An intrusion detection system for wireless sensor networks I Onat, A Miri WiMob'2005), IEEE International Conference on Wireless And Mobile Computing …, 2005 | 383 | 2005 |
System and method for location-based financial transaction authentication B Malek, A Miri US Patent App. 14/443,168, 2015 | 209 | 2015 |
An end-to-end QoS mapping approach for cloud service selection R Karim, C Ding, A Miri 2013 IEEE ninth world congress on services, 341-348, 2013 | 153 | 2013 |
A survey of techniques for incremental learning of HMM parameters W Khreich, E Granger, A Miri, R Sabourin Information Sciences 197, 105-130, 2012 | 145 | 2012 |
Iterative Boolean combination of classifiers in the ROC space: An application to anomaly detection with HMMs W Khreich, E Granger, A Miri, R Sabourin Pattern Recognition 43 (8), 2732-2752, 2010 | 140 | 2010 |
Fast and flexible elliptic curve point arithmetic over prime fields P Longa, A Miri IEEE Transactions on computers 57 (3), 289-302, 2008 | 116 | 2008 |
Area-efficient FIR filter design on FPGAs using distributed arithmetic P Longa, A Miri 2006 IEEE International Symposium on Signal Processing and Information …, 2006 | 105 | 2006 |
Using the Extreme Learning Machine (ELM) technique for heart disease diagnosis S Ismaeel, A Miri, D Chourishi 2015 IEEE Canada International Humanitarian Technology Conference (IHTC2015 …, 2015 | 102 | 2015 |
On defending against label flipping attacks on malware detection systems R Taheri, R Javidan, M Shojafar, Z Pooranian, A Miri, M Conti Neural Computing and Applications 32, 14781-14800, 2020 | 89 | 2020 |
New composite operations and precomputation scheme for elliptic curve cryptosystems over prime fields P Longa, A Miri Public Key Cryptography–PKC 2008: 11th International Workshop on Practice …, 2008 | 82 | 2008 |
Adaptive ROC-based ensembles of HMMs applied to anomaly detection W Khreich, E Granger, A Miri, R Sabourin Pattern Recognition 45 (1), 208-230, 2012 | 79 | 2012 |
Location privacy and anonymity preserving routing for wireless sensor networks AA Nezhad, A Miri, D Makrakis Computer Networks 52 (18), 3433-3452, 2008 | 79 | 2008 |
Proactive dynamic virtual-machine consolidation for energy conservation in cloud data centres S Ismaeel, R Karim, A Miri Journal of Cloud Computing 7, 1-28, 2018 | 77 | 2018 |
Privacy-preserving back-propagation and extreme learning machine algorithms S Samet, A Miri Data & Knowledge Engineering 79, 40-61, 2012 | 77 | 2012 |
On the memory complexity of the forward–backward algorithm W Khreich, E Granger, A Miri, R Sabourin Pattern Recognition Letters 31 (2), 91-99, 2010 | 67 | 2010 |
An improved visual cryptography scheme for secret hiding R Youmaran, A Adler, A Miri 23rd Biennial Symposium on Communications, 2006, 340-343, 2006 | 65 | 2006 |
Privacy preserving ID3 using Gini index over horizontally partitioned data S Samet, A Miri 2008 IEEE/ACS International Conference on Computer Systems and Applications …, 2008 | 63 | 2008 |
An IoT trust and reputation model based on recommender systems S Asiri, A Miri 2016 14th Annual Conference on Privacy, Security and Trust (PST), 561-568, 2016 | 59 | 2016 |
Fractal analysis of surface electromyography signals: a novel power spectrum-based method M Talebinejad, ADC Chan, A Miri, RM Dansereau Journal of electromyography and kinesiology 19 (5), 840-850, 2009 | 59 | 2009 |
A Lempel–Ziv complexity measure for muscle fatigue estimation M Talebinejad, ADC Chan, A Miri Journal of Electromyography and Kinesiology 21 (2), 236-241, 2011 | 58 | 2011 |