HOME   PUBLICATIONS  AWARDS AND HONORS   TEACHING   SERVICE         


 

 

 

Scientometrics

h-index = 9

i-index = 9

Google Scholar

DBLP

Collaboration Distance

Publication List

  

Publications

Journal Papers | Conference Papers | Poster Papers| Book Chapters

 

Refereed Journal Articles:

1.                   

Jolfaei, A. and Kant, K. 2018. A Lightweight Integrity Protection Scheme for Low Latency Smart Grid Applications, Computers & Security, Elsevier, October 2018.

2.                   

Jolfaei, A., Wu, X., and Muthukkumarasamy, V. 2016. On the Security of Permutation-Only Image Encryption Schemes, IEEE Transactions on Information Forensics and Security, 11, 1.

3.                   

Jolfaei, A., Wu, X., and Muthukkumarasamy, V. 2015. A 3D Object Encryption Scheme Which Maintains Dimensional and Spatial Stability, IEEE Transactions on Information Forensics and Security, 10, 2, 409-422.

4.                   

Jolfaei, A., Matinfar, A., and Mirghadri, A. 2015. Preserving the Confidentiality of Digital Images Using a Chaotic Encryption Scheme. International Journal of Electronic Security and Digital Forensics (IJESDF), 7, 3, 258-277.

5.                   

Jolfaei, A., Wu, X., and Muthukkumarasamy, V. 2014. Comments on the security of Diffusion-substitution based gray image encryption scheme. Digital Signal Processing, 32, 34-36.

6.                   

Jolfaei, A., Vizandan, A., and Mirghadri, A. 2012. Image Encryption Using HC-128 and HC-256 Stream Ciphers. International Journal of Electronic Security and Digital Forensics (IJESDF), 4, 1, 19-42.

7.                   

Jolfaei, A., Mirghadri, A., and Vizandan, A. 2012. Impact of Rotations in Salsa20/8 Image Encryption Scheme. International Journal of Computer Theory and Engineering, 4, 6, 938-943.

8.                   

Jolfaei, A., and Mirghadri, A. 2011. Image Encryption Using Chaos and Block Cipher. Computer and Information Science, 4, 1, 172-185.

9.                   

Jolfaei, A., and Mirghadri, A. 2011. Substitution-Permutation Based Image Cipher Using Chaotic Henon and Baker's Maps. International Review of Computers and Software (IRECOS), 6, 1, 40-54.

10.               

Mirghadri, A., Jolfaei, A. 2011. A Novel Image Encryption Scheme Using Chaotic Maps. The Scientific Journal of Passive Defence Science and Technology, 2, 2, 111-124

11.               

Jolfaei, A., and Mirghadri, A. 2010. An Image Encryption Approach Using Chaos and Stream Cipher. Journal of Theoretical and Applied Information Technology, 19, 2, 117-125.

12.               

Jolfaei, A., and Mirghadri, A. 2010. Survey: Image Encryption Using Salsa20. International Journal of Computer Science Issues, 7, 5, 213-220.

13.               

Jolfaei, A., and Mirghadri, A. 2010. Survey: Image Encryption Using A5/1 and W7. Journal of Computing, 2, 8.

14.               

Jolfaei, A., and Mirghadri, A. 2010. A New Approach to Measure Quality of Image Encryption. International Journal of Computer and Network Security, 2, 8, 38-44.

15.               

Jolfaei, A. 2011. Fabricating a Simulator for Neuron Cell's Action Potential. The Scientific Journal of Passive Defence Science and Technology, 1, 2, 13-23.

 

Fully Refereed Conference Proceedings (oral presentations):

16.               

Jolfaei, A. and Kant, K. 2019. Data Security in Multiparty Edge Computing Environments, In Proceedings of the GOMACTech Conference, Artificial Intelligence & Cyber Security: Challenges and Opportunities for the Government, Albuquerque, NM, USA.

17.               

Burke, W., Oseni, T., Jolfaei, A., Gondal, I. 2019. Cybersecurity Indexes for eHealth, In Proceedings of the 12th Australasian Conference on Health Informatics and Knowledge Management, Macquarie, NSW, Australia, article no. 17.

18.               

Jaffar, I. Usman, M., and Jolfaei, A. 2019. Security Hardening for Implantable Cardioverter Defibrillators, In Proceedings of the 20th IEEE International Conference on Industrial Technology, Melbourne, Australia.

19.               

Farivar, F., Haghighi, M.S., Barchinezhad, S., and Jolfaei, A. 2019. Detection and Compensation of Covert Service-Degrading Intrusions in Cyber Physical Systems through Intelligent Adaptive Control, In Proceedings of the 20th IEEE International Conference on Industrial Technology, Melbourne, Australia.

20.               

Ur-Rehman, A., Gondal, I., Kamruzzaman, J., and Jolfaei, A. 2019. Vulnerability Modelling for Hybrid IT Systems, In Proceedings of the 20th IEEE International Conference on Industrial Technology, Melbourne, Australia.

21.               

Ahmad, U., Song, H., Bilal, A., Alazab, M., and Jolfaei, A. 2018. Secure Passive Keyless Entry and Start System Using Machine Learning, In Proceedings of the International Conference on Security, Privacy and Anonymity in Computation, Communication and Storage, Melbourne, Australia, 304--313.

22.               

R, V., Alazab, M., Jolfaei, A., KP, S. and Poornachandran, P. 2018. Ransomware Triage Using Deep Learning: Twitter as a Case Study, In Proceedings of the International conference on cyber security and communication systems, Melbourne, Australia.

23.               

Ostovari, P., Wu, J., and Jolfaei, A. 2018. Data Exchange in Delay Tolerant Networks using Joint Inter- and Intra-Flow Network Coding, In Proceedings of the 37th IEEE International Performance Computing and Communications Conference, Orlando, FL, USA.

24.               

Jolfaei, A. and Kant, K. 2017. A Lightweight Integrity Protection Scheme for Fast Communications in Smart Grid, In Proceedings of the 14th International Conference on Security and Cryptography, Lecture Notes in Computer Science, Madrid, Spain, 31--42.

25.               

Jolfaei, A., Wu, X., and Muthukkumarasamy, V. 2015. A Secure Lightweight Texture Encryption Scheme, In Proceedings of the 7th Pacific-Rim Symposium on Image and Video Technology (PSIVT), Auckland, New Zealand, November 2015.

26.               

Jolfaei, A., Wu, X., and Muthukkumarasamy, V. 2013. On the Feasibility and Performance of Pass-thought Authentication Systems. In Proceedings of the 2013 4th Emerging Security Technologies (EST 2013), Cambridge, England, 33-38.

27.               

Jolfaei, A., Mirghadri, A., and Vizandan, A. 2011. Impact of Rotations in Salsa20/8 Image Encryption Scheme. In Proceedings of the 2011 4th IEEE International Conference on Computer Science and Information Technology (ICCSIT 2011), Chengdu, China, 351-357.

28.               

Mohammadi, S.A., Amoozegar, S., Jolfaei, A., and Mirghadri, A. 2011. Enhanced Adaptive Bandwidth Tracking Using Mean Shift Algorithm. In Proceedings of the 2011 International Conference on Computer and Network Engineering (ICCNE 2011), Zhengzhou, China, 494-498.

29.               

Jolfaei, A., and Mirghadri, A. 2010. An Applied Imagery Encryption Algorithm Based on Shuffling and Baker's Map. In Proceedings of the 2010 International Conference on Artificial Intelligence and Pattern Recognition (AIPR-10), Florida, USA, 279-285.

30.               

Jolfaei, A., and Mirghadri, A. 2010. A Novel Image Encryption Scheme Using Pixel Shuffler and A5/1. In Proceedings of the 2010 International Conference on Artificial Intelligence and Computational Intelligence (AICI 2010), Sanya, China.

31.               

Jolfaei, A., Mirghadri, A., Madadi, B., and Naderi, G. 2010. Internal Optical Wireless Communication System. In Proceedings of The first student conference on electrical region of research achievements, Kazeroun, Iran, Apr. 15.

32.               

Jolfaei, A., Mirghadri, A., and Madadi, B. 2010. Application of Semiconductor Lasers in Optical Communication Systems. In Proceedings of The first student conference on electrical region of research achievements, Kazeroun, Iran, Apr. 15.

33.               

Moharamzadeh, N., Jolfaei, A., and Haghani, N. 2010. Presenting a New Method in Designing a Dual Channel Electromyography with Motion Classifying Capability Using Fuzzy Logic. In Proceedings of The first student conference on electrical region of research achievements, Kazeroun, Iran, Apr. 15.

34.               

Madadi, B., Jolfaei, A., Attaran, A., and Nikan, S. 2010. An Optimum Routing Method in Ad Hoc Networks. In Proceedings of The 15th national computer conference, Feb, Tehran, Iran.

35.               

Jolfaei, A., Moharamzadeh, N., and Haghani, N. 2010. Assessment of Blood Glucose and Pregnancy Using Diagnostic Tests Strips and MATLAB. In Proceedings of The 13th Iranian Student Conference on Electrical Engineering, Tehran, Iran, Sep. 15-17.

36.               

Jolfaei, A., and Mirghadri, A. 2010. A New Classification in Measurement Methods of Image Encryption Quality. In Proceedings of the 2010 International Conference on Intelligent Network and Computing (ICINC 2010), Kuala Lumpur, Malaysia.

37.               

Jolfaei, A. 2010. Presenting a New Method in Analyzing Cellular Electrophysiology Using Microcontroller. In Proceedings of The first national congress on novel technologies in engineering sciences, Mashhad, Iran, May 20.

 

Fully Refereed Conference Proceedings (poster presentations):

38.               

Jolfaei, A., Wu, X., and Muthukkumarasamy, V. 2015. A 3D Object Encryption Scheme Which Maintains Dimensional and Spatial Stability, In Proceedings of the 7th IEEE International Workshop on Information Forensics and Security (WIFS), Rome, Italy, November 2015.

39.               

Jolfaei, A., Wu, X., and Muthukkumarasamy, V. 2015. 3D Content Encryption in Augmented Reality, IEEE 30 years celebration event, IEEE Queensland Section, University of Queensland, Brisbane, Australia, February 2015.

 

Book Chapters:

40.               

Kumar, S., Islam, S., and Jolfaei, A. 2019. Microgrid Communications Protocols and Standards, In Variability, Scalability, and Stability of Microgrid, Eds. S.M. Muyeen and S. Islam, IET Book Series on Control, Robotics & Sensors, IET.

41.               

R, V., Alazab, M., Jolfaei, A. KP, S. and Poornachandran, P. 2019. DeepBotDetect (DBD): Detecting Domain Generation Algorithms with Deep Learning, In Deep Learning Applications for Cyber Security, Eds. M. Alazab and M.J. Tang, Advanced Sciences and Technologies for Security Applications, Springer.

back to top