default search action
Mohammad Taheri
This is just a disambiguation page, and is not intended to be the bibliography of an actual person. Any publication listed on this page has not been assigned to an actual author yet. If you know the true author of one of the publications listed below, you are welcome to contact us.
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j25]Fatemeh Khalifeh, Mohammad Taheri, Seyed Mostafa Fakhrahmad, Eghbal G. Mansoori:
Efficient Top-k Keyword Search in Relational Databases Considering Integrated Candidate Network. IEEE Access 12: 173775-173791 (2024) - 2023
- [j24]Mehdi Hassanzadeh, Mohammad Taheri, Sajjad Shokouhyar, Sina Shokoohyar:
Who one is, whom one knows? Evaluating the importance of personal and social characteristics of influential people in social networks. Aslib J. Inf. Manag. 75(6): 1008-1032 (2023) - [j23]Peyman Rahmani, Mohammad Taheri, Seyed Mostafa Fakhrahmad:
A novel secure data outsourcing scheme based on data hiding and secret sharing for relational databases. IET Commun. 17(7): 775-789 (2023) - [j22]Faeze Rasouli, Mohammad Taheri, Reza Rohani Sarvestani:
A Fragile Watermarking by Hamming Code on Distributed Pixels with Perfect Recovery for Small Tampers. ISC Int. J. Inf. Secur. 15(2) (2023) - [j21]Peyman Rahmani, Seyed Mostafa Fakhrahmad, Mohammad Taheri:
Secure data outsourcing based on seed-residual shares and order-shuffling encryption. J. Supercomput. 79(9): 10442-10480 (2023) - 2022
- [j20]S. Hasanzadeh, Seyed Mostafa Fakhrahmad, Mohammad Taheri:
Review-Based Recommender Systems: A Proposed Rating Prediction Scheme Using Word Embedding Representation of Reviews. Comput. J. 65(2): 345-354 (2022) - [j19]Mahdieh Abazar, Peyman Masjedi, Mohammad Taheri:
A Binary Relevance Adaptive Model-Selection for Ensemble Steganalysis. ISC Int. J. Inf. Secur. 14(1): 105-113 (2022) - [j18]Faeze Rasouli, Mohammad Taheri:
Perfect Recovery of Small Tampers Using a Novel Fragile Watermarking Technique Based on Distributed Hamming Code. ISC Int. J. Inf. Secur. 14(2): 147-156 (2022) - [j17]Hossein Taheri, Maria Gonzalez Bocanegra, Mohammad Taheri:
Artificial Intelligence, Machine Learning and Smart Technologies for Nondestructive Evaluation. Sensors 22(11): 4055 (2022) - [j16]Neda Azouji, Ashkan Sami, Mohammad Taheri:
EfficientMask-Net for face authentication in the era of COVID-19 pandemic. Signal Image Video Process. 16(7): 1991-1999 (2022) - [j15]Peyman Rahmani, Seyed Mostafa Fakhrahmad, Mohammad Taheri:
New attacks on secret sharing-based data outsourcing: toward a resistant scheme. J. Supercomput. 78(14): 15749-15785 (2022) - [i1]Aref Hakimzadeh, Koorush Ziarati, Mohammad Taheri:
On Principal Curve-Based Classifiers and Similarity-Based Selective Sampling in Time-Series. CoRR abs/2204.04620 (2022) - 2021
- [j14]Niloofar Rastin, Mansoor Zolghadri Jahromi, Mohammad Taheri:
Feature weighting to tackle label dependencies in multi-label stacking nearest neighbor. Appl. Intell. 51(7): 5200-5218 (2021) - [j13]Neda Azouji, Ashkan Sami, Mohammad Taheri, Henning Müller:
A large margin piecewise linear classifier with fusion of deep features in the diagnosis of COVID-19. Comput. Biol. Medicine 139: 104927 (2021) - [j12]Niloofar Rastin, Mohammad Taheri, Mansoor Zolghadri Jahromi:
A stacking weighted k-Nearest neighbour with thresholding. Inf. Sci. 571: 605-622 (2021) - [j11]Amin Emamzadeh Esmaeili Nejad, Mansoor Zolghadri Jahromi, Mohammad Taheri:
Graph compression based on transitivity for neighborhood query. Inf. Sci. 576: 312-328 (2021) - [j10]Mohammad Reza Zarei, Mohammad Taheri, Yang Long:
Kernelized distance learning for zero-shot recognition. Inf. Sci. 580: 801-818 (2021) - [j9]Niloofar Rastin, Mansoor Zolghadri Jahromi, Mohammad Taheri:
A generalized weighted distance k-Nearest Neighbor for multi-label problems. Pattern Recognit. 114: 107526 (2021) - [c15]Faeze Rasouli, Mohammad Taheri:
A New Fragile Watermarking based on Distributed Hamming Code. CSICC 2021: 1-5 - [c14]Faeze Rasouli, Mohammad Taheri:
A Perfect Recovery for Fragile Watermarking by Hamming Code on Distributed Pixels. ISCISC 2021: 18-22 - 2020
- [b1]Mohammad Taheri:
Multimodal Multisensor attention modelling. Nottingham Trent University, UK, 2020 - [j8]Penelope Jane Standen, David J. Brown, Mohammad Taheri, Maria Jose Galvez Trigo, Helen Boulton, Andrew M. Burton, Madeline Hallewell, James G. Lathe, Nicholas Shopland, Maria A. Blanco Gonzalez, Gosia Malgosia Kwiatkowska, Elena Milli, Stefano Cobello, Annaleda Mazzucato, Marco Traversi, Enrique Hortal:
An evaluation of an adaptive learning system based on multimodal affect recognition for learners with intellectual disabilities. Br. J. Educ. Technol. 51(5): 1748-1765 (2020) - [j7]Morteza Zadkarami, Ali Akbar Safavi, Mohammad Taheri, Fabienne Fariba Salimi:
Data driven leakage diagnosis for oil pipelines: An integrated approach of factor analysis and deep neural network classifier. Trans. Inst. Meas. Control 42(14): 2708-2718 (2020) - [j6]Hamid Darabian, Ali Dehghantanha, Sattar Hashemi, Mohammad Taheri, Amin Azmoodeh, Sajad Homayoun, Kim-Kwang Raymond Choo, Reza M. Parizi:
A multiview learning method for malware threat hunting: windows, IoT and android as case studies. World Wide Web 23(2): 1241-1260 (2020) - [c13]Ahmad Hashemi, Mohammad Reza Zarei, Mohammad Reza Moosavi, Mohammad Taheri:
Fake News Spreader Identification in Twitter using Ensemble Modeling. Notebook for PAN at CLEF 2020. CLEF (Working Notes) 2020 - [c12]Tayebe Abazar, Peyman Masjedi, Mohammad Taheri:
A Binary Relevance Adaptive Model-Selection for Ensemble Steganalysis. ISCISC 2020: 77-81
2010 – 2019
- 2019
- [j5]Joe Sarsfield, David J. Brown, Nasser Sherkat, Caroline S. Langensiepen, James Lewis, Mohammad Taheri, Christopher McCollin, Cleveland Thomas Barnett, Louise Selwood, Penny J. Standen, Pip Logan, Christopher Simcox, Catherine Killick, Emma Hughes:
Clinical assessment of depth sensor based pose estimation algorithms for technology supervised rehabilitation applications. Int. J. Medical Informatics 121: 30-38 (2019) - [c11]Mohammad Taheri, Arash Pourdamghani, Mohsen Lesani:
Polynomial-Time Fence Insertion for Structured Programs. DISC 2019: 34:1-34:17 - 2018
- [c10]Kaveh Bazargan, Ali Rezaeian, Mohammad Taheri:
Theory and Practice of Social Innovation to Support Open ICT Ecosystems for Improved User Experience: The Case of UDRC. HCI (23) 2018: 563-576 - 2017
- [c9]Mohammad Taheri, Dheeman Saha, Gary Hatfield, Emmanuel Byamukama, Sung Y. Shin:
Applied Statistical Model and Remote Sensing for Decision Management System for Soybean. RACS 2017: 11-14 - [c8]Ji Young Lee, Jin Yeong Mun, Mohammad Taheri, Seong-Ho Son, Sung Y. Shin:
Vessel Segmentation Model using Automated Threshold Algorithm from Lower Leg MRI. RACS 2017: 120-125 - 2016
- [c7]Sina Famouri, Sattar Hashemi, Mohammad Taheri:
Artificial Prediction Markets for Clustering. Australasian Conference on Artificial Intelligence 2016: 365-377 - [c6]Mohammad Taheri, George Hamer, Seong-Ho Son, Sung Y. Shin:
Enhanced Breast Cancer Classification with Automatic Thresholding Using SVM and Harris Corner Detection. RACS 2016: 56-60 - [c5]Mohammad Taheri, George Hamer, Seong-Ho Son, Sung Y. Shin:
Automated Single and Multi-Breast Tumor Segmentation Using Improved Watershed Technique in 2D MRI Images. RACS 2016: 61-66 - 2015
- [j4]Mahmoud Famouri, Mohammad Taheri, Zohreh Azimifar:
Fast Linear SVM Validation Based on Early Stopping in Iterative Learning. Int. J. Pattern Recognit. Artif. Intell. 29(8): 1551013:1-1551013:20 (2015) - 2014
- [j3]Mohammad Taheri, Mansoor Zolghadri Jahromi:
Study on equality conditions of fuzzy rule-based classification systems to radial basis functions, SVM and nearest neighbor classifiers. J. Intell. Fuzzy Syst. 27(4): 1923-1934 (2014)
2000 – 2009
- 2009
- [j2]Delaram Jarchi, Reza Boostani, Mohammad Taheri, Saeid Sanei:
Seizure source localization using a hybrid second order blind identification and extended rival penalized competitive learning algorithm. Biomed. Signal Process. Control. 4(2): 108-117 (2009) - 2008
- [j1]Mansoor Zolghadri Jahromi, Mohammad Taheri:
A proposed method for learning rule weights in fuzzy rule-based classification systems. Fuzzy Sets Syst. 159(4): 449-459 (2008) - [c4]Elham Parvinnia, Mohammad Taheri, Koorush Ziarati:
An Improved Longest Common Subsequence Algorithm for Reducing Memory Complexity in Global Alignment of DNA Sequences. BMEI (1) 2008: 57-61 - [c3]Mohammad Taheri, Elham Chitsaz, Seraj D. Katebi, Mansoor Zolghadri Jahromi:
A Novel Piecewise Linear Clustering Technique Based on Hyper Plane Adjustment. CSICC 2008: 1-8 - [c2]Elham Chitsaz, Mohammad Taheri, Seraj D. Katebi:
Feature Selection of Gene Expression Data Based on Fuzzy Attribute Clustering. World Congress on Engineering (Selected Papers) 2008: 717-726 - 2007
- [c1]Mohammad Taheri, Reza Boostani:
Novel Auxiliary Techniques in Clustering. World Congress on Engineering 2007: 243-248
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-12 21:59 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint