CICIoT2023: A real-time dataset and benchmark for large-scale attacks in IoT environment ECP Neto, S Dadkhah, R Ferreira, A Zohourian, R Lu, AA Ghorbani Preprints, 2023 | 185 | 2023 |
An effective SVD-based image tampering detection and self-recovery using active watermarking S Dadkhah, A Abd Manaf, Y Hori, AE Hassanien, S Sadeghi Signal Processing: Image Communication 29 (10), 1197-1210, 2014 | 154 | 2014 |
Towards the development of a realistic multidimensional IoT profiling dataset S Dadkhah, H Mahdikhani, PK Danso, A Zohourian, KA Truong, ... 2022 19th Annual International Conference on Privacy, Security & Trust (PST …, 2022 | 105 | 2022 |
Internet of things (IoT) security dataset evolution: Challenges and future directions B Kaur, S Dadkhah, F Shoeleh, ECP Neto, P Xiong, S Iqbal, ... Internet of Things 22, 100780, 2023 | 76 | 2023 |
State of the art in passive digital image forgery detection: copy-move image forgery S Sadeghi, S Dadkhah, HA Jalab, G Mazzola, D Uliyan Pattern Analysis and Applications 21, 291-306, 2018 | 73 | 2018 |
Security issues in Internet of Vehicles (IoV): A comprehensive survey H Taslimasa, S Dadkhah, ECP Neto, P Xiong, S Ray, AA Ghorbani Internet of Things 22, 100809, 2023 | 40 | 2023 |
A survey on IoT profiling, fingerprinting, and identification M Safi, S Dadkhah, F Shoeleh, H Mahdikhani, H Molyneaux, AA Ghorbani ACM Transactions on Internet of Things 3 (4), 1-39, 2022 | 35 | 2022 |
IoT Zigbee device security: A comprehensive review A Zohourian, S Dadkhah, ECP Neto, H Mahdikhani, PK Danso, ... Internet of Things 22, 100791, 2023 | 28 | 2023 |
Efficient copy-move forgery detection for digital images S Sadeghi, HA Jalab, S Dadkhah International Journal of Computer and Information Engineering 6 (11), 1339-1342, 2012 | 28 | 2012 |
Keypoint based authentication and localization of copy-move forgery in digital image S Sadeghi, HA Jalab, KS Wong, D Uliyan, S Dadkhah Malaysian Journal of Computer Science 30 (2), 117-133, 2017 | 24 | 2017 |
A real-time hostile activities analyses and detection system S Dadkhah, F Shoeleh, MM Yadollahi, X Zhang, AA Ghorbani Applied Soft Computing, 107175, 2021 | 21 | 2021 |
Blockchain scheme based on evolutionary proof of work WA Syafruddin, S Dadkhah, M Köppen 2019 IEEE Congress on Evolutionary Computation (CEC), 771-776, 2019 | 20 | 2019 |
Efficient digital image authentication and tamper localization technique using 3lsb watermarking S Dadkhah, A Abd Manaf, S Sadeghi International Journal of Computer Science Issues (IJCSI) 9 (1), 1, 2012 | 18 | 2012 |
Collaborative DDoS detection in distributed multi-tenant IoT using federated learning ECP Neto, S Dadkhah, AA Ghorbani 2022 19th Annual International Conference on Privacy, Security & Trust (PST …, 2022 | 16 | 2022 |
Data breach: analysis, countermeasures and challenges X Zhang, MM Yadollahi, S Dadkhah, H Isah, DP Le, AA Ghorbani International Journal of Information and Computer Security 19 (3-4), 402-442, 2022 | 16 | 2022 |
Two-factor blockchain for traceability cacao supply chain AA Arsyad, S Dadkhah, M Köppen Advances in Intelligent Networking and Collaborative Systems: The 10th …, 2019 | 16 | 2019 |
Federated reinforcement learning in IoT: applications, opportunities and open challenges EC Pinto Neto, S Sadeghi, X Zhang, S Dadkhah Applied Sciences 13 (11), 6497, 2023 | 14 | 2023 |
Robust Black-box Watermarking for Deep Neural Network using Inverse Document Frequency MM Yadollahi, F Shoeleh, S Dadkhah, AA Ghorbani 2021 IEEE Intl Conf on Dependable, Autonomic and Secure Computing, Intl Conf …, 2021 | 14 | 2021 |
A review of Machine Learning (ML)-based IoT security in healthcare: A dataset perspective ECP Neto, S Dadkhah, S Sadeghi, H Molyneaux, AA Ghorbani Computer Communications, 2023 | 13 | 2023 |
Ensemble-based intrusion detection for internet of things devices PK Danso, ECP Neto, S Dadkhah, A Zohourian, H Molyneaux, ... 2022 IEEE 19th International Conference on Smart Communities: Improving …, 2022 | 13 | 2022 |