


default search action
Seyed Ahmad Soleymani
Person information
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j22]Shidrokh Goudarzi
, Seyed Ahmad Soleymani
, Mohammad Hossein Anisi
, Anish Jindal
, Fateme Dinmohammadi, Pei Xiao
:
Sustainable Edge Node Computing Deployments in Distributed Manufacturing Systems. IEEE Trans. Consumer Electron. 70(1): 1471-1481 (2024) - [c1]Seyed Ahmad Soleymani, Mohammad Shojafar, Chaun Heng Foh, Shidrokh Goudarzi, Wenwu Wang:
Secure Target-Tracking by UAVs in O-RAN Environment. IFIP Networking 2024: 204-212 - 2023
- [j21]Mahmood Safaei
, Seyed Ahmad Soleymani
, Mitra Safaei, Hassan Chizari
, Mehrbakhsh Nilashi
:
Deep learning algorithm for supervision process in production using acoustic signal. Appl. Soft Comput. 146: 110682 (2023) - [j20]Shidrokh Goudarzi
, Seyed Ahmad Soleymani
, Wenwu Wang
, Pei Xiao
:
UAV-Enabled Mobile Edge Computing for Resource Allocation Using Cooperative Evolutionary Computation. IEEE Trans. Aerosp. Electron. Syst. 59(5): 5134-5147 (2023) - [j19]Seyed Ahmad Soleymani
, Shidrokh Goudarzi, Mohammad Hossein Anisi
, Haitham S. Cruickshank
, Anish Jindal
, Nazri Kama
:
TRUTH: Trust and Authentication Scheme in 5G-IIoT. IEEE Trans. Ind. Informatics 19(1): 880-889 (2023) - [j18]Seyed Ahmad Soleymani
, Shidrokh Goudarzi
, Mohammad Hossein Anisi
, Anish Jindal
, Nazri Kama
, Saiful Adli Ismail
:
A Privacy-Preserving Authentication Scheme for Real-Time Medical Monitoring Systems. IEEE J. Biomed. Health Informatics 27(5): 2314-2322 (2023) - 2022
- [j17]Shidrokh Goudarzi, Seyed Ahmad Soleymani
, Mohammad Hossein Anisi
, Mohammad Abdollahi Azgomi
, Zeinab Movahedi
, Nazri Kama, Hazlifah Mohd Rusli, Muhammad Khurram Khan
:
A privacy-preserving authentication scheme based on Elliptic Curve Cryptography and using Quotient Filter in fog-enabled VANET. Ad Hoc Networks 128: 102782 (2022) - [j16]Seyed Ahmad Soleymani
, Shidrokh Goudarzi
, Mohammad Hossein Anisi
, Zeinab Movahedi
, Anish Jindal
, Nazri Kama
:
PACMAN: Privacy-Preserving Authentication Scheme for Managing Cybertwin-Based 6G Networking. IEEE Trans. Ind. Informatics 18(7): 4902-4911 (2022) - 2021
- [j15]Shidrokh Goudarzi
, Mohammad Hossein Anisi
, Domenico Ciuonzo
, Seyed Ahmad Soleymani
, Antonio Pescapè
:
Employing Unmanned Aerial Vehicles for Improving Handoff Using Cooperative Game Theory. IEEE Trans. Aerosp. Electron. Syst. 57(2): 776-794 (2021) - [j14]Shidrokh Goudarzi
, Mohammad Hossein Anisi
, Seyed Ahmad Soleymani
, Masri Ayob
, Sherali Zeadally
:
An IoT-Based Prediction Technique for Efficient Energy Consumption in Buildings. IEEE Trans. Green Commun. Netw. 5(4): 2076-2088 (2021) - [j13]Seyed Ahmad Soleymani
, Shidrokh Goudarzi, Mohammad Hossein Anisi
, Mahdi Zareei, Abdul Hanan Abdullah, Nazri Kama:
A security and privacy scheme based on node and message authentication and trust in fog-enabled VANET. Veh. Commun. 29: 100335 (2021) - 2020
- [j12]Seyed Ahmad Soleymani
, Mohammad Hossein Anisi
, Abdul Hanan Abdullah, Md. Asri Ngadi, Shidrokh Goudarzi
, Muhammad Khurram Khan
, Mohd Nazri Kama:
An authentication and plausibility model for big data analytic under LOS and NLOS conditions in 5G-VANET. Sci. China Inf. Sci. 63(12) (2020) - [j11]Seyed Ahmad Soleymani
, Shidrokh Goudarzi
, Mohammad Hossein Anisi
, Nazri Kama, Saiful Adli Ismail
, Azri Azmi, Mahdi Zareei, Abdul Hanan Abdullah:
A Trust Model Using Edge Nodes and a Cuckoo Filter for Securing VANET under the NLoS Condition. Symmetry 12(4): 609 (2020) - [j10]Seyed Ahmad Soleymani
, Shidrokh Goudarzi, Nazri Kama, Saiful Adli Ismail
, Mazlan Ali, Zaini M. D. Zainal, Mahdi Zareei:
A Hybrid Prediction Model for Energy-Efficient Data Collection in Wireless Sensor Networks. Symmetry 12(12): 2024 (2020)
2010 – 2019
- 2019
- [j9]Shidrokh Goudarzi
, Mohammad Hossein Anisi
, Abdul Hanan Abdullah, Jaime Lloret
, Seyed Ahmad Soleymani
, Wan Haslina Hassan:
A hybrid intelligent model for network selection in the industrial Internet of Things. Appl. Soft Comput. 74: 529-546 (2019) - 2018
- [j8]Shidrokh Goudarzi
, Wan Haslina Hassan, Mohammad Hossein Anisi
, Muhammad Khurram Khan
, Seyed Ahmad Soleymani
:
Intelligent Technique for Seamless Vertical Handover in Vehicular Networks. Mob. Networks Appl. 23(6): 1462-1477 (2018) - [j7]Shidrokh Goudarzi
, Mohd Nazri Kama
, Mohammad Hossein Anisi
, Seyed Ahmad Soleymani
, Faiyaz Doctor:
Self-Organizing Traffic Flow Prediction with an Optimized Deep Belief Network for Internet of Vehicles. Sensors 18(10): 3459 (2018) - 2017
- [j6]Seyed Ahmad Soleymani
, Abdul Hanan Abdullah
, Mahdi Zareei
, Mohammad Hossein Anisi
, César Vargas Rosales, Muhammad Khurram Khan
, Shidrokh Goudarzi
:
A Secure Trust Model Based on Fuzzy Logic in Vehicular Ad Hoc Networks With Fog Computing. IEEE Access 5: 15619-15629 (2017) - [j5]Shidrokh Goudarzi, Wan Haslina Hassan, Seyed Ahmad Soleymani, Mohammad Hossein Anisi:
Hybridisation of genetic algorithm with simulated annealing for vertical-handover in heterogeneous wireless networks. Int. J. Ad Hoc Ubiquitous Comput. 24(1/2): 4-21 (2017) - [j4]Seyed Ahmad Soleymani
, Abdul Hanan Abdullah, Mohammad Hossein Anisi
, Ayman Altameem, Wan Haslina Hasan, Shidrokh Goudarzi
, Satria Mandala
, Zaidi Bin Razak, Noorzaily Mohamed Noor:
BRAIN-F: Beacon Rate Adaption Based on Fuzzy Logic in Vehicular Ad Hoc Network. Int. J. Fuzzy Syst. 19(2): 301-315 (2017) - [j3]Shidrokh Goudarzi
, Wan Haslina Hassan, Mohammad Hossein Anisi
, Seyed Ahmad Soleymani
, Mehdi Sookhak
, Muhammad Khurram Khan
, Aisha-Hassan A. Hashim
, Mahdi Zareei
:
ABC-PSO for vertical handover in heterogeneous wireless networks. Neurocomputing 256: 63-81 (2017) - [j2]Shidrokh Goudarzi
, Wan Haslina Hassan, Mohammad Hossein Anisi
, Seyed Ahmad Soleymani:
MDP-Based Network Selection Scheme by Genetic Algorithm and Simulated Annealing for Vertical-Handover in Heterogeneous Wireless Networks. Wirel. Pers. Commun. 92(2): 399-436 (2017) - 2015
- [j1]Seyed Ahmad Soleymani, Abdul Hanan Abdullah, Wan Haslina Hassan, Mohammad Hossein Anisi
, Shidrokh Goudarzi
, Mir Ali Rezazadeh Baee
, Satria Mandala
:
Trust management in vehicular ad hoc network: a systematic review. EURASIP J. Wirel. Commun. Netw. 2015: 146 (2015) - [p1]Shidrokh Goudarzi
, Wan Haslina Hassan, Mir Ali Rezazadeh Baee
, Seyed Ahmad Soleymani:
The Model of Customer Trust for Internet Banking Adoption. Computational Intelligence and Efficiency in Engineering Systems 2015: 399-414
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-01-09 13:03 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint