MVDroid: an android malicious VPN detector using neural networks
Journal article
Seraj S. et al, (2023), Neural Computing and Applications
HamDroid: permission-based harmful android anti-malware detection using neural networks
Journal article
Seraj S. et al, (2022), Neural Computing and Applications
A quantum blind signature scheme for electronic payments
Conference paper
Khodambashi S. and Zakerolhosseini A., (2014), 22nd Iranian Conference on Electrical Engineering, ICEE 2014, 879 - 884
A sessional blind signature based on quantum cryptography
Journal article
Khodambashi S. and Zakerolhosseini A., (2014), Quantum Information Processing, 13, 121 - 130
Efficient RNS to binary converters for the new 4-moduli set {2n, 2n+1-1, 2n-1, 2n-1-1}
Journal article
Esmaeildoust M. et al, (2012), ieice electronics express, 9, 1 - 7
A scalable architecture to control LED displays
Conference paper
Khodambashi S. et al, (2010), 2010 2nd International Conference on Industrial and Information Systems, IIS 2010, 1, 456 - 459
An impulse noise fading technique based on local histogram processing
Conference paper
Khodambashi S. and Moghaddam ME., (2009), IEEE International Symposium on Signal Processing and Information Technology, ISSPIT 2009, 95 - 100