Selected Publications
Journal
Papers | Conference Papers | Book Chapters
Refereed Journal Articles
1.
|
Jolfaei, A. and
Kant, K. 2020. On the Silent Perturbation of State Estimation in
Smart Grid, IEEE Transactions on Industry Applications, 56, 4, 4405-4414.
|
2.
|
Pal, A., Jolfaei A.,
and Kant, K. 2020. A Fast Prekeying Based
Integrity Protection for Smart Grid Communications, IEEE Transactions
on Industrial Informatics, doi:
10.1109/TII.2020.3030799.
|
3.
|
A. Pal and A.
Jolfaei 2020. On the Lifetime of Asynchronous Software-Defined
Wireless Sensor Networks, IEEE Internet of Things Journal, 7, 7, 6069-6077.
|
4.
|
Mehrabi, M.A., Doche,
C., and A. Jolfaei, 2020. Elliptic Curve Cryptography Point Multiplication Core
for Hardware Security Module, IEEE Transactions on Computers, 69, 11,
1707-1718.
|
5.
|
Mehrabi, M.A., Mukhtar,
N., and Jolfaei, A. 2020. Power Side-Channel Analysis of RNS GLV ECC Using Machine
and Deep Learning Algorithms, ACM Transactions on Internet Technology.
|
6.
|
Ghane, S., Jolfaei,
A., Kulik, L., Ramamohanarao,
K., and Puthal, D. 2020. Preserving
Privacy in the Internet of Connected Vehicles, IEEE Transactions on
Intelligent Transportation Systems, 69, 11, 1707-1718.
|
7.
|
Farivar, F., Haghighi,
M.S., Jolfaei, A., and Wen, S. 2020. On the Security of Networked Control
Systems in Smart Vehicle and its Adaptive Cruise Control, IEEE
Transactions on Intelligent Transportation Systems.
|
8.
|
Jolfaei, A. and
Kant, K. 2019. A Lightweight Integrity Protection Scheme for Low Latency
Smart Grid Applications, Computers & Security, 86, 471-483.
|
9.
|
Jolfaei, A., Wu,
X., and Muthukkumarasamy, V. 2016. On
the Security of Permutation-Only Image Encryption Schemes, IEEE
Transactions on Information Forensics and Security, 11, 1.
|
10.
|
Jolfaei, A., Wu,
X., and Muthukkumarasamy, V. 2015. A 3D
Object Encryption Scheme Which Maintains Dimensional and Spatial
Stability, IEEE Transactions on Information Forensics and Security,
10, 2, 409-422.
|
Refereed Conference
Proceedings
11.
|
Połap, D., Srivastava, G.,
Jolfaei, A., and Parizi, R.M. 2020. Blockchain
Technology and Neural Networks for the Internet of Medical Things, In Proceedings
of IEEE INFOCOM 2020, Toronto, ON, Canada, 508-513.
|
12.
|
Jolfaei, A. and
Kant, K. 2019. Data Security in Multiparty Edge Computing
Environments, In Proceedings of the GOMACTech
Conference, Artificial Intelligence & Cyber Security: Challenges and
Opportunities for the Government, Albuquerque, NM, USA.
|
13.
|
Burke, W., Oseni,
T., Jolfaei, A., Gondal, I. 2019. Cybersecurity Indexes for eHealth,
In Proceedings of the 12th Australasian Conference on Health
Informatics and Knowledge Management, Macquarie, NSW, Australia,
article no. 17.
|
14.
|
Jaffar, I. Usman,
M., and Jolfaei, A. 2019. Security Hardening for Implantable Cardioverter
Defibrillators, In Proceedings of the 20th IEEE International
Conference on Industrial Technology, Melbourne, Australia.
|
15.
|
Farivar, F.,
Haghighi, M.S., Barchinezhad, S., and Jolfaei,
A. 2019. Detection and Compensation of Covert Service-Degrading
Intrusions in Cyber Physical Systems through Intelligent Adaptive
Control, In Proceedings of the 20th IEEE International Conference on
Industrial Technology, Melbourne, Australia.
|
16.
|
Ur-Rehman, A.,
Gondal, I., Kamruzzaman, J., and Jolfaei, A. 2019.
Vulnerability Modelling for Hybrid IT Systems, In Proceedings of the
20th IEEE International Conference on Industrial Technology,
Melbourne, Australia.
|
17.
|
Ostovari, P., Wu,
J., and Jolfaei, A. 2018. Data Exchange in Delay Tolerant Networks using Joint
Inter- and Intra-Flow Network Coding, In Proceedings of the 37th IEEE
International Performance Computing and Communications Conference,
Orlando, FL, USA.
|
18.
|
Jolfaei, A. and
Kant, K. 2017. A Lightweight Integrity Protection Scheme for Fast
Communications in Smart Grid, In Proceedings of the 14th International
Conference on Security and Cryptography, Lecture Notes in Computer
Science, Madrid, Spain, 31--42.
|
19.
|
Jolfaei, A., Wu,
X., and Muthukkumarasamy, V. 2015. A
Secure Lightweight Texture Encryption Scheme, In Proceedings of the
7th Pacific-Rim Symposium on Image and Video Technology (PSIVT),
Auckland, New Zealand, November 2015.
|
20.
|
Jolfaei, A., Wu,
X., and Muthukkumarasamy, V. 2013. On
the Feasibility and Performance of Pass-thought Authentication Systems.
In Proceedings of the 2013 4th Emerging Security Technologies (EST
2013), Cambridge, England, 33-38.
|
Book Chapters:
21.
|
Kumar,
S., Islam, S., and Jolfaei, A. 2019. Microgrid Communications – Protocols
and Standards, In Variability, Scalability, and Stability of Microgrid,
Eds. S.M. Muyeen and S. Islam, IET Book Series on Control, Robotics &
Sensors, IET.
|
22.
|
R, V., Alazab, M.,
Jolfaei, A. KP, S. and Poornachandran, P. 2019. DeepBotDetect (DBD): Detecting Domain Generation
Algorithms with Deep Learning, In Deep Learning Applications for Cyber
Security, Eds. M. Alazab and M.J. Tang, Advanced Sciences and
Technologies for Security Applications, Springer.
|
Number of citations per year (updated 06/12/2020)
12 |
25 |
39 |
46 |
60 |
68 |
50 |
66 |
80 |
145 |
324 |
|
2010 |
2011 |
2012 |
2013 |
2014 |
2015 |
2016 |
2017 |
2018 |
2019 |
2020 |
|