Seguir
Behnam Bahrak
Behnam Bahrak
Tehran Institute for Advanced Studies
Dirección de correo verificada de teias.institute
Título
Citado por
Citado por
Año
Protecting the primary users' operational privacy in spectrum sharing
B Bahrak, S Bhattarai, A Ullah, JMJ Park, J Reed, D Gurney
2014 IEEE International Symposium on Dynamic Spectrum Access Networks …, 2014
1032014
Impossible differential attack on seven-round AES-128
B Bahrak, MR Aref
IET Information Security 2 (2), 28-32, 2008
1032008
Security and Enforcement in Spectrum Sharing
JM Park, JH Reed, AA Beex, TC Clancy, V Kumar, B Bahrak
Proceedings of the IEEE 102 (3), 270-281, 2014
972014
Quantitative analysis of cryptocurrencies transaction graph
AP Motamed, B Bahrak
Applied Network Science 4, 1-21, 2019
552019
Graph theoretical defense mechanisms against false data injection attacks in smart grids
MH Ansari, VT Vakili, B Bahrak, P Tavassoli
Journal of Modern Power Systems and Clean Energy 6 (5), 860-871, 2018
322018
An oblivious transfer protocol based on elgamal encryption for preserving location privacy
H Jannati, B Bahrak
Wireless Personal Communications 97, 3113-3123, 2017
312017
Evaluation of big data frameworks for analysis of smart grids
MH Ansari, V Tabatab Vakili, B Bahrak
Journal of Big Data 6 (1), 109, 2019
292019
Coexistence Decision Making for Spectrum Sharing Among Heterogeneous Wireless Systems
B Bahrak, J Park
IEEE Transactions on Wireless Communications, 1-10, 2014
282014
A novel impossible differential cryptanalysis of AES
B Bahrak, MR Aref
proceedings of the Western European Workshop on Research in Cryptology 2007, 2007
272007
Bresap: A policy reasoner for processing spectrum access policies represented by binary decision diagrams
B Bahrak, A Deshpande, M Whitaker, JM Park
2010 IEEE Symposium on New Frontiers in Dynamic Spectrum (DySPAN), 1-12, 2010
262010
Short-term demand forecasting for online car-hailing services using recurrent neural networks
A Nejadettehad, H Mahini, B Bahrak
Applied Artificial Intelligence 34 (9), 674-689, 2020
252020
Multi-tier exclusion zones for dynamic spectrum sharing
A Ullah, S Bhattarai, JM Park, JH Reed, D Gurney, B Bahrak
2015 IEEE International Conference on Communications (ICC), 7659-7664, 2015
222015
Detecting new generations of threats using attribute‐based attack graphs
MA Nia, B Bahrak, M Kargahi, B Fabian
IET Information Security 13 (4), 293-303, 2019
192019
Sentiment analysis of Persian-English code-mixed texts
N Sabri, A Edalat, B Bahrak
2021 26th International Computer Conference, Computer Society of Iran (CSICC …, 2021
182021
Security analysis of an RFID tag search protocol
H Jannati, B Bahrak
Information Processing Letters 116 (10), 618-622, 2016
172016
Ontology-based spectrum access policies for policy-based cognitive radios
B Bahrak, JM Park, H Wu
2012 IEEE International Symposium on Dynamic Spectrum Access Networks, 489-500, 2012
172012
An improved authentication protocol for distributed mobile cloud computing services
H Jannati, B Bahrak
International Journal of Critical Infrastructure Protection 19, 59-67, 2017
142017
Analysis of the global trade network using exponential random graph models
A Setayesh, Z Sourati Hassan Zadeh, B Bahrak
Applied Network Science 7 (1), 38, 2022
112022
Mixing detection on bitcoin transactions using statistical patterns
A Shojaeinasab, AP Motamed, B Bahrak
IET Blockchain 3 (3), 136-148, 2023
82023
UTNLP at SemEval-2022 Task 6: A Comparative Analysis of Sarcasm Detection using generative-based and mutation-based data augmentation
A Abaskohi, A Rasouli, T Zeraati, B Bahrak
Proceedings of the 16th International Workshop on Semantic Evaluation …, 2022
82022
El sistema no puede realizar la operación en estos momentos. Inténtalo de nuevo más tarde.
Artículos 1–20