default search action
Mohammad Ali Akhaee
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j46]Kiavash Jamshidi, Ramin Toosi, Mohammad Ali Akhaee:
Gender Recognition Based on Hand Images Employing Local and Global Shape Information. Computer 57(6): 50-61 (2024) - [j45]Ammar Mohammadi, Mohammad Ali Akhaee:
Reversible data hiding in encrypted images using histogram modification and MSBs integration. Multim. Tools Appl. 83(2): 5229-5249 (2024) - [j44]Kimia Dinashi, Ramin Toosi, Mohammad Ali Akhaee:
Face manifold: manifold learning for synthetic face generation. Multim. Tools Appl. 83(8): 24679-24698 (2024) - [j43]Ashkan Emami, Ghazaleh Keshavarz Kalhori, Sheyda Mirzakhani, Mohammad Ali Akhaee:
A blockchain-based privacy-preserving anti-collusion data auction mechanism with an off-chain approach. J. Supercomput. 80(6): 7507-7556 (2024) - [j42]Habib Yajam, Elnaz Ebadi, Mohammad Ali Akhaee:
JABS: A Blockchain Simulator for Researching Consensus Algorithms. IEEE Trans. Netw. Sci. Eng. 11(1): 3-13 (2024) - [i8]Alireza Hosseini, Kiana Hooshanfar, Pouria Omrani, Reza Toosi, Ramin Toosi, Zahra Ebrahimian, Mohammad Ali Akhaee:
Brand Visibility in Packaging: A Deep Learning Approach for Logo Detection, Saliency-Map Prediction, and Logo Placement Analysis. CoRR abs/2403.02336 (2024) - 2023
- [j41]Habib Allah Yajam, Mohammad Ali Akhaee:
Analysis of IOTA Tangle Stability in High Transaction Rates. ISC Int. J. Inf. Secur. 15(2) (2023) - [j40]Ashkan Emami, Habib Yajam, Mohammad Ali Akhaee, Rahim Asghari:
A scalable decentralized privacy-preserving e-voting system based on zero-knowledge off-chain computations. J. Inf. Secur. Appl. 79: 103645 (2023) - [j39]Mohammad Dehghan Rouzi, Behzad Moshiri, Mohammad Khoshnevisan, Mohammad Ali Akhaee, Farhang Jaryani, Samaneh Salehi Nasab, Myeounggon Lee:
Breast Cancer Detection with an Ensemble of Deep Learning Networks Using a Consensus-Adaptive Weighting Method. J. Imaging 9(11): 247 (2023) - [j38]Tina Behrouzi, Ramin Toosi, Mohammad Ali Akhaee:
Multimodal movie genre classification using recurrent neural network. Multim. Tools Appl. 82(4): 5763-5784 (2023) - 2022
- [j37]Ramin Toosi, Mohammadreza Sadeghi, Hossein B. Yazdi, Mohammad Ali Akhaee:
Fast and accurate spectral clustering via augmented Lagrangian. J. Comput. Sci. 64: 101860 (2022) - [j36]Amir Mohammad Rostami, Ali Karimi, Mohammad Ali Akhaee:
Keyword spotting in continuous speech using convolutional neural network. Speech Commun. 142: 15-21 (2022) - [j35]Kimia Dinashi, Ali Ameri, Mohammad Ali Akhaee, Kevin B. Englehart, Erik J. Scheme:
Compression of EMG Signals Using Deep Convolutional Autoencoders. IEEE J. Biomed. Health Informatics 26(7): 2888-2897 (2022) - [c38]Ramin Toosi, Mohammad Ali Akhaee, Mohammad-Reza Abolghasemi Dehaqani:
Brain-inspired feedback for spatial frequency aware artificial networks. IEEECONF 2022: 806-810 - [i7]Pouya Narimani, Seyedamin Habibi, Mohammad Ali Akhaee:
A Novel Framework for Dataset Generation for profiling Disassembly attacks using Side-Channel Leakages and Deep Neural Networks. CoRR abs/2207.12068 (2022) - 2021
- [j34]Ramin Toosi, Mohammad Ali Akhaee:
Time-frequency analysis of keystroke dynamics for user authentication. Future Gener. Comput. Syst. 115: 438-447 (2021) - [c37]Pouya Narimani, Mohammad Ali Akhaee, Seyedamin Habibi:
Side-Channel based Disassembler for AVR Micro-Controllers using Convolutional Neural Networks. ISCISC 2021: 75-80 - [c36]Alireza Shahanaghi, Mohammad Ali Akhaee, Saeed Sarreshtedari, Ramin Toosi:
Optimum Group Pixel Matching Strategies for Image Steganography. ISCISC 2021: 89-94 - [i6]Ali Karimi, Ramin Toosi, Mohammad Ali Akhaee:
Soccer Event Detection Using Deep Learning. CoRR abs/2102.04331 (2021) - 2020
- [j33]Ammar Mohammadi, Mansor Nakhkash, Mohammad Ali Akhaee:
A High-Capacity Reversible Data Hiding in Encrypted Images Employing Local Difference Predictor. IEEE Trans. Circuits Syst. Video Technol. 30(8): 2366-2376 (2020) - [c35]Elnaz Ebadi, Habib Yajam, Mohammad Ali Akhaee:
Improvements on Easypaysy: The Bitcoin's Layer-2 Accounts Protocol. ISCISC 2020: 54-59 - [i5]Amir Mohammad Rostami, Ali Karimi, Mohammad Ali Akhaee:
EfficientNet-Absolute Zero for Continuous Speech Keyword Spotting. CoRR abs/2012.15695 (2020)
2010 – 2019
- 2019
- [j32]Ramin Toosi, Sadaf Salehkalaibar, Mohammad Ali Akhaee:
Improved ensemble growing method for steganalysis of digital media. Multim. Tools Appl. 78(8): 9877-9893 (2019) - [j31]Reza Esfahani, Mohammad Ali Akhaee, Zynolabedin Norouzi:
A fast video watermarking algorithm using dual tree complex wavelet transform. Multim. Tools Appl. 78(12): 16159-16175 (2019) - [j30]Ramin Toosi, Mohammadreza Sadeghi, Mohammad Ali Akhaee:
Robust image watermarking using sample area quantization. Multim. Tools Appl. 78(24): 34963-34980 (2019) - [j29]Mohammadreza Sadeghi, Ramin Toosi, Mohammad Ali Akhaee:
Blind gain invariant image watermarking using random projection approach. Signal Process. 163: 213-224 (2019) - [j28]Hesam Araghi, Mohammad Ali Akhaee, Arash Amini:
Joint Compensation of Jitter Noise and Time-Shift Errors in Multichannel Sampling System. IEEE Trans. Instrum. Meas. 68(10): 3932-3941 (2019) - [i4]Kimia Dinashi, Ramin Toosi, Mohammad Ali Akhaee:
Face Manifold: Manifold Learning for Synthetic Face Generation. CoRR abs/1910.01403 (2019) - 2018
- [j27]Saeed Sarreshtedari, Mohammad Ali Akhaee, Aliazam Abbasfar:
Source-channel coding-based watermarking for self-embedding of JPEG images. Signal Process. Image Commun. 62: 106-116 (2018) - [j26]Faride Madine, Mohammad Ali Akhaee, Nematollah Zarmehi:
A multiplicative video watermarking robust to H.264/AVC compression standard. Signal Process. Image Commun. 68: 229-240 (2018) - [c34]Mohammad Hajian Berenjestanaki, Mohammad Ali Akhaee:
Application Detection in Anonymous Communication Networks. CECC 2018: 12:1-12:5 - [c33]Hossein Lolaee, Mohammad Ali Akhaee:
Robust Stochastic Maximum Likelihood Algorithm for DOA Estimation of Acoustic Sources in the Spherical Harmonic Domain. EUSIPCO 2018: 351-355 - [c32]Habib Yajam, Elnaz Ebadi, Mohammadtaghi Badakhshan, Mohammad Ali Akhaee:
Improvement on Bitcoin's Verifiable Public Randomness with Semi-Trusted Delegates. IST 2018: 53-57 - 2017
- [j25]Hossein Lolaee, Mohammad Ali Akhaee:
Analytic model for network resource management between ISPs and users. IET Networks 6(2): 32-38 (2017) - [j24]Saeed Sarreshtedari, Aliazam Abbasfar, Mohammad Ali Akhaee:
A joint source-channel coding approach to digital image self-recovery. Signal Image Video Process. 11(7): 1371-1378 (2017) - [c31]Banafsheh Heydari, Habib Yajam, Mohammad Ali Akhaee, Sadaf Salehkalaibar:
Utilizing Features of Aggregated Flows to Identify Botnet Network Traffic. ISCISC 2017: 25-30 - [i3]Hossein Lolaee, Mohammad Ali Akhaee:
Analytic Model for Network Resource Management between ISPs and Users. CoRR abs/1711.04185 (2017) - 2016
- [j23]Seyed Amir Reza Kazemi, Roohollah Rezaei, Mohammad Ali Akhaee, Fereidoon Behnia:
Covert communications through mobile voice channels. IET Inf. Secur. 10(3): 156-164 (2016) - [j22]Nematollah Zarmehi, Mohammad Ali Akhaee:
Digital video steganalysis toward spread spectrum data hiding. IET Image Process. 10(1): 1-8 (2016) - [j21]Amirafshar Moshtaghpour, Mohammad Ali Akhaee, Masoud Attarifar:
Obstacle mapping in wireless sensor networks via minimum number of measurements. IET Signal Process. 10(3): 237-246 (2016) - [j20]Seyed Amir Reza Kazemi, Fernando Pérez-González, Mohammad Ali Akhaee, Fereydoon Behnia:
Data Hiding Robust to Mobile Communication Vocoders. IEEE Trans. Multim. 18(12): 2345-2357 (2016) - [c30]Hesam Araghi, Mohammad Ali Akhaee, Arash Amini:
Approximateml estimator for compensation oftiming mismatch and jitter noise in TI-ADCS. EUSIPCO 2016: 2360-2364 - [c29]Habib Allah Yajam, Younes Karimi Ahmadabadi, Mohammad Ali Akhaee:
PapiaPass: Sentence-based passwords using dependency trees. ISCISC 2016: 91-96 - [c28]Milad Ghalejughi, Mohammad Ali Akhaee:
Video watermarking in the DT-CWT domain using hyperbolic function. ISCISC 2016: 97-100 - [c27]Ali Sattari, Mohammad Ali Akhaee:
Spread spectrum watermarking robust to silk vocoder using sub-optimal detectors. ISCISC 2016: 117-122 - [c26]Habib Allah Yajam, Younes Karimi Ahmadabadi, Mohammad Ali Akhaee:
Deniable Encryption based on Standard RSA with OAEP. IST 2016: 84-88 - 2015
- [j19]Sayed Mohammad Ebrahim Sahraeian, Mohammad Ali Akhaee, Bülent Sankur, Farokh Marvasti:
Information hiding with maximum likelihood detector for correlated signals. Digit. Signal Process. 36: 144-155 (2015) - [j18]Hassan Karimi, Mahrokh G. Shayesteh, Mohammad Ali Akhaee:
Steganalysis of JPEG images using enhanced neighbouring joint density features. IET Image Process. 9(7): 545-552 (2015) - [j17]Mohammad Hamghalam, Sattar Mirzakuchaki, Mohammad Ali Akhaee:
Vertex angle image watermarking with optimal detector. Multim. Tools Appl. 74(9): 3077-3098 (2015) - [j16]Mohammad Ali Akhaee, Sayed Mohammad Ebrahim Sahraeian:
Scaling-based watermarking with universally optimum decoder. Multim. Tools Appl. 74(15): 5995-6018 (2015) - [j15]Saeed Akhavan, Mohammad Ali Akhaee, Saeed Sarreshtedari:
Images steganalysis using GARCH model for feature selection. Signal Process. Image Commun. 39: 75-83 (2015) - [j14]Saeed Sarreshtedari, Mohammad Ali Akhaee, Aliazam Abbasfar:
A Watermarking Method for Digital Speech Self-Recovery. IEEE ACM Trans. Audio Speech Lang. Process. 23(11): 1917-1925 (2015) - [j13]Saeed Sarreshtedari, Mohammad Ali Akhaee:
A Source-Channel Coding Approach to Digital Image Protection and Self-Recovery. IEEE Trans. Image Process. 24(7): 2266-2277 (2015) - [c25]Saeed Sarreshtedari, Mohammad Ali Akhaee, Aliazam Abbasfar:
Digital image self-recovery using unequal error protection. EUSIPCO 2015: 71-75 - [c24]Hesam Araghi, Mohammad Ali Akhaee, Arash Amini:
Timing mismatch compensation in TI-ADCS using Bayesian approach. EUSIPCO 2015: 1391-1395 - [c23]Mohammad Hossein Shahmoradi, Mohammad Ali Akhaee, Maryam S. Mirian:
Combined classification and regression for simultaneous and proportional EMG control of wrist forces. EUSIPCO 2015: 2426-2430 - [i2]Nematollah Zarmehi, Morteza Banagar, Mohammad Ali Akhaee:
Optimum Decoder for an Additive Video Watermarking with Laplacian Noise in H.264. CoRR abs/1506.01501 (2015) - 2014
- [j12]Saeed Sarreshtedari, Mohammad Ali Akhaee:
One-third probability embedding: a new ±1 histogram compensating image least significant bit steganography scheme. IET Image Process. 8(2): 78-89 (2014) - [j11]Mohammad Hamghalam, Sattar Mirzakuchaki, Mohammad Ali Akhaee:
Geometric modelling of the wavelet coefficients for image watermarking using optimum detector. IET Image Process. 8(3): 162-172 (2014) - [c22]Saeed Akhavan, Mohammad Ali Akhaee, Saeed Sarreshtedari:
Universal image steganalysis based on GARCH model. EUSIPCO 2014: 2430-2434 - [c21]Nematollah Zarmehi, Mohammad Ali Akhaee:
Video steganalysis of multiplicative spread spectrum steganography. EUSIPCO 2014: 2440-2444 - [c20]Mahdi Boloursaz, Seyed Amir Reza Kazemi, Fereydoon Behnia, Mohammad Ali Akhaee:
Performance improvement of spread spectrum additive data hiding over codec-distorted voice channels. EUSIPCO 2014: 2510-2514 - [c19]Saeed Sarreshtedari, Mohammad Ali Akhaee:
Source-channel coding approach to generate tamper-proof images. ICASSP 2014: 7435-7439 - [c18]Pedram Kheirkhah Sangdeh, Mahtab Mirmohseni, Mohammad Ali Akhaee:
Blind interference alignment for three-user multi-hop SISO interference channel. ICUMT 2014: 462-467 - [c17]Pedram Kheirkhah Sangdeh, Mahtab Mirmohseni, Mohammad Ali Akhaee:
Interference alignment for two-user two-hop interference X-channel with delayed and No CSIT. ICUMT 2014: 473-479 - [c16]Mohammad Mahdi Tajiki, Mohammad Ali Akhaee:
Secure and privacy preserving keyword searching cryptography. ISCISC 2014: 226-230 - 2013
- [j10]Mohammad Hamghalam, Sattar Mirzakuchaki, Mohammad Ali Akhaee:
Robust image watermarking using dihedral angle based on maximum-likelihood detector. IET Image Process. 7(5): 451-463 (2013) - [j9]Mohammad Ali Akhaee, Farokh Marvasti:
A survey on digital data hiding schemes: principals, algorithms, and applications. ISC Int. J. Inf. Secur. 5(1): 5-36 (2013) - [j8]Abolfazl Diyanat, Mohammad Ali Akhaee, Shahrokh Ghaemmaghami:
Robust multiplicative video watermarking using statistical modeling. ISC Int. J. Inf. Secur. 5(1): 83-95 (2013) - [c15]Nematollah Zarmehi, Morteza Banagar, Mohammad Ali Akhaee:
Optimum decoder for an additive video watermarking with Laplacian noise in H.264. ISCISC 2013: 1-5 - 2012
- [j7]Ali ParandehGheibi, Ali Ayremlou, Mohammad Ali Akhaee, Farokh Marvasti:
Improved iterative techniques to compensate for interpolation distortions. Signal Process. 92(4): 963-976 (2012) - 2011
- [j6]Mohammad Ali Akhaee, Sayed Mohammad Ebrahim Sahraeian, Craig T. Jin:
Blind Image Watermarking Using a Sample Projection Approach. IEEE Trans. Inf. Forensics Secur. 6(3-2): 883-893 (2011) - [c14]Abolfazl Diyanat, Mohammad Ali Akhaee, Shahrokh Ghaemmaghami:
Robust video watermarking using maximum likelihood decoder. EUSIPCO 2011: 2044-2048 - 2010
- [j5]Mohammad Ali Akhaee, Nima Khademi Kalantari, Farokh Marvasti:
Robust audio and speech watermarking using Gaussian and Laplacian modeling. Signal Process. 90(8): 2487-2497 (2010) - [j4]Mohammad Ali Akhaee, Sayed Mohammad Ebrahim Sahraeian, Farokh Marvasti:
Contourlet-Based Image Watermarking Using Optimum Detector in a Noisy Environment. IEEE Trans. Image Process. 19(4): 967-980 (2010) - [c13]Mohammad Ali Akhaee, Arash Amini, Ghaffar Ghorbani, Farokh Marvasti:
A solution to gain attack onwatermarking systems: Logarithmic Homogeneous Rational Dither Modulation. ICASSP 2010: 1746-1749 - [c12]Ali ParandehGheibi, M. Amin Rahimian, Mohammad Ali Akhaee, Ali Ayremlou, Farokh Marvasti:
Compensating for distortions in interpolation of two-dimensional signals using improved iterative techniques. ICT 2010: 929-934 - [i1]Ali ParandehGheibi, Mohammad Ali Akhaee, Ali Ayremlou, Mohammad Amin Rahimian, Farokh Marvasti:
Improved Iterative Techniques to Compensate for Interpolation Distortions. CoRR abs/1009.3785 (2010)
2000 – 2009
- 2009
- [j3]Nima Khademi Kalantari, Mohammad Ali Akhaee, Seyed Mohammad Ahadi, Hamidreza Amindavar:
Robust Multiplicative Patchwork Method for Audio Watermarking. IEEE Trans. Speech Audio Process. 17(6): 1133-1141 (2009) - [j2]Mohammad Ali Akhaee, Sayed Mohammad Ebrahim Sahraeian, Bülent Sankur, Farokh Marvasti:
Robust Scaling-Based Image Watermarking Using Maximum-Likelihood Decoder With Optimum Strength Factor. IEEE Trans. Multim. 11(5): 822-833 (2009) - [j1]Mohammad Ali Akhaee, Mohammad Javad Saberian, Soheil Feizi, Farokh Marvasti:
Robust Audio Data Hiding Using Correlated Quantization With Histogram-Based Detector. IEEE Trans. Multim. 11(5): 834-842 (2009) - [c11]Sayed Mohammad Ebrahim Sahraeian, Mohammad Ali Akhaee, Farrokh Marvasti:
Blind image watermarking based on sample rotation with optimal detector. EUSIPCO 2009: 278-282 - [c10]Mohammad Ali Akhaee, Shahrokh Ghaemmaghami, Amir Nikooienejad, Farokh Marvasti:
Robust Image Data Hiding Using Geometric Mean Quantization. GLOBECOM 2009: 1-6 - [c9]Mohammad Ali Akhaee, Nima Khademi Kalantari, Farokh Marvasti:
Robust Multiplicative Audio and Speech Watermarking Using Statistical Modeling. ICC 2009: 1-5 - [c8]Sayed Mohammad Ebrahim Sahraeian, Mohammad Ali Akhaee, Farokh Marvasti:
Information Hiding with Optimal Detector for Highly Correlated Signals. ICC 2009: 1-5 - [c7]Nima Khademi Kalantari, Mohammad Ali Akhaee, Seyed Mohammad Ahadi, Hamidreza Amindavar:
Robust Multiplicative Patchwork Method for audio watermarking. DPS 2009: 1-4 - [c6]Sayed Mohammad Ebrahim Sahraeian, Mohammad Ali Akhaee, Farokh Marvasti:
Distribution independent blind watermarking. ICIP 2009: 125-128 - [c5]Ali Ameri, Mohammad J. Saberian, Mohammad Ali Akhaee, Farokh Marvasti:
Semi-reversible quantization based data hiding using missing samples recovery technique. ICT 2009: 298-302 - 2008
- [c4]Sayed Mohammad Ebrahim Sahraeian, Mohammad Ali Akhaee, Bülent Sankur, Farrokh Marvasti:
Robust multiplicative watermarking technique with Maximum Likelihood detector. EUSIPCO 2008: 1-5 - [c3]Mohammad Javad Saberian, Mohammad Ali Akhaee, Farokh Marvasti:
An invertible quantization based watermarking approach. ICASSP 2008: 1677-1680 - [c2]Sayed Mohammad Ebrahim Sahraeian, Mohammad Ali Akhaee, S. Amir Hejazi, Farokh Marvasti:
Contourlet based image watermarking using optimum detector in the noisy environment. ICIP 2008: 429-432 - 2006
- [c1]Ali ParandehGheibi, Mohammad Ali Akhaee, Farokh Marvasti:
Design of interpolation functions using iterative methods. EUSIPCO 2006: 1-5
Coauthor Index
aka: Farokh Marvasti
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 21:24 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint