default search action
Zahra Pooranian
Person information
- affiliation: University of Padua, Italy
- affiliation (Ph.D., 2014-2017): Sapienza University of Rome, Italy
SPARQL queries
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c11]Zhou Zhou, Zahra Pooranian, Mohammad Shojafar, Fabio Martinelli:
An Edge Server Deployment Strategy for Multi-Objective Optimization in the Internet of Vehicles. ISCC 2024: 1-6 - 2023
- [c10]Roshan Baby, Zahra Pooranian, Mohammad Shojafar, Rahim Tafazolli:
A Heterogenous IoT Attack Detection Through Deep Reinforcement Learning: A Dynamic ML Approach. ICC 2023: 479-484 - [c9]Zahra Pooranian, Mohammad Shojafar, Pedram Asef, Matthew Robinson, Harry Lees, Mark Longden:
RCA-IDS: A Novel Real-time Cloud-based Adversarial IDS for Connected Vehicles. TrustCom 2023: 495-503 - 2022
- [j19]Hamid Mehdi, Zahra Pooranian, Paola Gabriela Vinueza Naranjo:
Cloud traffic prediction based on fuzzy ARIMA model with low dependence on historical data. Trans. Emerg. Telecommun. Technol. 33(3) (2022) - [j18]Muhammed Golec, Ridvan Ozturac, Zahra Pooranian, Sukhpal Singh Gill, Rajkumar Buyya:
iFaaSBus: A Security- and Privacy-Based Lightweight Framework for Serverless Computing Using IoT and Machine Learning. IEEE Trans. Ind. Informatics 18(5): 3522-3529 (2022) - [j17]Marjan Golmaryami, Rahim Taheri, Zahra Pooranian, Mohammad Shojafar, Pei Xiao:
SETTI: A Self-supervised AdvErsarial Malware DeTection ArchiTecture in an IoT Environment. ACM Trans. Multim. Comput. Commun. Appl. 18(2s): 122:1-122:21 (2022) - [i5]Marjan Golmaryami, Rahim Taheri, Zahra Pooranian, Mohammad Shojafar, Pei Xiao:
SETTI: A Self-supervised Adversarial Malware Detection Architecture in an IoT Environment. CoRR abs/2204.07772 (2022) - 2021
- [j16]Zahra Pooranian, Mauro Conti, Hamed Haddadi, Rahim Tafazolli:
Online Advertising Security: Issues, Taxonomy, and Future Directions. IEEE Commun. Surv. Tutorials 23(4): 2494-2524 (2021) - [j15]Rahim Taheri, Reza Javidan, Zahra Pooranian:
Adversarial android malware detection for mobile multimedia applications in IoT environments. Multim. Tools Appl. 80(11): 16713-16729 (2021) - [j14]Zahra Pooranian, Mohammad Shojafar, Sahil Garg, Rahim Taheri, Rahim Tafazolli:
LEVER: Secure Deduplicated Cloud Storage With Encrypted Two-Party Interactions in Cyber-Physical Systems. IEEE Trans. Ind. Informatics 17(8): 5759-5768 (2021) - [c8]Sanaz Soltani, Mohammad Shojafar, Habib Mostafaei, Zahra Pooranian, Rahim Tafazolli:
Link Latency Attack in Software-Defined Networks. CNSM 2021: 187-193 - [c7]Parya Haji Mirzaee, Mohammad Shojafar, Zahra Pooranian, Pedram Asef, Haitham S. Cruickshank, Rahim Tafazolli:
FIDS: A Federated Intrusion Detection System for 5G Smart Metering Network. MSN 2021: 215-222 - 2020
- [j13]Rahim Taheri, Meysam Ghahramani, Reza Javidan, Mohammad Shojafar, Zahra Pooranian, Mauro Conti:
Similarity-based Android malware detection using Hamming distance of static binary features. Future Gener. Comput. Syst. 105: 230-247 (2020) - [j12]Rahim Taheri, Reza Javidan, Mohammad Shojafar, Zahra Pooranian, Ali Miri, Mauro Conti:
On defending against label flipping attacks on malware detection systems. Neural Comput. Appl. 32(18): 14781-14800 (2020) - [i4]Zahra Pooranian, Mauro Conti, Hamed Hadaddi:
Online Advertising Security: Issues, Taxonomy, and Future Directions. CoRR abs/2006.03986 (2020)
2010 – 2019
- 2019
- [j11]Mohammad Shojafar, Zahra Pooranian, Mehdi Sookhak, Rajkumar Buyya:
Recent advances in cloud data centers toward fog data centers. Concurr. Comput. Pract. Exp. 31(8) (2019) - [j10]Paola Gabriela Vinueza Naranjo, Zahra Pooranian, Mohammad Shojafar, Mauro Conti, Rajkumar Buyya:
FOCAN: A Fog-supported smart city network architecture for management of applications in the Internet of Everything environments. J. Parallel Distributed Comput. 132: 274-283 (2019) - [c6]Mohammad Shojafar, Rahim Taheri, Zahra Pooranian, Reza Javidan, Ali Miri, Yaser Jararweh:
Automatic Clustering of Attacks in Intrusion Detection Systems. AICCSA 2019: 1-8 - [i3]Rahim Taheri, Reza Javidan, Mohammad Shojafar, Zahra Pooranian, Ali Miri, Mauro Conti:
On Defending Against Label Flipping Attacks on Malware Detection Systems. CoRR abs/1908.04473 (2019) - [i2]Rahim Taheri, Meysam Ghahramani, Reza Javidan, Mohammad Shojafar, Zahra Pooranian, Mauro Conti:
Similarity-based Android Malware Detection Using Hamming Distance of Static Binary Features. CoRR abs/1908.05759 (2019) - 2018
- [c5]Zahra Pooranian, Kang-Cheng Chen, Chia-Mu Yu, Mauro Conti:
RARE: Defeating side channels based on data-deduplication in cloud storage. INFOCOM Workshops 2018: 444-449 - 2017
- [j9]Paola Gabriela Vinueza Naranjo, Mohammad Shojafar, Habib Mostafaei, Zahra Pooranian, Enzo Baccarelli:
P-SEP: a prolong stable election routing algorithm for energy-limited heterogeneous fog-supported wireless sensor networks. J. Supercomput. 73(2): 733-755 (2017) - [j8]Mohammad Shojafar, Zahra Pooranian, Paola Gabriela Vinueza Naranjo, Enzo Baccarelli:
FLAPS: bandwidth and delay-efficient distributed data searching in Fog-supported P2P content delivery networks. J. Supercomput. 73(12): 5239-5260 (2017) - [c4]Zahra Pooranian, Mohammad Shojafar, Paola Gabriela Vinueza Naranjo, Luca Chiaraviglio, Mauro Conti:
A Novel Distributed Fog-Based Networked Architecture to Preserve Energy in Fog Data Centers. MASS 2017: 604-609 - [i1]Paola Gabriela Vinueza Naranjo, Zahra Pooranian, Mohammad Shojafar, Mauro Conti, Rajkumar Buyya:
FOCAN: A Fog-supported Smart City Network Architecture for Management of Applications in the Internet of Everything Environments. CoRR abs/1710.01801 (2017) - 2016
- [c3]Zahra Pooranian, Nima Nikmehr, Sajad Najafi Ravadanegh, Hairulnizam Mahdin, Jemal H. Abawajy:
Economical and environmental operation of smart networked microgrids under uncertainties using NSGA-II. SoftCOM 2016: 1-6 - 2015
- [j7]Zahra Pooranian, Mohammad Shojafar, Jemal H. Abawajy, Ajith Abraham:
An efficient meta-heuristic algorithm for grid computing. J. Comb. Optim. 30(3): 413-434 (2015) - [j6]Mohammad Shojafar, Zahra Pooranian, Mohammad Reza Meybodi, Mukesh Singhal:
ALATO: An efficient intelligent algorithm for time optimization in an economic grid based on adaptive stochastic Petri net. J. Intell. Manuf. 26(4): 641-658 (2015) - [j5]Mohammad Shojafar, Jemal H. Abawajy, Zia Delkhah, Ali Ahmadi, Zahra Pooranian, Ajith Abraham:
An efficient and distributed file search in unstructured peer-to-peer networks. Peer-to-Peer Netw. Appl. 8(1): 120-136 (2015) - 2014
- [j4]Zahra Pooranian, Mohammad Shojafar, Bahman Javadi, Ajith Abraham:
Using imperialist competition algorithm for independent task scheduling in grid computing. J. Intell. Fuzzy Syst. 27(1): 187-199 (2014) - 2013
- [j3]Zahra Pooranian, Mohammad Shojafar, Jemal H. Abawajy, Mukesh Singhal:
GLOA: A New Job Scheduling Algorithm for Grid Computing. Int. J. Interact. Multim. Artif. Intell. 2(1): 59-64 (2013) - [j2]Zahra Pooranian, Mohammad Shojafar, Reza Tavoli, Mukesh Singhal, Ajith Abraham:
Hybrid Metaheuristic Algorithm for Job Scheduling on Computational Grids. Informatica (Slovenia) 37(2): 157-164 (2013) - [j1]Mohammad Shojafar, Zahra Pooranian, Jemal H. Abawajy, Mohammad Reza Meybodi:
An Efficient Scheduling Method for Grid Systems Based on a Hierarchical Stochastic Petri Net. J. Comput. Sci. Eng. 7(1): 44-52 (2013) - [c2]Mohammad Shojafar, Zahra Pooranian, Mahdi Shojafar, Ajith Abraham:
LLLA: New Efficient Channel Assignment Method in Wireless Mesh Networks. IBICA 2013: 143-152 - [c1]Reza Tavoli, Ehsan Kozegar, Mohammad Shojafar, Hossein Soleimani, Zahra Pooranian:
Weighted PCA for improving Document Image Retrieval System based on keyword spotting accuracy. TSP 2013: 773-777
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-07 21:33 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint