


default search action
BibTeX records: Mehdi Yousefi
@article{DBLP:journals/access/GhashghaeiEQAY25,
author = {Farshad Rahimi Ghashghaei and
Nebrase Elmrabit and
Ayyaz{-}Ul{-}Haq Qureshi and
Adnan Akhunzada and
Mehdi Yousefi},
title = {Advanced Quantum Control With Ensemble Reinforcement Learning: {A}
Case Study on the {XY} Spin Chain},
journal = {{IEEE} Access},
volume = {13},
pages = {49514--49526},
year = {2025},
url = {https://doi.org/10.1109/ACCESS.2025.3551232},
doi = {10.1109/ACCESS.2025.3551232},
timestamp = {Tue, 08 Apr 2025 01:00:00 +0200},
biburl = {https://dblp.org/rec/journals/access/GhashghaeiEQAY25.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computers/GhashghaeiAEY25,
author = {Farshad Rahimi Ghashghaei and
Yussuf Ahmed and
Nebrase Elmrabit and
Mehdi Yousefi},
title = {Correction: Ghashghaei et al. Enhancing the Security of Classical
Communication with Post-Quantum Authenticated-Encryption Schemes for
the Quantum Key Distribution. Computers 2024, 13, 163},
journal = {Comput.},
volume = {14},
number = {2},
pages = {64},
year = {2025},
url = {https://doi.org/10.3390/computers14020064},
doi = {10.3390/COMPUTERS14020064},
timestamp = {Fri, 09 May 2025 01:00:00 +0200},
biburl = {https://dblp.org/rec/journals/computers/GhashghaeiAEY25.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/JinGEAY24,
author = {Hyo Jung Jin and
Farshad Rahimi Ghashghaei and
Nebrase Elmrabit and
Yussuf Ahmed and
Mehdi Yousefi},
title = {Enhancing Sniffing Detection in IoT Home Wi-Fi Networks: An Ensemble
Learning Approach With Network Monitoring System {(NMS)}},
journal = {{IEEE} Access},
volume = {12},
pages = {86840--86853},
year = {2024},
url = {https://doi.org/10.1109/ACCESS.2024.3416095},
doi = {10.1109/ACCESS.2024.3416095},
timestamp = {Fri, 19 Jul 2024 01:00:00 +0200},
biburl = {https://dblp.org/rec/journals/access/JinGEAY24.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computers/GhashghaeiAEY24,
author = {Farshad Rahimi Ghashghaei and
Yussuf Ahmed and
Nebrase Elmrabit and
Mehdi Yousefi},
title = {Enhancing the Security of Classical Communication with Post-Quantum
Authenticated-Encryption Schemes for the Quantum Key Distribution},
journal = {Comput.},
volume = {13},
number = {7},
pages = {163},
year = {2024},
url = {https://doi.org/10.3390/computers13070163},
doi = {10.3390/COMPUTERS13070163},
timestamp = {Sun, 06 Oct 2024 01:00:00 +0200},
biburl = {https://dblp.org/rec/journals/computers/GhashghaeiAEY24.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2404-09052,
author = {Yussuf Ahmed and
Micheal Ezealor and
Haitham H. Mahmoud and
Muhammad Ajmal Azad and
Mohamed Ben Farah and
Mehdi Yousefi},
title = {Enhancing Security Awareness Through Gamified Approaches},
journal = {CoRR},
volume = {abs/2404.09052},
year = {2024},
url = {https://doi.org/10.48550/arXiv.2404.09052},
doi = {10.48550/ARXIV.2404.09052},
eprinttype = {arXiv},
eprint = {2404.09052},
timestamp = {Mon, 05 Jan 2026 00:00:00 +0100},
biburl = {https://dblp.org/rec/journals/corr/abs-2404-09052.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computers/AbdulghaffarEY23,
author = {Khaled Abdulghaffar and
Nebrase Elmrabit and
Mehdi Yousefi},
title = {Enhancing Web Application Security through Automated Penetration Testing
with Multiple Vulnerability Scanners},
journal = {Comput.},
volume = {12},
number = {11},
pages = {235},
year = {2023},
url = {https://doi.org/10.3390/computers12110235},
doi = {10.3390/COMPUTERS12110235},
timestamp = {Sat, 13 Jan 2024 00:00:00 +0100},
biburl = {https://dblp.org/rec/journals/computers/AbdulghaffarEY23.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/aci/FazaeliKVYASM21,
author = {Somayeh Fazaeli and
Taleb Khodaveisi and
Ali Khorsand Vakilzadeh and
Mehdi Yousefi and
Atousa Ariafar and
Mohsen Shokoohizadeh and
Saeed Mohammad{-}Pour},
title = {Development, Implementation, and User Evaluation of {COVID-19} Dashboard
in a Third-Level Hospital in Iran},
journal = {Appl. Clin. Inform.},
volume = {12},
number = {5},
pages = {1091--1100},
year = {2021},
url = {https://doi.org/10.1055/s-0041-1740188},
doi = {10.1055/S-0041-1740188},
timestamp = {Sun, 06 Oct 2024 01:00:00 +0200},
biburl = {https://dblp.org/rec/journals/aci/FazaeliKVYASM21.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computers/QureshiLYAM20,
author = {Ayyaz{-}Ul{-}Haq Qureshi and
Hadi Larijani and
Mehdi Yousefi and
Ahsan Adeel and
Nhamoinesu Mtetwa},
title = {An Adversarial Approach for Intrusion Detection Systems Using Jacobian
Saliency Map Attacks {(JSMA)} Algorithm},
journal = {Comput.},
volume = {9},
number = {3},
pages = {58},
year = {2020},
url = {https://doi.org/10.3390/computers9030058},
doi = {10.3390/COMPUTERS9030058},
timestamp = {Mon, 26 Oct 2020 00:00:00 +0100},
biburl = {https://dblp.org/rec/journals/computers/QureshiLYAM20.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ijcnn/QureshiLMYJ20,
author = {Ayyaz{-}Ul{-}Haq Qureshi and
Hadi Larijani and
Nhamoinesu Mtetwa and
Mehdi Yousefi and
Abbas Javed},
title = {An Adversarial Attack Detection Paradigm With Swarm Optimization},
booktitle = {2020 International Joint Conference on Neural Networks, {IJCNN} 2020,
Glasgow, United Kingdom, July 19-24, 2020},
pages = {1--7},
publisher = {{IEEE}},
year = {2020},
url = {https://doi.org/10.1109/IJCNN48605.2020.9207627},
doi = {10.1109/IJCNN48605.2020.9207627},
timestamp = {Tue, 06 Oct 2020 15:44:04 +0200},
biburl = {https://dblp.org/rec/conf/ijcnn/QureshiLMYJ20.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ucet/HosseinzadehRYC20,
author = {Salaheddin Hosseinzadeh and
Naeem Ramzan and
Mehdi Yousefi and
Krystyna Curtis and
Hadi Larijani},
title = {Impact of Spreading Factor on LoRaWAN Propagation in a Metropolitan
Environment},
booktitle = {2020 International Conference on UK-China Emerging Technologies, {UCET}
2020, Glasgow, United Kingdom, August 20-21, 2020},
pages = {1--4},
publisher = {{IEEE}},
year = {2020},
url = {https://doi.org/10.1109/UCET51115.2020.9205422},
doi = {10.1109/UCET51115.2020.9205422},
timestamp = {Sun, 04 Aug 2024 01:00:00 +0200},
biburl = {https://dblp.org/rec/conf/ucet/HosseinzadehRYC20.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/YousefiMZT18,
author = {Mehdi Yousefi and
Nhamo Mtetwa and
Yan Zhang and
Huaglory Tianfield},
title = {A Reinforcement Learning Approach for Attack Graph Analysis},
booktitle = {17th {IEEE} International Conference On Trust, Security And Privacy
In Computing And Communications / 12th {IEEE} International Conference
On Big Data Science And Engineering, TrustCom/BigDataSE 2018, New
York, NY, USA, August 1-3, 2018},
pages = {212--217},
publisher = {{IEEE}},
year = {2018},
url = {https://doi.org/10.1109/TrustCom/BigDataSE.2018.00041},
doi = {10.1109/TRUSTCOM/BIGDATASE.2018.00041},
timestamp = {Fri, 24 Mar 2023 00:00:00 +0100},
biburl = {https://dblp.org/rec/conf/trustcom/YousefiMZT18.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isi/YousefiMZT17,
author = {Mehdi Yousefi and
Nhamo Mtetwa and
Yan Zhang and
Huaglory Tianfield},
title = {A novel approach for analysis of attack graph},
booktitle = {2017 {IEEE} International Conference on Intelligence and Security
Informatics, {ISI} 2017, Beijing, China, July 22-24, 2017},
pages = {7--12},
publisher = {{IEEE}},
year = {2017},
url = {https://doi.org/10.1109/ISI.2017.8004866},
doi = {10.1109/ISI.2017.8004866},
timestamp = {Tue, 13 Oct 2020 01:00:00 +0200},
biburl = {https://dblp.org/rec/conf/isi/YousefiMZT17.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/amc/MaleknejadYN07,
author = {Khosrow Maleknejad and
Mehdi Yousefi and
Kazem Nouri},
title = {Computational methods for integrals involving functions and Daubechies
wavelets},
journal = {Appl. Math. Comput.},
volume = {189},
number = {2},
pages = {1828--1840},
year = {2007},
url = {https://doi.org/10.1016/j.amc.2006.12.064},
doi = {10.1016/J.AMC.2006.12.064},
timestamp = {Sat, 30 Sep 2023 01:00:00 +0200},
biburl = {https://dblp.org/rec/journals/amc/MaleknejadYN07.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/amc/MaleknejadNY07,
author = {Khosrow Maleknejad and
Kazem Nouri and
Mehdi Yousefi},
title = {Discussion on convergence of Legendre polynomial for numerical solution
of integral equations},
journal = {Appl. Math. Comput.},
volume = {193},
number = {2},
pages = {335--339},
year = {2007},
url = {https://doi.org/10.1016/j.amc.2007.03.062},
doi = {10.1016/J.AMC.2007.03.062},
timestamp = {Sat, 30 Sep 2023 01:00:00 +0200},
biburl = {https://dblp.org/rec/journals/amc/MaleknejadNY07.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/amc/MaleknejadY06,
author = {Khosrow Maleknejad and
Mehdi Yousefi},
title = {Numerical solution of the integral equation of the second kind by
using wavelet bases of Hermite cubic splines},
journal = {Appl. Math. Comput.},
volume = {183},
number = {1},
pages = {134--141},
year = {2006},
url = {https://doi.org/10.1016/j.amc.2006.05.104},
doi = {10.1016/J.AMC.2006.05.104},
timestamp = {Sat, 30 Sep 2023 01:00:00 +0200},
biburl = {https://dblp.org/rec/journals/amc/MaleknejadY06.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID













