


default search action
BibTeX records: Mehdi Yousefi
@article{DBLP:journals/access/GhashghaeiEQAY25,
author = {Farshad Rahimi Ghashghaei and
Nebrase Elmrabit and
Ayyaz{-}Ul{-}Haq Qureshi and
Adnan Akhunzada and
Mehdi Yousefi},
title = {Advanced Quantum Control With Ensemble Reinforcement Learning: {A}
Case Study on the {XY} Spin Chain},
journal = {{IEEE} Access},
volume = {13},
pages = {49514--49526},
year = {2025}
}
@article{DBLP:journals/computers/GhashghaeiAEY25,
author = {Farshad Rahimi Ghashghaei and
Yussuf Ahmed and
Nebrase Elmrabit and
Mehdi Yousefi},
title = {Correction: Ghashghaei et al. Enhancing the Security of Classical
Communication with Post-Quantum Authenticated-Encryption Schemes for
the Quantum Key Distribution. Computers 2024, 13, 163},
journal = {Comput.},
volume = {14},
number = {2},
pages = {64},
year = {2025}
}
@article{DBLP:journals/access/JinGEAY24,
author = {Hyo Jung Jin and
Farshad Rahimi Ghashghaei and
Nebrase Elmrabit and
Yussuf Ahmed and
Mehdi Yousefi},
title = {Enhancing Sniffing Detection in IoT Home Wi-Fi Networks: An Ensemble
Learning Approach With Network Monitoring System {(NMS)}},
journal = {{IEEE} Access},
volume = {12},
pages = {86840--86853},
year = {2024}
}
@article{DBLP:journals/computers/GhashghaeiAEY24,
author = {Farshad Rahimi Ghashghaei and
Yussuf Ahmed and
Nebrase Elmrabit and
Mehdi Yousefi},
title = {Enhancing the Security of Classical Communication with Post-Quantum
Authenticated-Encryption Schemes for the Quantum Key Distribution},
journal = {Comput.},
volume = {13},
number = {7},
pages = {163},
year = {2024}
}
@article{DBLP:journals/corr/abs-2404-09052,
author = {Yussuf Ahmed and
Micheal Ezealor and
Haitham H. Mahmoud and
Muhammad Ajmal Azad and
Mohamed Ben Farah and
Mehdi Yousefi},
title = {Enhancing Security Awareness Through Gamified Approaches},
journal = {CoRR},
volume = {abs/2404.09052},
year = {2024}
}
@article{DBLP:journals/computers/AbdulghaffarEY23,
author = {Khaled Abdulghaffar and
Nebrase Elmrabit and
Mehdi Yousefi},
title = {Enhancing Web Application Security through Automated Penetration Testing
with Multiple Vulnerability Scanners},
journal = {Comput.},
volume = {12},
number = {11},
pages = {235},
year = {2023}
}
@article{DBLP:journals/aci/FazaeliKVYASM21,
author = {Somayeh Fazaeli and
Taleb Khodaveisi and
Ali Khorsand Vakilzadeh and
Mehdi Yousefi and
Atousa Ariafar and
Mohsen Shokoohizadeh and
Saeed Mohammad{-}Pour},
title = {Development, Implementation, and User Evaluation of {COVID-19} Dashboard
in a Third-Level Hospital in Iran},
journal = {Appl. Clin. Inform.},
volume = {12},
number = {5},
pages = {1091--1100},
year = {2021}
}
@article{DBLP:journals/computers/QureshiLYAM20,
author = {Ayyaz{-}Ul{-}Haq Qureshi and
Hadi Larijani and
Mehdi Yousefi and
Ahsan Adeel and
Nhamoinesu Mtetwa},
title = {An Adversarial Approach for Intrusion Detection Systems Using Jacobian
Saliency Map Attacks {(JSMA)} Algorithm},
journal = {Comput.},
volume = {9},
number = {3},
pages = {58},
year = {2020}
}
@inproceedings{DBLP:conf/ijcnn/QureshiLMYJ20,
author = {Ayyaz{-}Ul{-}Haq Qureshi and
Hadi Larijani and
Nhamoinesu Mtetwa and
Mehdi Yousefi and
Abbas Javed},
title = {An Adversarial Attack Detection Paradigm With Swarm Optimization},
booktitle = {{IJCNN}},
pages = {1--7},
publisher = {{IEEE}},
year = {2020}
}
@inproceedings{DBLP:conf/ucet/HosseinzadehRYC20,
author = {Salaheddin Hosseinzadeh and
Naeem Ramzan and
Mehdi Yousefi and
Krystyna Curtis and
Hadi Larijani},
title = {Impact of Spreading Factor on LoRaWAN Propagation in a Metropolitan
Environment},
booktitle = {{UCET}},
pages = {1--4},
publisher = {{IEEE}},
year = {2020}
}
@inproceedings{DBLP:conf/trustcom/YousefiMZT18,
author = {Mehdi Yousefi and
Nhamo Mtetwa and
Yan Zhang and
Huaglory Tianfield},
title = {A Reinforcement Learning Approach for Attack Graph Analysis},
booktitle = {TrustCom/BigDataSE},
pages = {212--217},
publisher = {{IEEE}},
year = {2018}
}
@inproceedings{DBLP:conf/isi/YousefiMZT17,
author = {Mehdi Yousefi and
Nhamo Mtetwa and
Yan Zhang and
Huaglory Tianfield},
title = {A novel approach for analysis of attack graph},
booktitle = {{ISI}},
pages = {7--12},
publisher = {{IEEE}},
year = {2017}
}
@article{DBLP:journals/amc/MaleknejadYN07,
author = {Khosrow Maleknejad and
Mehdi Yousefi and
Kazem Nouri},
title = {Computational methods for integrals involving functions and Daubechies
wavelets},
journal = {Appl. Math. Comput.},
volume = {189},
number = {2},
pages = {1828--1840},
year = {2007}
}
@article{DBLP:journals/amc/MaleknejadNY07,
author = {Khosrow Maleknejad and
Kazem Nouri and
Mehdi Yousefi},
title = {Discussion on convergence of Legendre polynomial for numerical solution
of integral equations},
journal = {Appl. Math. Comput.},
volume = {193},
number = {2},
pages = {335--339},
year = {2007}
}
@article{DBLP:journals/amc/MaleknejadY06,
author = {Khosrow Maleknejad and
Mehdi Yousefi},
title = {Numerical solution of the integral equation of the second kind by
using wavelet bases of Hermite cubic splines},
journal = {Appl. Math. Comput.},
volume = {183},
number = {1},
pages = {134--141},
year = {2006}
}

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID













