Milad Taleby Ahvanooey, Ph.D.
Milad Taleby Ahvanooey, Ph.D.
SMIEEE & RF Scientist @ Nanyang Technological University (NTU), Singapore
Verified email at - Homepage
Cited by
Cited by
EACMS: Emergency Access Control Management System for Personal Health Record based on Blockchain
AR Rajput, Q Li, M Taleby Ahvanooey, I Masood
IEEE ACCESS 7 (99), 1-14, 2019
A Survey on Smartphones Security: Software Vulnerabilities, Malware, and Attacks
MT Ahvanooey, Q Li, M Rabbani, AR Rajput
International Journal of Advanced Computer Science and Applications (IJACSA …, 2017
Modern Text Hiding, Text Steganalysis, and Applications: A Comparative Analysis
M Taleby Ahvanooey, Q Li, J Hou, AR Rajput, C Yini
Entropy 21 (4), 1, 2019
A Survey of Genetic Programming and Its Applications
M Taleby Ahvanooey, Q Li, M Wu, S Wang
KSII Transactions on Internet and Information Systems 13 (4), 1765-1794, 2019
A Comparative Analysis of Information Hiding Techniques for Copyright Protection of Text Documents
M Taleby Ahvanooey, Q Li, HJ Shim, Y Huang
Security and Communication Networks 2018 (April), 1-22, 2018
AITSteg: An Innovative Text Steganography Technique for Hidden Transmission of Text Message via Social Media
M Taleby Ahvanooey, Q Li, J Hou, H Dana Mazraeh, J Zhang
IEEE Access 2018 (6), 65981-65995, 2018
ANiTW: A Novel Intelligent Text Watermarking Technique for Forensic Identification of Spurious Information on Social Media
M Taleby Ahvanooey, Q Li, X Zhu, M Alazab, J Zhang
Computers & Security 90 (3), 101702, 2020
Safety risk monitoring of cyber-physical power systems based on ensemble learning algorithm
Q Li, S Meng, S Zhang, M Wu, J Zhang, MT Ahvanooey, MS Aslam
IEEE Access 7, 24788-24805, 2019
A blockchain-based secret-data sharing framework for personal health records in emergency condition
AR Rajput, Q Li, MT Ahvanooey
Healthcare 9 (2), 206, 2021
An Innovative Technique for Web Text Watermarking (AITW)
M Taleby Ahvanooey, H Dana Mazraeh, S Tabasi
Information Security Journal: A Global Perspective 25 (3), 8, 2016
Opinion mining towards blockchain technology adoption for accessing digital library resources
AU Khan, Z Zhang, M Taleby Ahvanooey, W Rafique
Aslib Journal of Information Management 74 (1), 135-157, 2022
Misinformation detection on social media: Challenges and the road ahead
MT Ahvanooey, MX Zhu, W Mazurczyk, KKR Choo, M Conti, J Zhang
IT Professional 24 (1), 34-40, 2022
An Effective Automatic Image Annotation Model via Attention Model and Data Equilibrium
A Vatani, M Taleby Ahvanooey, M Rahimi
International Journal of Advanced Computer Science and Applications(IJACSA …, 2018
A Novel Approach for Text Watermarking in Digital Documents By Zero-Width Interword Distance Changes
M Taleby Ahvanooey, SH Tabasi, S Rahmany
DAV International Journal of Science 4 (3), 550-557, 2015
Do Dark Web and Cryptocurrencies Empower Cybercriminals?
M Taleby Ahvanooey, MX Zhu, W Mazurczyk, M Kilger, KKR Choo
12th EAI International Conference on Digital Forensics & Cyber Crime (EAI …, 2022
Modern Authentication Schemes in Smartphones and IoT Devices: An Empirical Survey
MT Ahvanooey, MX Zhu, Q Li, W Mazurczyk, KKR Choo, BB Gupta, ...
IEEE Internet of Things Journal 9 (10), 7639-7663, 2022
A New Method for Copyright Protection in Digital Text Documents by Adding Hidden Unicode Characters in Persian/English Texts
M TalebyAhovanooey, SH Tabasi
International Journal of Current Life Sciences 4 (8), 4895-4900, 2014
Information hiding in digital textual contents: Techniques and current challenges
MT Ahvanooey, MX Zhu, W Mazurczyk, M Bendechache
Computer 55 (6), 56-65, 2022
CovertSYS: A systematic covert communication approach for providing secure end-to-end conversation via social networks
MT Ahvanooey, MX Zhu, W Mazurczyk, Q Li, M Kilger, KKR Choo, M Conti
Journal of Information Security and Applications 71, 103368, 2022
A Blockchain-Based Secret-Data Sharing Framework for Personal Health Records in Emergency Condition. Healthcare 2021, 9, 206
AR Rajput, Q Li, MT Ahvanooey
s Note: MDPI stays neu-tral with regard to jurisdictional claims in …, 2021
The system can't perform the operation now. Try again later.
Articles 1–20