Cookies on this website

We use cookies to ensure that we give you the best experience on our website. If you click 'Accept all cookies' we'll assume that you are happy to receive all cookies and you won't see this message again. If you click 'Reject all non-essential cookies' only necessary cookies providing core functionality such as security, network management, and accessibility will be enabled. Click 'Find out more' for information on how to change your cookie settings.

MVDroid: an android malicious VPN detector using neural networks

Journal article

Seraj S. et al, (2023), Neural Computing and Applications

HamDroid: permission-based harmful android anti-malware detection using neural networks

Journal article

Seraj S. et al, (2022), Neural Computing and Applications

A quantum blind signature scheme for electronic payments

Conference paper

Khodambashi S. and Zakerolhosseini A., (2014), 22nd Iranian Conference on Electrical Engineering, ICEE 2014, 879 - 884

A sessional blind signature based on quantum cryptography

Journal article

Khodambashi S. and Zakerolhosseini A., (2014), Quantum Information Processing, 13, 121 - 130

Efficient RNS to binary converters for the new 4-moduli set {2n, 2n+1-1, 2n-1, 2n-1-1}

Journal article

Esmaeildoust M. et al, (2012), ieice electronics express, 9, 1 - 7

A scalable architecture to control LED displays

Conference paper

Khodambashi S. et al, (2010), 2010 2nd International Conference on Industrial and Information Systems, IIS 2010, 1, 456 - 459

An impulse noise fading technique based on local histogram processing

Conference paper

Khodambashi S. and Moghaddam ME., (2009), IEEE International Symposium on Signal Processing and Information Technology, ISSPIT 2009, 95 - 100