Ali Miri
Ali Miri
Professor of Computer Science, Ryerson University
Vahvistettu sähköpostiosoite verkkotunnuksessa ryerson.ca
Nimike
Viittaukset
Viittaukset
Vuosi
An intrusion detection system for wireless sensor networks
I Onat, A Miri
WiMob'2005), IEEE International Conference on Wireless And Mobile Computing …, 2005
3532005
An end-to-end QoS mapping approach for cloud service selection
R Karim, C Ding, A Miri
2013 IEEE ninth world congress on services, 341-348, 2013
1262013
Iterative Boolean combination of classifiers in the ROC space: An application to anomaly detection with HMMs
W Khreich, E Granger, A Miri, R Sabourin
Pattern Recognition 43 (8), 2732-2752, 2010
1232010
A survey of techniques for incremental learning of HMM parameters
W Khreich, E Granger, A Miri, R Sabourin
Information Sciences 197, 105-130, 2012
1132012
System and method for location-based financial transaction authentication
B Malek, A Miri
US Patent App. 14/443,168, 2015
992015
Area-efficient FIR filter design on FPGAs using distributed arithmetic
P Longa, A Miri
2006 IEEE International Symposium on Signal Processing and Information …, 2006
972006
Fast and flexible elliptic curve point arithmetic over prime fields
P Longa, A Miri
IEEE Transactions on computers 57 (3), 289-302, 2008
912008
Accelerating the scalar multiplication on elliptic curve cryptosystems over prime fields
P Longa
University of Ottawa (Canada), 2007
78*2007
Location privacy and anonymity preserving routing for wireless sensor networks
AA Nezhad, A Miri, D Makrakis
Computer Networks 52 (18), 3433-3452, 2008
742008
Adaptive ROC-based ensembles of HMMs applied to anomaly detection
W Khreich, E Granger, A Miri, R Sabourin
Pattern Recognition 45 (1), 208-230, 2012
692012
New composite operations and precomputation scheme for elliptic curve cryptosystems over prime fields
P Longa, A Miri
International Workshop on Public Key Cryptography, 229-247, 2008
692008
Privacy-preserving back-propagation and extreme learning machine algorithms
S Samet, A Miri
Data & Knowledge Engineering 79, 40-61, 2012
652012
An improved visual cryptography scheme for secret hiding
R Youmaran, A Adler, A Miri
23rd Biennial Symposium on Communications, 2006, 340-343, 2006
592006
On the memory complexity of the forward–backward algorithm
W Khreich, E Granger, A Miri, R Sabourin
Pattern Recognition Letters 31 (2), 91-99, 2010
552010
Privacy preserving ID3 using Gini index over horizontally partitioned data
S Samet, A Miri
2008 IEEE/ACS International Conference on Computer Systems and Applications …, 2008
522008
Fractal analysis of surface electromyography signals: a novel power spectrum-based method
M Talebinejad, ADC Chan, A Miri, RM Dansereau
Journal of electromyography and kinesiology 19 (5), 840-850, 2009
512009
Efficient identity-based security schemes for ad hoc network routing protocols
M Bohio, A Miri
Ad Hoc Networks 2 (3), 309-317, 2004
492004
A collusion attack on the fuzzy vault scheme.
HT Poon, A Miri
ISeCure 1 (1), 27-34, 2009
482009
A real-time node-based traffic anomaly detection algorithm for wireless sensor networks
I Onat, A Miri
2005 Systems Communications (ICW'05, ICHSN'05, ICMCS'05, SENET'05), 422-427, 2005
472005
Combining attribute-based and access systems
B Malek, A Miri
2009 International Conference on Computational Science and Engineering 3 …, 2009
462009
Järjestelmä ei voi suorittaa toimenpidettä nyt. Yritä myöhemmin uudelleen.
Artikkelit 1–20