default search action
Mazdak Zamani
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j11]Xingsi Xue, Achyut Shankar, Francesco Flammini, Mazdak Zamani:
Similarity Feature Construction for Semantic Sensor Ontology Integration via Light Genetic Programming. IEEE Internet Things J. 11(21): 34202-34214 (2024) - 2022
- [j10]Urmila Pilania, Rohit Tanwar, Mazdak Zamani, Azizah Abdul Manaf:
Framework for Video Steganography Using Integer Wavelet Transform and JPEG Compression. Future Internet 14(9): 254 (2022) - [c12]Farnaz Arab, Mazdak Zamani, Sasan Karamizadeh, Mojtaba Alizadeh, Saman Shojae Chaeikar, Touraj Khodadadi:
Comparison of Data Hiding Techniques for Video Watermarking Applications. ICCCS 2022: 168-173
2010 – 2019
- 2019
- [j9]Rohit Tanwar, Kulvinder Singh, Mazdak Zamani, Amit Verma, Prashant Kumar:
An Optimized Approach for Secure Data Transmission Using Spread Spectrum Audio Steganography, Chaos Theory, and Social Impact Theory Optimizer. J. Comput. Networks Commun. 2019: 5124364:1-5124364:10 (2019) - [j8]Sanaz Kavianpour, Bharanidharan Shanmugam, Sami Azam, Mazdak Zamani, Ganthan Narayana Samy, Friso De Boer:
A Systematic Literature Review of Authentication in Internet of Things for Heterogeneous Devices. J. Comput. Networks Commun. 2019: 5747136:1-5747136:14 (2019) - 2018
- [j7]Saman Shojae Chaeikar, Mazdak Zamani, Azizah Bt Abdul Manaf, Akram M. Zeki:
PSW statistical LSB image steganalysis. Multim. Tools Appl. 77(1): 805-835 (2018) - 2017
- [c11]Mojtaba Alizadeh, Mohammad Hesam Tadayon, Kouichi Sakurai, Sabariah Baharun, Hiroaki Anada, Mazdak Zamani, Akram M. Zeki, Shehzad Ashraf Chaudhry, Muhammad Khurram Khan:
Comments and improvements of "HOTA: Handover optimized ticket-based authentication in network-based mobility management". ICIN 2017: 112-116 - 2016
- [j6]Mazdak Zamani, Isao Echizen, Arash Habibi Lashkari:
Innovations in Communications Security. J. Electr. Comput. Eng. 2016: 4743084:1 (2016) - [j5]Mojtaba Alizadeh, Saeid Abolfazli, Mazdak Zamani, Sabariah Baharun, Kouichi Sakurai:
Authentication in mobile cloud computing: A survey. J. Netw. Comput. Appl. 61: 59-80 (2016) - [j4]Farnaz Arab, Shahidan M. Abdullah, Siti Zaiton Mohd Hashim, Azizah Abdul Manaf, Mazdak Zamani:
A robust video watermarking technique for the tamper detection of surveillance systems. Multim. Tools Appl. 75(18): 10855-10885 (2016) - 2015
- [j3]Farzad Kiani, Ehsan Amiri, Mazdak Zamani, Touraj Khodadadi, Azizah Abdul Manaf:
Efficient Intelligent Energy Routing Protocol in Wireless Sensor Networks. Int. J. Distributed Sens. Networks 11: 618072:1-618072:13 (2015) - [j2]Mazdak Zamani, Azizah Bt Abdul Manaf:
Genetic algorithm for fragile audio watermarking. Telecommun. Syst. 59(3): 291-304 (2015) - 2014
- [j1]Ehsan Amiri, Hassan Keshavarz, Mojtaba Alizadeh, Mazdak Zamani, Touraj Khodadadi:
Energy Efficient Routing in Wireless Sensor Networks Based on Fuzzy Ant Colony Optimization. Int. J. Distributed Sens. Networks 10 (2014) - 2013
- [c10]Alaa A. Jabbar, Shahrin bin Sahib, Mazdak Zamani:
Correlation Analysis of the Four Photo Themes in Five Layers. GRMSE (1) 2013: 211-222 - [c9]Alaa A. Jabbar, Shahrin bin Sahib, Mazdak Zamani:
Pixel Correlation Behavior in Different Themes. GRMSE (1) 2013: 223-234 - 2012
- [c8]Somayeh Nikbakhsh, Azizah Bt Abdul Manaf, Mazdak Zamani, Maziar Janbeglou:
A Novel Approach for Rogue Access Point Detection on the Client-Side. AINA Workshops 2012: 684-687 - [c7]Eghbal Ghazizadeh, Mazdak Zamani, Jamalul-lail Ab Manan, Abolghasem Pashang:
A survey on security issues of federated identity in the cloud computing. CloudCom 2012: 532-565 - [c6]Eghbal Ghazizadeh, Mazdak Zamani, Jamalul-lail Ab Manan, Reza Khaleghparast, Ali Taherian:
A trust based model for federated identity architecture to mitigate identity theft. ICITST 2012: 376-381 - 2010
- [c5]Mazdak Zamani, Azizah Bt Abdul Manaf, Rabiah Bt Ahmad, Farhang Jaryani, Saman Shojae Chaeikar, Hossein Rouhani Zeidanloo:
Genetic Audio Watermarking. BAIP 2010: 514-517 - [c4]Shahidan M. Abdullah, Azizah A. Manaf, Mazdak Zamani:
Capacity and quality improvement in reversible image watermarking approach. NCM 2010: 81-85
2000 – 2009
- 2009
- [c3]Mazdak Zamani, Azizah Bt Abdul Manaf, Rabiah Bt Ahmad, Akram M. Zeki, Pritheega Magalingam:
A Novel Approach for Audio Watermarking. IAS 2009: 83-86 - [c2]Mazdak Zamani, Azizah Bt Abdul Manaf, Rabiah Bt Ahmad, Akram M. Zeki, Shahidan M. Abdullah:
Genetic Algorithm as an Approach to Resolve the Problems of Substitution Techniques of Audio Steganography. GEM 2009: 170-175 - [c1]Mazdak Zamani, Azizah Bt Abdul Manaf, Rabiah Bt Ahmad, Farhang Jaryani, Hamed Taherdoost, Akram M. Zeki:
A secure audio steganography approach. ICITST 2009: 1-6
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-02 22:32 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint