default search action
Amir Jalaly Bidgoly
Person information
- affiliation: University of Qom, Iran
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j31]Mohammad Moein Fazeli, Yaghoub Farjami, Amir Jalaly Bidgoly:
An efficient cloud manufacturing service composition approach using deep reinforcement learning. Comput. Ind. Eng. 195: 110446 (2024) - [j30]Masoud Narimani Zaman Abadi, Amir Jalaly Bidgoly, Yaghoub Farjami:
ASSOCIATE: A simulator for assessing soft security in the Cognitive Internet of Things. Comput. Commun. 217: 107-125 (2024) - [j29]Zeinab Alebouyeh, Amir Jalaly Bidgoly:
Benchmarking robustness and privacy-preserving methods in federated learning. Future Gener. Comput. Syst. 155: 18-38 (2024) - [j28]Mahdi shahraki, Amir Jalaly Bidgoly:
Edge model: An efficient method to identify and reduce the effectiveness of malicious clients in federated learning. Future Gener. Comput. Syst. 157: 459-468 (2024) - [j27]Hora Saadaat Pishbin, Amir Jalaly Bidgoly:
Exploiting Deep Neural Networks as Covert Channels. IEEE Trans. Dependable Secur. Comput. 21(4): 2115-2126 (2024) - 2023
- [j26]Shahram Ghahremani, Amir Jalaly Bidgoly, Uyen Trang Nguyen, David K. Y. Yau:
A Novel Semi-Supervised Adversarially Learned Meta-Classifier for Detecting Neural Trojan Attacks. IEEE Access 11: 138303-138315 (2023) - [j25]Amir Jalaly Bidgoly, Fereshteh Arabi:
Robustness evaluation of trust and reputation systems using a deep reinforcement learning approach. Comput. Oper. Res. 156: 106250 (2023) - [j24]Masoud Narimani Zaman Abadi, Amir Jalaly Bidgoly, Yaghoub Farjami, Ebrahim Hossein Khani:
A comprehensive soft security model for Cognitive Internet of Things. Internet Things 23: 100858 (2023) - [j23]Abdalsamad Keramatfar, Hossein Amirkhani, Amir Jalaly Bidgoly:
Multi-thread hierarchical deep model for context-aware sentiment analysis. J. Inf. Sci. 49(1): 133-144 (2023) - [j22]Faezeh Alizadeh, Amir Jalaly Bidgoly:
Bit flipping attack detection in low power wide area networks using a deep learning approach. Peer Peer Netw. Appl. 16(4): 1916-1926 (2023) - [j21]Amir Jalaly Bidgoly, Hossein Amirkhani, Razieh Baradaran:
Clustering-based Sequence to Sequence Model for Generative Question Answering in a Low-resource Language. ACM Trans. Asian Low Resour. Lang. Inf. Process. 22(2): 57:1-57:14 (2023) - 2022
- [j20]Mahdi Kherad, Amir Jalaly Bidgoly:
Recommendation system using a deep learning and graph analysis approach. Comput. Intell. 38(5): 1859-1883 (2022) - [j19]Abdalsamad Keramatfar, Hossein Amirkhani, Amir Jalaly Bidgoly:
Modeling Tweet Dependencies with Graph Convolutional Networks for Sentiment Analysis. Cogn. Comput. 14(6): 2234-2245 (2022) - [j18]Ali Mohsenzadeh, Amir Jalaly Bidgoly, Yaghoub Farjami:
A novel reputation-based consensus framework (RCF) in distributed ledger technology. Comput. Commun. 190: 126-144 (2022) - [j17]Zahra Roozbahani, Jalal Rezaeenour, Ali Katanforoush, Amir Jalaly Bidgoly:
Personalization of the collaborator recommendation system in multi-layer scientific social networks: A case study of ResearchGate. Expert Syst. J. Knowl. Eng. 39(5) (2022) - [j16]Ali Mohsenzadeh, Amir Jalaly Bidgoly, Yaghoub Farjami:
A fair consensus model in blockchain based on computational reputation. Expert Syst. Appl. 204: 117578 (2022) - [j15]Somayeh Mozafari, Amir Jalaly Bidgoly:
Lightweight Identification of Android Malware with Knowledge Distillation and Deep Learning Approach. ISC Int. J. Inf. Secur. 14(3): 81-92 (2022) - [j14]Fariba Sadeghi, Amir Jalaly Bidgoly, Hossein Amirkhani:
Fake news detection on social media using a natural language inference approach. Multim. Tools Appl. 81(23): 33801-33821 (2022) - [j13]Somayyeh Fallah, Amir Jalaly Bidgoly:
Android malware detection using network traffic based on sequential deep learning models. Softw. Pract. Exp. 52(9): 1987-2004 (2022) - [j12]Zeinab Alebouyeh, Amir Jalaly Bidgoly:
Zipf's law analysis on the leaked Iranian users' passwords. J. Comput. Virol. Hacking Tech. 18(2): 101-116 (2022) - [i4]Forough Farazmanesh, Fateme Foroutan, Amir Jalaly Bidgoly:
Compromised account detection using authorship verification: a novel approach. CoRR abs/2206.03581 (2022) - 2021
- [j11]Amir Jalaly Bidgoly:
Probabilistic analysis of trust based decision making in hostile environments. Knowl. Based Syst. 211: 106521 (2021) - [i3]Fahimeh Soltaninejad, Amir Jalaly Bidgoly:
A novel method for recommendation systems using invasive weed optimization. CoRR abs/2106.02831 (2021) - 2020
- [j10]Faezeh Alizadeh, Amir Jalaly Bidgoly:
Cipher chaining key re-synchronization in LPWAN IoT network using a deep learning approach. Comput. Networks 179: 107373 (2020) - [j9]Amir Jalaly Bidgoly, Hamed Jalaly Bidgoly, Zeynab Arezoumand:
A survey on methods and challenges in EEG based authentication. Comput. Secur. 93: 101788 (2020) - [j8]Amir Jalaly Bidgoly:
Robustness verification of soft security systems. J. Inf. Secur. Appl. 55: 102632 (2020) - [j7]Ali Mohsenzadeh, Amir Jalaly Bidgoly, Yaghoub Farjami:
A novel reward and penalty trust evaluation model based on confidence interval using Petri Net. J. Netw. Comput. Appl. 154: 102533 (2020) - [j6]Zahra Roozbahani, Jalal Rezaeenour, Hanif Emamgholizadeh, Amir Jalaly Bidgoly:
A systematic survey on collaborator finding systems in scientific social networks. Knowl. Inf. Syst. 62(10): 3837-3879 (2020) - [j5]Ali Mohsenzadeh, Mohsen Nickray, Amir Jalaly Bidgoly, Yaghoub Farjami:
A new task scheduling mechanism in grid computing using trust model. Multiagent Grid Syst. 16(2): 135-152 (2020) - [d1]Fariba Sadeghi, Amir Jalaly Bidgoly, Hossein Amirkhani:
FNID: Fake News Inference Dataset. IEEE DataPort, 2020 - [i2]Mahdi Kherad, Amir Jalaly Bidgoly:
Recommendation system using a deep learning and graph analysis approach. CoRR abs/2004.08100 (2020) - [i1]Amir Jalaly Bidgoly, Zoleikha Rahmanian:
A Robust Opinion Spam Detection Method Against Malicious Attackers in Social Media. CoRR abs/2008.08650 (2020)
2010 – 2019
- 2019
- [c4]Ala Bahrani, Amir Jalaly Bidgly:
Ransomware detection using process mining and classification algorithms. ISCISC 2019: 73-77 - 2016
- [j4]Amir Jalaly Bidgoly, Behrouz Tork Ladani:
Benchmarking reputation systems: A quantitative verification approach. Comput. Hum. Behav. 57: 274-291 (2016) - [j3]Amir Jalaly Bidgoly, Behrouz Tork Ladani:
Modeling and Quantitative Verification of Trust Systems Against Malicious Attackers. Comput. J. 59(7): 1005-1027 (2016) - 2015
- [j2]Amir Jalaly Bidgoly, Behrouz Tork Ladani:
Modelling and Quantitative Verification of Reputation Systems Against Malicious Attackers. Comput. J. 58(10): 2567-2582 (2015) - 2013
- [j1]Ali Khalili, Mohammad Abdollahi Azgomi, Amir Jalaly Bidgoly:
SimGine: A simulation engine for stochastic discrete-event systems based on SDES description. Simul. 89(4): 539-555 (2013) - [c3]Amir Jalaly Bidgoly, Behrouz Tork Ladani:
Quantitative verification of beta reputation system using PRISM probabilistic model checker. ISCISC 2013: 1-6
2000 – 2009
- 2009
- [c2]Ali Khalili, Amir Jalaly Bidgoly, Mohammad Abdollahi Azgomi:
PDETool: A Multi-formalism Modeling Tool for Discrete-Event Systems Based on SDES Description. Petri Nets 2009: 343-352 - [c1]Amir Jalaly Bidgoly, Ali Khalili, Mohammad Abdollahi Azgomi:
Implementation of Coloured Stochastic Activity Networks within the PDETool Framework. Asia International Conference on Modelling and Simulation 2009: 710-715
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 21:26 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint