default search action
Mohammad Sayad Haghighi
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2025
- [j45]Besat Jafarian, Nasser Yazdani, Mohammad Sayad Haghighi:
Using attentive temporal GNN for dynamic trust assessment in the presence of malicious entities. Expert Syst. Appl. 260: 125391 (2025) - 2024
- [j44]Mahdi Mahdavi, Mohammad Hesam Tadayon, Mohammad Sayad Haghighi, Zahra Ahmadian:
IoT-friendly, pre-computed and outsourced attribute based encryption. Future Gener. Comput. Syst. 150: 115-126 (2024) - [j43]Mahdi Mahdavi, Mohammad Hesam Tadayon, Mohammad Sayad Haghighi, Zahra Ahmadian:
Corrigendum to "IoT-friendly, pre-computed and outsourced attribute based encryption" [Future Generation Computer Systems (FGCS) volume 150 (2024) 115-126/ FGCS-D-23-00424]. Future Gener. Comput. Syst. 154: 396 (2024) - [j42]Soheila Barchinezhad, Mohammad Sayad Haghighi, Vicenç Puig:
Identification and analysis of stochastic deception attacks on cyber-physical systems. J. Frankl. Inst. 361(8): 106774 (2024) - [j41]Zhiyuan Deng, Yue Hou, Alireza Jolfaei, Wei Zhou, Faezeh Farivar, Mohammad Sayad Haghighi:
Multihead Attention-Based Multiscale Graph Convolution Network for ITS Traffic Forecasting. IEEE Syst. J. 18(2): 836-847 (2024) - [j40]Xiangyu Hu, Hanpeng Cai, Mamoun Alazab, Wei Zhou, Mohammad Sayad Haghighi, Sheng Wen:
Federated Learning in Industrial IoT: A Privacy-Preserving Solution That Enables Sharing of Data in Hydrocarbon Explorations. IEEE Trans. Ind. Informatics 20(3): 4337-4346 (2024) - [j39]Ghader Ebrahimpour, Mohammad Sayad Haghighi:
Is Bitcoin Future as Secure as We Think? Analysis of Bitcoin Vulnerability to Bribery Attacks Launched through Large Transactions. ACM Trans. Priv. Secur. 27(2): 14 (2024) - 2023
- [j38]Mohammad Saleh Mahdizadeh, Behnam Bahrak, Mohammad Sayad Haghighi:
Decentralizing the lightning network: a score-based recommendation strategy for the autopilot system. Appl. Netw. Sci. 8(1): 73 (2023) - [j37]Faezeh Farivar, Alireza Jolfaei, Mohammad Manthouri, Mohammad Sayad Haghighi:
Application of fuzzy learning in IoT-enabled remote healthcare monitoring and control of anesthetic depth during surgery. Inf. Sci. 626: 262-274 (2023) - [j36]Hosseinali Ghiassirad, Faezeh Farivar, Mahdi Aliyari Shoorehdeli, Mohammad Sayad Haghighi:
Building robust neural networks under adversarial machine learning attacks by using biologically-inspired neurons. Inf. Sci. 645: 119190 (2023) - [j35]Mohammad Sayad Haghighi, Faezeh Farivar, Alireza Jolfaei, Azin Bayrami Asl, Wei Zhou:
Cyber Attacks via Consumer Electronics: Studying the Threat of Covert Malware in Smart and Autonomous Vehicles. IEEE Trans. Consumer Electron. 69(4): 825-832 (2023) - [j34]Ida Mirzadeh, Mohammad Sayad Haghighi, Alireza Jolfaei:
Filtering Malicious Messages by Trust-Aware Cognitive Routing in Vehicular Ad Hoc Networks. IEEE Trans. Intell. Transp. Syst. 24(1): 1134-1143 (2023) - [c12]Yuxing Zhang, Xiaogang Zhu, Daojing He, Minhui Xue, Shouling Ji, Mohammad Sayad Haghighi, Sheng Wen, Zhiniang Peng:
Detecting Union Type Confusion in Component Object Model. USENIX Security Symposium 2023: 4265-4281 - [i8]Mohammad Sayad Haghighi:
A Note on the Security of ITS: Car Crash Analysis in Cruise Control Scenarios. CoRR abs/2307.08899 (2023) - 2022
- [j33]Hadeel Alghafari, Mohammad Sayad Haghighi:
Decentralized joint resource allocation and path selection in multi-hop integrated access backhaul 5G networks. Comput. Networks 207: 108837 (2022) - [j32]Limiao Li, Junyao Long, Wei Zhou, Alireza Jolfaei, Mohammad Sayad Haghighi:
Joint Optimization of Energy Consumption and Data Transmission in Smart Body Area Networks. Sensors 22(22): 9023 (2022) - [j31]Hadeel Alghafari, Mohammad Sayad Haghighi, Alireza Jolfaei:
High Bandwidth Green Communication With Vehicles by Decentralized Resource Optimization in Integrated Access Backhaul 5G Networks. IEEE Trans. Green Commun. Netw. 6(3): 1438-1447 (2022) - [j30]Tian Wang, Haoxiong Ke, Alireza Jolfaei, Sheng Wen, Mohammad Sayad Haghighi, Shuqiang Huang:
Missing Value Filling Based on the Collaboration of Cloud and Edge in Artificial Intelligence of Things. IEEE Trans. Ind. Informatics 18(8): 5394-5402 (2022) - [j29]Ghader Ebrahimpour, Mohammad Sayad Haghighi, Mamoun Alazab:
Can Blockchain be Trusted in Industry 4.0? Study of a Novel Misleading Attack on Bitcoin. IEEE Trans. Ind. Informatics 18(11): 8307-8315 (2022) - [j28]Maryam Ebrahimi, Mohammad Sayad Haghighi, Alireza Jolfaei, Nasrin Shamaeian, Mohammad Hesam Tadayon:
A Secure and Decentralized Trust Management Scheme for Smart Health Systems. IEEE J. Biomed. Health Informatics 26(5): 1961-1968 (2022) - [j27]Maryam Ebrahimi, Mohammad Hesam Tadayon, Mohammad Sayad Haghighi, Alireza Jolfaei:
A Quantitative Comparative Study of Data-oriented Trust Management Schemes in Internet of Things. ACM Trans. Manag. Inf. Syst. 13(3): 24:1-24:30 (2022) - [j26]Xiaogang Zhu, Sheng Wen, Alireza Jolfaei, Mohammad Sayad Haghighi, Seyit Camtepe, Yang Xiang:
Vulnerability Detection in SIoT Applications: A Fuzzing Method on their Binaries. IEEE Trans. Netw. Sci. Eng. 9(3): 970-979 (2022) - [j25]Derui Wang, Sheng Wen, Alireza Jolfaei, Mohammad Sayad Haghighi, Surya Nepal, Yang Xiang:
On the Neural Backdoor of Federated Generative Models in Edge Computing. ACM Trans. Internet Techn. 22(2): 43:1-43:21 (2022) - 2021
- [j24]Sahar Kouroshnezhad, Ali Peiravi, Mohammad Sayad Haghighi, Alireza Jolfaei:
Energy-Efficient Drone Trajectory Planning for the Localization of 6G-Enabled IoT Devices. IEEE Internet Things J. 8(7): 5202-5210 (2021) - [j23]Mohammad Sadegh Sadeghi Garmaroodi, Faezeh Farivar, Mohammad Sayad Haghighi, Mahdi Aliyari Shoorehdeli, Alireza Jolfaei:
Detection of Anomalies in Industrial IoT Systems by Data Mining: Study of CHRIST Osmotron Water Purification System. IEEE Internet Things J. 8(13): 10280-10287 (2021) - [j22]Mohammad Sayad Haghighi, Maryam Ebrahimi, Sahil Garg, Alireza Jolfaei:
Intelligent Trust-Based Public-Key Management for IoT by Linking Edge Devices in a Fog Architecture. IEEE Internet Things J. 8(16): 12716-12723 (2021) - [j21]Seyed Mahmood Nematollahzadeh, Sadjaad Ozgoli, Mohammad Sayad Haghighi, Alireza Jolfaei:
Learning Influential Cognitive Links in Social Networks by a New Hybrid Model for Opinion Dynamics. IEEE Trans. Comput. Soc. Syst. 8(5): 1262-1271 (2021) - [j20]Mohammad Sayad Haghighi, Alireza Sheikhjafari, Alireza Jolfaei, Faezeh Farivar, Sahar Ahmadzadeh:
Automation of Recording in Smart Classrooms via Deep Learning and Bayesian Maximum a Posteriori Estimation of Instructor's Pose. IEEE Trans. Ind. Informatics 17(4): 2813-2820 (2021) - [j19]Seyed Mahmood Nematollahzadeh, Sadjaad Ozgoli, Alireza Jolfaei, Mohammad Sayad Haghighi:
Modeling of Human Cognition in Consensus Agreement on Social Media and Its Implications for Smarter Manufacturing. IEEE Trans. Ind. Informatics 17(4): 2902-2909 (2021) - [j18]Faezeh Farivar, Mohammad Sayad Haghighi, Alireza Jolfaei, Sheng Wen:
On the Security of Networked Control Systems in Smart Vehicle and Its Adaptive Cruise Control. IEEE Trans. Intell. Transp. Syst. 22(6): 3824-3831 (2021) - [j17]Abdul Rehman Javed, Muhammad Usman, Saif Ur Rehman, Mohib Ullah Khan, Mohammad Sayad Haghighi:
