Ali Miri
Cited by
Cited by
An intrusion detection system for wireless sensor networks
I Onat, A Miri
WiMob'2005), IEEE International Conference on Wireless And Mobile Computing …, 2005
System and method for location-based financial transaction authentication
B Malek, A Miri
US Patent App. 14/443,168, 2015
An end-to-end QoS mapping approach for cloud service selection
R Karim, C Ding, A Miri
2013 IEEE ninth world congress on services, 341-348, 2013
A survey of techniques for incremental learning of HMM parameters
W Khreich, E Granger, A Miri, R Sabourin
Information Sciences 197, 105-130, 2012
Iterative Boolean combination of classifiers in the ROC space: An application to anomaly detection with HMMs
W Khreich, E Granger, A Miri, R Sabourin
Pattern Recognition 43 (8), 2732-2752, 2010
Fast and flexible elliptic curve point arithmetic over prime fields
P Longa, A Miri
IEEE Transactions on computers 57 (3), 289-302, 2008
Area-efficient FIR filter design on FPGAs using distributed arithmetic
P Longa, A Miri
2006 IEEE International Symposium on Signal Processing and Information …, 2006
Location privacy and anonymity preserving routing for wireless sensor networks
AA Nezhad, A Miri, D Makrakis
Computer Networks 52 (18), 3433-3452, 2008
New composite operations and precomputation scheme for elliptic curve cryptosystems over prime fields
P Longa, A Miri
International Workshop on Public Key Cryptography, 229-247, 2008
Privacy-preserving back-propagation and extreme learning machine algorithms
S Samet, A Miri
Data & Knowledge Engineering 79, 40-61, 2012
Using the Extreme Learning Machine (ELM) technique for heart disease diagnosis
S Ismaeel, A Miri, D Chourishi
2015 IEEE Canada International Humanitarian Technology Conference (IHTC2015 …, 2015
Adaptive ROC-based ensembles of HMMs applied to anomaly detection
W Khreich, E Granger, A Miri, R Sabourin
Pattern Recognition 45 (1), 208-230, 2012
On the memory complexity of the forward–backward algorithm
W Khreich, E Granger, A Miri, R Sabourin
Pattern Recognition Letters 31 (2), 91-99, 2010
An improved visual cryptography scheme for secret hiding
R Youmaran, A Adler, A Miri
23rd Biennial Symposium on Communications, 2006, 340-343, 2006
Privacy preserving ID3 using Gini index over horizontally partitioned data
S Samet, A Miri
2008 IEEE/ACS International Conference on Computer Systems and Applications …, 2008
Proactive dynamic virtual-machine consolidation for energy conservation in cloud data centres
S Ismaeel, R Karim, A Miri
Journal of Cloud Computing 7 (1), 1-28, 2018
Fractal analysis of surface electromyography signals: a novel power spectrum-based method
M Talebinejad, ADC Chan, A Miri, RM Dansereau
Journal of electromyography and kinesiology 19 (5), 840-850, 2009
A collusion attack on the fuzzy vault scheme
H Poon, A Miri
The ISC International Journal of Information Security 1 (1), 27-34, 2009
Efficient identity-based security schemes for ad hoc network routing protocols
M Bohio, A Miri
Ad Hoc Networks 2 (3), 309-317, 2004
A real-time node-based traffic anomaly detection algorithm for wireless sensor networks
I Onat, A Miri
2005 Systems Communications (ICW'05, ICHSN'05, ICMCS'05, SENET'05), 422-427, 2005
The system can't perform the operation now. Try again later.
Articles 1–20