammad Heydari, Babak Teimourpour:
Analysis of Persian News Agencies on Instagram, A Words Co-occurrence Graph-based Approach. CoRR abs/2402.12272 (2024) - [i8]Mohammad Heydari, Zahra Rezvani:
Challenges and Experiences of Iranian Developers with MLOps at Enterprise. CoRR abs/2402.12281 (2024) - [i7]Mohsen Khazeni, Mohammad Heydari, Amir Albadvi:
Persian Slang Text Conversion to Formal and Deep Learning of Persian Short Texts on Social Media for Sentiment Classification. CoRR abs/2403.06023 (2024) - [i6]Mohammad Heydari, Mohsen Khazeni, Mohammad Ali Soltanshahi:
Deep Learning-based Sentiment Analysis in Persian Language. CoRR abs/2403.11069 (2024) - [i5]Mohammad Heydari, Reza Sarshar, Mohammad Ali Soltanshahi:
Distributed Record Linkage in Healthcare Data with Apache Spark. CoRR abs/2404.07939 (2024) - 2023
- [j11]Esmaeil Mehraeen, Seyed Ahmad Seyedalinaghi, Mohammad Heydari, Amirali Karimi, Abdollah Mahdavi, Mehrnaz Mashoufi, Arezoo Sarmad, Peyman Mirghaderi, Ahmadreza Shamsabadi, Kowsar Qaderi, Pegah Mirzapour, Amirata Fakhfouri, Hadiseh Azadi Cheshmekabodi, Kimia Azad, Seyedali Bagheri Zargande, Shahram Oliaei, Parisa Yousefi Konjdar, Farzin Vahedi, Tayebeh Noori:
Telemedicine technologies and applications in the era of COVID-19 pandemic: A systematic review. Health Informatics J. 29(2): 146045822311674 (2023) - [j10]Mohammad Heydari, Esmaeil Mehraeen, Elham Javaherikiyan, Nahid Mehrabi, Mostafa Langarizadeh, Vahideh Aghamohammadi, Hamed Rezakhani Moghaddam, Khadijeh Nasiri:
Design, development and evaluation of a mobile-based self-care application for patients with COVID-19 not requiring hospitalization; a study of Northwest of Iran. BMC Medical Informatics Decis. Mak. 23(1): 280 (2023) - [i4]Mohammad Heydari, Ashkan Khalifeh:
A simple and efficient preprocessing step for convex hull problem. CoRR abs/2304.04196 (2023) - [i3]Ali Bayat, Mohammad Heydari, Amir Albadvi:
Analysis of Insect-Plant Interactions Affected by Mining Operations, A Graph Mining Approach. CoRR abs/2308.04464 (2023) - [i2]Mohammad Heydari, Babak Teimourpour:
Graph Representation Learning Towards Patents Network Analysis. CoRR abs/2309.13888 (2023) - 2022
- [c7]Mohammad Heydari, Haralambos Mouratidis, Vahid Heydari Fami Tafreshi:
OntoCyrene: Towards Ontology-Enhanced Asset Modelling for Supply Chains in the Context of Cyber Security. CyberICPS/SECPRE/SPOSE/CPS4CIP/CDT&SECOMAN/EIS/SecAssure@ESORICS 2022: 157-176 - [c6]Ndoricimpa Siméon, Xiaoyang Li, Mohammad Heydari:
Effects of Rural Habitat Distribution and Farm Size on Food Production Index Growth in Sub-Saharan African Region: A Case of East Africa Countries. HAICTA 2022: 404-414 - [c5]Mohammad Heydari, Hamed Benisi Ghadim, Mohammad Salarian:
Prediction of Maximum Temperatures by Time Series and Artificial Neural Networks (Case Study: Isfahan Station). IICAIET 2022: 1-6 - 2021
- [j9]Tayebeh Dehghan Niri, Mohammad Heydari, Mohammad-Mehdi Hosseini:
An improvement of adaptive cubic regularization method for unconstrained optimization problems. Int. J. Comput. Math. 98(2): 271-287 (2021) - 2020
- [b1]Mohammad Heydari:
Indeterminacy-aware prediction model for authentication in IoT. Bournemouth University, Poole, UK, 2020 - [j8]Mohammad Heydari, Alexios Mylonas, Vahid Heydari Fami Tafreshi, Elhadj Benkhelifa, Surjit Singh:
Known unknowns: Indeterminacy in authentication in IoT. Future Gener. Comput. Syst. 111: 278-287 (2020) - [j7]Tayebeh Dehghan Niri, Mohammad Heydari, M. M. Hosseini:
Correction of trust region method with a new modified Newton method. Int. J. Comput. Math. 97(5): 1118-1132 (2020) - [j6]Tayebeh Dehghan Niri, Seyed Abolfazl Shahzadeh Fazeli, Mohammad Heydari:
A two-step improved Newton method to solve convex unconstrained optimization problems. J. Appl. Math. Comput. 62(1-2): 37-53 (2020) - [j5]Tayebeh Dehghan Niri, Mohammad Heydari, Mohammad Mahdi Hosseini:
Two nonmonotone trust region algorithms based on an improved Newton method. J. Appl. Math. Comput. 64(1-2): 179-194 (2020) - [i1]Mohammad Heydari, Babak Teimourpour:
Analysis of ResearchGate, A Community Detection Approach. CoRR abs/2003.05591 (2020)
2010 – 2019
- 2019
- [c4]Mohammad Heydari, Alexios Mylonas, Vasilis Katos, Emili Balaguer-Ballester, Amna Altaf, Vahid Heydari Fami Tafreshi:
Uncertainty-Aware Authentication Model for IoT. CyberICPS/SECPRE/SPOSE/ADIoT@ESORICS 2019: 224-237 - [c3]Mohammad Heydari, Alexios Mylonas, Vasilios Katos, Emili Balaguer-Ballester, Vahid Heydari Fami Tafreshi, Elhadj Benkhelifa:
Uncertainty-Aware Authentication Model for Fog Computing in IoT. FMEC 2019: 52-59 - [c2]Mohammad Heydari, Alexios Mylonas, Vasilios Katos, Emili Balaguer-Ballester, Vahid Heydari Fami Tafreshi, Elhadj Benkhelifa:
A Location-Aware Authentication Model to Handle Uncertainty in IoT. IoTSMS 2019: 43-50 - [p1]Mohammad Heydari, Alexios Mylonas, Vasileios Katos, Dimitris Gritzalis:
Towards Indeterminacy-Tolerant Access Control in IoT. Handbook of Big Data and IoT Security 2019: 53-71 - 2017
- [j4]Mohammad Sabzinejad Farash, Shehzad Ashraf Chaudhry, Mohammad Heydari, Seyed Mohammad Sajad Sadough, Saru Kumari, Muhammad Khurram Khan:
A lightweight anonymous authentication scheme for consumer roaming in ubiquitous networks with provable security. Int. J. Commun. Syst. 30(4) (2017) - [j3]Mohammad Heydari, Seyed Mohammad Sajad Sadough, Shehzad Ashraf Chaudhry, Mohammad Sabzinejad Farash, Khalid Mahmood:
An improved one-to-many authentication scheme based on bilinear pairings with provable security for mobile pay-TV systems. Multim. Tools Appl. 76(12): 14225-14245 (2017) - [c1]Antonia Nisioti, Mohammad Heydari, Alexios Mylonas, Vasilios Katos, Vahid Heydari Fami Tafreshi:
TRAWL: Protection against rogue sites for the masses. RCIS 2017: 120-127 - 2016
- [j2]Mohammad Heydari, Seyed Mohammad Sajad Sadough, Mohammad Sabzinejad Farash, Shehzad Ashraf Chaudhry, Khalid Mahmood:
An Efficient Password-Based Authenticated Key Exchange Protocol with Provable Security for Mobile Client-Client Networks. Wirel. Pers. Commun. 88(2): 337-356 (2016) - 2015
- [j1]Mohammad Heydari, Seyed Mohammad Sajad Sadough, Shehzad Ashraf Chaudhry, Mohammad Sabzinejad Farash, Mohammad Reza Aref:
An Improved Authentication Scheme for Electronic Payment Systems in Global Mobility Networks. Inf. Technol. Control. 44(4): 387-403 (2015)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-16 20:34 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint