مقالات ارائه شده در مجلات
فارسی
- مریم ترابی , سبحان علی آبادی , هاله امین طوسی , طراحی و پیادهسازی یک چارچوب مبتنی بر اعتماد برای تشخیص ترافیک موبایل در شبکه, صنایع الکترونیک, دوره (10), شماره (4), سال (2020-2), صفحات (69-84)
- هاله امین طوسی , ارائه پروتکلی جامع و سبک وزن برای احرازهویت دو طرفه دستگاههای VoIP مبتنی بر کارت هوشمند, صنایع الکترونیک, دوره (10), شماره (3), سال (2019-12), صفحات (69-84)
انگلیسی
- TAHEREH NAYERIFARD , Haleh Amintoosi , Abbas Ghaemi Bafghi , A robust PRNU-based source camera attribution with convolutional neural networks, Journal of Supercomputing, Volume (81), No (1), Year (2024-10)
- Seyyed Javad Bozorg Zadeh Razavi , Haleh Amintoosi , Mohammad Allahbakhsh , A clarity and fairness aware framework for selecting workers in competitive crowdsourcing tasks, Computing, Volume (106), No (9), Year (2024-9), Pages (3005-3030)
- mahdi nikooghadam , Haleh Amintoosi , حمیدرضا شهریاری , REACH: Robust Efficient Authentication for Crowdsensing-based Healthcare, Journal of Supercomputing, Volume (80), No (6), Year (2024-4), Pages (8434-8468)
- Fatemeh Farhadi , Mohammad Allahbakhsh , Ali Maghsoudi , Nadia Armin , Haleh Amintoosi , DiMo: discovery of microRNA motifs using deep learning and motif embedding, Briefings in Bioinformatics, Volume (24), No (3), Year (2023-5)
- زهرا میر , Mohammad Allahbakhsh , علی مقصودی , Haleh Amintoosi , A Taxonomy for RNA Motif Discovery, Journal of Computer and Knowledge Engineering, Year (2022-12)
- seyed salar ghazi , Haleh Amintoosi , sahar pilevarmoakhar , On the Suitability of Improved TrustChain for Smartphones, ISeCure, Volume (14), No (3), Year (2022-10), Pages (33-42)
- Mohammad Allahbakhsh , Haleh Amintoosi , Sharing Reputation Data Across Online Communities, IEEE Internet Computing, Volume (26), No (4), Year (2022-7), Pages (60-67)
- Haleh Amintoosi , mahdi nikooghadam , Mohammad Shojafar , Saru Kumari , Mamoun Alazab , Slight: A lightweight authentication scheme for smart healthcare services, Computers and Electrical Engineering, Volume (99), Year (2022-4), Pages (107803-107811)
- Haleh Amintoosi , mahdi nikooghadam , Saru Kumari , Sachin Kumar , Chien-Ming Chen , TAMA: Three-Factor Authentication for Multi-server Architecture, Human-centric Computing and Information Sciences, Volume (11), Year (2021-10), Pages (1-1)
- Haleh Amintoosi , mahdi nikooghadam , Saru Kumari , feng Jun , Sachin Kumar , Joel J. P. C. Rodrigues , Secure and Authenticated Data Access and Sharing Model for Smart Wearable Systems, IEEE Internet of Things Journal, Volume (9), No (7), Year (2021-1), Pages (5368-5379)
- Fuqdan A. Al-Ibraheemi , Sattar Al-Ibraheemi , Haleh Amintoosi , A hybrid method of genetic algorithm and support vector machine for DNS tunneling detection, International Journal of Electrical and Computer Engineering-IJECE, Volume (11), No (2), Year (2021-4), Pages (1666-1674)
- mahdi nikooghadam , Haleh Amintoosi , Saru kumari , On the Security of “Secure and Lightweight Authentication with Key Agreement for Smart Wearable Systems”, Wireless Personal Communications, Volume (120), No (1), Year (2021-9), Pages (1-8)
- Mohammad Allahbakhsh , Haleh Amintoosi , Behshid Behkamal , Amin Beheshti , Elisa Bertino , SCiMet: Stable, sCalable and reliable Metric-based framework for quality assessment in collaborative content generation systems, Journal of Informetrics, Volume (15), No (2), Year (2021-5), Pages (101127-101127)
- mahdi nikooghadam , Haleh Amintoosi , SK Hafizul Islam , Mostafa Farhadi Moghadam , A provably secure and lightweight authentication scheme for Internet of Drones for smart city surveillance, Journal of Systems Architecture, Volume (115), Year (2020-12)
- Mushtaq Talb Tally , Haleh Amintoosi , A hybrid method of genetic algorithm and support vector machine for intrusion detection, International Journal of Electrical and Computer Engineering-IJECE, Volume (11), No (1), Year (2021-2)
- Haleh Amintoosi , Masood Niazi Torshiz , Yahya Forghani , Sara Alinejad , An efficient storage-optimizing tick data clustering model, Turkish Journal of Electrical Engineering and Computer Sciences, Volume (28), No (5), Year (2020-9), Pages (2657-2669)
- mahdi nikooghadam , Haleh Amintoosi , sara Kumari , A provably secure ECC-based roaming authentication scheme for global mobility networks, Journal of Information Security and Applications, Volume (54), Year (2020-10), Pages (102588-102600)
- Mohammad Allahbakhsh , Haleh Amintoosi , Behshid Behkamal , Salil S. Kanhere , Elisa Bertino , AQA: An Adaptive Quality Assessment Framework for Online Review Systems, IEEE Transactions on Services Computing, Volume (15), No (3), Year (2020-1), Pages (1486-1497)
- Mohammad Allahbakhsh , Haleh Amintoosi , Alexander Ignjatovic , Elisa Bertino , A Trust-Based Experience-Aware Framework for Integrating Fuzzy Recommendations, IEEE Transactions on Services Computing, Volume (15), No (2), Year (2019-1), Pages (698-709)
- mahdi nikooghadam , Haleh Amintoosi , Secure communication in CloudIoT through design of a lightweight authentication and session key agreement scheme, International Journal of Communication Systems, Volume (36), No (1), Year (2020-2)
- مسعود نیازی ترشیز , Azadeh Salehi Esfaji , Haleh Amintoosi , Enhanced Schemes for Data Fragmentation, Allocation, and Replication in Distributed Database Systems, Computer Systems Science and Engineering, Volume (35), No (2), Year (2020-3), Pages (99-112)
- mahdi nikooghadam , Haleh Amintoosi , Perfect forward secrecy via an ECC-based authentication scheme for SIP in VoIP, Journal of Supercomputing, Volume (76), No (4), Year (2019-11), Pages (3086-3104)
- AHMED HASHIM MURTADHA AL MUSAWI , Haleh Amintoosi , DNS Tunneling Detection Method Based on Multilabel Support Vector Machine, Security and Communication Networks, Volume (2018), No (1), Year (2018-1), Pages (1-9)
- Masood Niazi Torshiz , Haleh Amintoosi , Collusion-resistant Worker Selection in Social Crowdsensing Systems, Journal of Computer and Knowledge Engineering, Volume (1), No (1), Year (2017-2), Pages (9-20)
- Mohammad Hossein Yaghmaee Moghaddam , M. B. Menhaj , Haleh Amintoosi , A fuzzy extension to the blue active queue management algorithm, مهندسی برق و الکترونیک ایران, Volume (1), No (3), Year (2005-2), Pages (3-15)
- Haleh Amintoosi , Salil S. Kanhere , Mohammad Allahbakhsh , Trust-based privacy-aware participant selection in social participatory sensing, Journal of Information Security and Applications, Volume (20), No (1), Year (2015-2), Pages (11-25)
- Haleh Amintoosi , Salil S. Kanhere , A Reputation Framework for Social Participatory Sensing Systems, Mobile Networks and Applications, Volume (19), No (1), Year (2014-2), Pages (88-100)
- Mohammad Hossein Yaghmaee Moghaddam , Mohammad Bagher Menhaj , Haleh Amintoosi , Design and performance evaluation of a fuzzy based traffic conditioner for differentiated services, Computer Networks, Volume (47), No (6), Year (2005-4), Pages (847-869)
مقالات ارایه شده در کنفرانس
فارسی
- مهدیه طالب زاده , هاله امین طوسی , محمد اله بخش , کنترل کیفیت غیرمتمرکز مبتنی بر هوش ترکیبی در سیستمهای مشارکتی برخط , 14th International Conference on Information and Knowledge Technology (IKT) , 2023-12-26
- سید جواد بزرگ زاده رضوی , هاله امین طوسی , محمد اله بخش , ارزیابی میزان شفافیت سؤالات در سامانههای پرسش و پاسخ , بیست و هفتمین کنفرانس بین الملی انجمن کامپیوتر ایران , 2022-02-23
- سیدسالار قاضی , هاله امین طوسی , استخراج ویژگی در سنجش عملکرد ناظرها و بهبود امنیت در بلاکچین زنجیره اعتماد , بیست و ششمین کنفرانس بین المللی انجمن کامپیوتر ایران , 2021-03-02
- مهدی نیکوقدم , هاله امین طوسی , پروتکلی کارامد مبتنی بر رمزنگاری منحنی بیضوی برای ارتباط امن کاربران با خدمات دهنده , چهارمین کنفرانس تکنولوژی در مهندسی برق و کامپیوتر , 2019-05-29
- سروش امیدوار طهرانی , حدیثه مرادی ثانی , بهشید بهکمال , هاله امین طوسی , تحلیل الگوی مصرف انرژی برق در خانه هوشمند با استفاده از سلسله مراتب زمانی , سومین کنفرانس بین المللی اینترنت اشیاء و کاربردها , 2019-04-17
انگلیسی
- Sadegh Sohani , Maliheh Shahryari , Mohammad Allahbakhsh , Haleh Amintoosi , Towards a Standard Framework for Integrating Blockchain with the Internet of Things , 2024 8th International Conference on Smart Cities, Internet of Things and Applications (SCIoT) , 2024-05-14
- فاطمه فرهادی , Mohammad Allahbakhsh , Haleh Amintoosi , Mohammad Ghahri , Decoding MicroRNA Motifs: A Time Series Approach using Hidden Markov Models , 13th International Conference on Computer and Knowledge Engineering (ICCKE 2023) , 2023-11-01
- Haleh Amintoosi , seyed salar ghazi , Improved TrustChain for Lightweight Devices , 12th International Conference on Computer and Knowledge Engineering , 2022-12-15
- Fariba Abedin Zadeh Zare , Haleh Amintoosi , Mohammad Allahbakhsh , An Iterative Model for Quality Assessment in Collaborative Content Generation Systems , The 2nd International Workshop on AI-enabled Process Automation , 2021-11-22
- WUROOD MURAD RAISAN ALSHADOOD , Haleh Amintoosi , موید الوحاح , 2Line Defense Ontology-Based Trust Management Model , 4TH INTERNATIONAL CONFERENCE ON INNOVATIVE COMPUTING AND COMMUNICATION , 2021-02-20
- mahdi nikooghadam , Haleh Amintoosi , نصور باقری , Lightweight Authentication for Remote Healthcare Systems in Cloud-IoT , 10th International Conference on Computer and Knowledge Engineering (ICCKE , 2020-10-29
- Ala Ekramifard , Haleh Amintoosi , Seyed Amin Hosseini Seno , A Systematic Literature Review on Blockchain-based Solutions for IoT Security , The International Conference on Contemporary Issues In Data Science , 2019-03-05
- Haleh Amintoosi , mahdi nikooghadam , A Novel Provably-Secure ECC-based Authentication and Key Management Protocol for Telecare Medical Information Systems , 9th International Conference on Computer and Knowledge Engineering , 2019-10-24
- Haleh Amintoosi , Soroush Omidvartehrani , FUMBOT: Design, Implementation and Detectoin , OIC-CERT 9TH GENERAL MEETING AND ANNUAL CONFERENCE 2018 , 2018-11-26
- Haleh Amintoosi , محمد اله بخش , سلیل کانهیر , الکساندر ایگناتویچ , Trust and Privacy Challenges in Social Participatory Networks , Sixth Australasian Symposium on Service Research and Innovation (ASSRI’17) , 2017-10-19
- Haleh Amintoosi , محمد اله بخش , سلیل کانهیر , A Game-Theoretic Approach to Quality Improvement in Crowdsourcing Tasks , Australian Symposium on Service Research and Innovation , 2017-10-19
- Haleh Amintoosi , milad davari , A Survey on Participant Recruitment in Crowdsensing Systems , 2016 6th International Conference on Computer and Knowledge Engineering (ICCKE) , 2016-10-20
- Haleh Amintoosi , Mohammad Allahbakhsh , Salil S. Kanhere , Masood Niazi Torshiz , Trust Assessment in Social Participatory Networks , 3rd International Conference on Computer and Knowledge Engineering , 2013-10-31
- Haleh Amintoosi , Salil S. Kanhere , Masood Niazi Torshiz , A socially-aware incentive scheme for social participatory sensing , 2015 IEEE Tenth International Conference on Intelligent Sensors, Sensor Networks and Information Processing (ISSNIP) , 2015-05-07
- Haleh Amintoosi , Salil S. Kanhere , Privacy-aware Trust-based Recruitment in Social Participatory Sensing , Mobile and Ubiquitous Systems: Computing, Networking, and Services , 2013-12-02
- Haleh Amintoosi , Salil S. Kanhere , A Trust Framework for Social Participatory Sensing Systems , Mobile and Ubiquitous Systems: Computing, Networking, and Services , 2012-12-12
- Haleh Amintoosi , Salil S. Kanhere , A Trust-Based Recruitment Framework for Multi-hop Social Participatory Sensing , IEEE International Conference on Distributed Computing in Sensor Systems , 2013-05-21