Anomaly Detection in Automated Vehicles Using Multistage Attention-Based Convolutional Neural Network. IEEE Trans. Intell. Transp. Syst. 22(7): 4291-4300 (2021) - [j16]Amin Mohammadali, Mohammad Sayad Haghighi:
A Privacy-Preserving Homomorphic Scheme With Multiple Dimensions and Fault Tolerance for Metering Data Aggregation in Smart Grid. IEEE Trans. Smart Grid 12(6): 5212-5220 (2021) - [c11]Van Cuong Bui, Sheng Wen, Jiangshan Yu, Xin Xia, Mohammad Sayad Haghighi, Yang Xiang:
Evaluating Upgradable Smart Contract. Blockchain 2021: 252-256 - [c10]Ahmad Jahanbin, Mohammad Sayad Haghighi:
On the Possibility of Creating Smart Contracts on Bitcoin by MPC-based Approaches. CSICC 2021: 1-7 - [i7]Ghader Ebrahimpour, Mohammad Sayad Haghighi:
Analysis of Bitcoin Vulnerability to Bribery Attacks Launched Through Large Transactions. CoRR abs/2105.07501 (2021) - 2020
- [j15]Besat Jafarian, Nasser Yazdani, Mohammad Sayad Haghighi:
Discrimination-aware trust management for social internet of things. Comput. Networks 178: 107254 (2020) - [j14]Sahar Kouroshnezhad, Ali Peiravi, Mohammad Sayad Haghighi, Alireza Jolfaei:
An energy-aware drone trajectory planning scheme for terrestrial sensors localization. Comput. Commun. 154: 542-550 (2020) - [j13]Mohammad Sayad Haghighi, Zahra Aziminejad:
Highly Anonymous Mobility-Tolerant Location-Based Onion Routing for VANETs. IEEE Internet Things J. 7(4): 2582-2590 (2020) - [j12]Mohammad Sayad Haghighi, Orwa Nader, Alireza Jolfaei:
A Computationally Intelligent Hierarchical Authentication and Key Establishment Framework for the Internet of Things. IEEE Internet Things Mag. 3(4): 36-39 (2020) - [j11]Faezeh Farivar, Mohammad Sayad Haghighi, Alireza Jolfaei, Mamoun Alazab:
Artificial Intelligence for Detection, Estimation, and Compensation of Malicious Attacks in Nonlinear Cyber-Physical Systems and Industrial IoT. IEEE Trans. Ind. Informatics 16(4): 2716-2725 (2020) - [j10]Mohammad Sayad Haghighi, Faezeh Farivar, Alireza Jolfaei, Mohammad Hesam Tadayon:
Intelligent robust control for cyber-physical systems of rotary gantry type under denial of service attack. J. Supercomput. 76(4): 3063-3085 (2020) - [i6]Soheila Barchinezhad, Mohammad Sayad Haghighi:
Compensation of Linear Attacks to Cyber Physical Systems through ARX System Identification. CoRR abs/2002.05798 (2020) - [i5]Mohammad Sayad Haghighi:
Critical Study of Markovian Approaches for Batch Arrival Modeling in IEEE 802.15.4-based Networks. CoRR abs/2003.00829 (2020) - [i4]Mohammad Sayad Haghighi, Faezeh Farivar:
A Machine Learning-based Approach to Build Zero False-Positive IPSs for Industrial IoT and CPS with a Case Study on Power Grids Security. CoRR abs/2004.06432 (2020) - [i3]Faezeh Farivar, Mohammad Sayad Haghighi, Alireza Jolfaei, Sheng Wen:
On the Security of Networked Control Systems in Smart Vehicle and its Adaptive Cruise Control. CoRR abs/2008.00414 (2020) - [i2]Mohammad Sayad Haghighi, Orwa Nader, Alireza Jolfaei:
A Computationally Intelligent Hierarchical Authentication and Key Establishment Framework for Internet of Things. CoRR abs/2008.08672 (2020) - [i1]Mohammad Sadegh Sadeghi Garmaroodi, Faezeh Farivar, Mohammad Sayad Haghighi, Mahdi Aliyari Shoorehdeli, Alireza Jolfaei:
Detection of Anomalies and Faults in Industrial IoT Systems by Data Mining: Study of CHRIST Osmotron Water Purification System. CoRR abs/2009.03645 (2020)
2010 – 2019
- 2019
- [j9]Sahar Kouroshnezhad, Ali Peiravi, Mohammad Sayad Haghighi, Qi Zhang:
A mixed-integer linear programming approach for energy-constrained mobile anchor path planning in wireless sensor networks localization. Ad Hoc Networks 87: 188-199 (2019) - [j8]Zahra Zandesh, Marjan Ghazi Saeedi, Murthy V. Devarakonda, Mohammad Sayad Haghighi:
Legal framework for health cloud: A systematic review. Int. J. Medical Informatics 132 (2019) - [j7]Amirreza SeyedHassani, Mohammad Sayad Haghighi, Ahmad Khonsari:
Bayesian inference of private social network links using prior information and propagated data. J. Parallel Distributed Comput. 125: 72-80 (2019) - [c9]Faezeh Farivar, Mohammad Sayad Haghighi, Soheila Barchinezhad, Alireza Jolfaei:
Detection and Compensation of Covert Service-Degrading Intrusions in Cyber Physical Systems through Intelligent Adaptive Control. ICIT 2019: 1143-1148 - 2018
- [j6]Amin Mohammadali, Mohammad Sayad Haghighi, Mohammad Hesam Tadayon, Alireza Mohammadi-Nodooshan:
A Novel Identity-Based Key Establishment Method for Advanced Metering Infrastructure in Smart Grid. IEEE Trans. Smart Grid 9(4): 2834-2842 (2018) - 2016
- [j5]Mohammad Sayad Haghighi, Sheng Wen, Yang Xiang, Barry G. Quinn, Wanlei Zhou:
On the Race of Worms and Patches: Modeling the Spread of Information in Wireless Sensor Networks. IEEE Trans. Inf. Forensics Secur. 11(12): 2854-2865 (2016) - [c8]Abouzar Arabsorkhi, Mohammad Sayad Haghighi, Roghayeh Ghorbanloo:
A conceptual trust model for the Internet of Things interactions. IST 2016: 89-93 - 2015
- [j4]Mohammad Hesam Tadayon, Hadi Khanmohammadi, Mohammad Sayad Haghighi:
Dynamic and verifiable multi-secret sharing scheme based on Hermite interpolation and bilinear maps. IET Inf. Secur. 9(4): 234-239 (2015) - [j3]Mohammad Sayad Haghighi, Yang Xiang, Vijay Varadharajan, Barry G. Quinn:
A Stochastic Time-Domain Model for Burst Data Aggregation in IEEE 802.15.4 Wireless Sensor Networks. IEEE Trans. Computers 64(3): 627-639 (2015) - [j2]Sheng Wen, Mohammad Sayad Haghighi, Chao Chen, Yang Xiang, Wanlei Zhou, Weijia Jia:
A Sword with Two Edges: Propagation Studies on Both Positive and Negative Information in Online Social Networks. IEEE Trans. Computers 64(3): 640-653 (2015) - 2013
- [c7]Niloofar Toorchi, Mahmoud Ahmadian-Attari, Mohammad Sayad Haghighi, Yang Xiang:
A Markov model of safety message broadcasting for vehicular networks. WCNC 2013: 1657-1662 - 2012
- [c6]Nayyer Panahi, Hojat Olah Rohi, Ali Payandeh, Mohammad Sayad Haghighi:
Adaptation of LEACH routing protocol to cognitive radio sensor networks. IST 2012: 541-547 - 2011
- [j1]Mohammad Sayad Haghighi, Kamal Mohamedpour, Vijay Varadharajan, Barry G. Quinn:
Stochastic Modeling of Hello Flooding in Slotted CSMA/CA Wireless Sensor Networks. IEEE Trans. Inf. Forensics Secur. 6(4): 1185-1199 (2011) - [c5]Mohammad Sayad Haghighi, Kamal Mohamedpour, Vijay Varadharajan:
Analysis of packet loss for batch traffic arrivals in IEEE 802.15.4-based networks. LCN 2011: 117-122 - 2010
- [c4]Mohammad Sayad Haghighi, Kamal Mohamedpour, Vijay Varadharajan, Alireza Mohammadi-Nodooshan:
Overhearing Gain Analysis in Low-Traffic CDMA Wireless Sensor Networks. SUTC/UMC 2010: 89-94
2000 – 2009
- 2008
- [c3]Maryam Najimi, Yousef Darmani, Mohammad Sayad Haghighi, Kamal Mohamedpour:
An Adaptive Network Allocation Vector for IEEE 802.11-based Multi-hop Networks. FGCN (1) 2008: 279-282 - 2005
- [c2]Mohammad Sayad Haghighi, Shahrokh Ghaemmaghami:
Towards Energy Optimization of Transparent Watermarks using Entropy Masking. EuroIMSA 2005: 259-264 - [c1]Mohammad Sayad Haghighi, Shahrokh Ghaemmaghami:
An Optimal SVD-based Watermarking Framework through Linear Programming. EuroIMSA 2005: 271-274
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-15 20:41 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint