default search action
Mohamad Ali Mehrabi
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j8]Mohamad Ali Mehrabi, Yeshwanth Bethi, André van Schaik, Andrew Wabnitz, Saeed Afshar:
Efficient Hardware Implementation of a Multi-Layer Gradient-Free Online-Trainable Spiking Neural Network on FPGA. IEEE Access 12: 170980-170993 (2024) - [c5]Mohamad Ali Mehrabi, Nik Dennler, Yeshwanth Bethi, André van Schaik, Saeed Afshar:
Real-Time Anomaly Detection Using Hardware-based Unsupervised Spiking Neural Network (TinySNN). ISIE 2024: 1-8 - 2023
- [j7]Naila Mukhtar, Mohamad Ali Mehrabi, Yinan Kong, Ashiq Anjum:
Edge enhanced deep learning system for IoT edge device security analytics. Concurr. Comput. Pract. Exp. 35(13) (2023) - [c4]Mohamad Ali Mehrabi, Yeshwanth Bethi, André van Schaik, Saeed Afshar:
An Optimized Multi-layer Spiking Neural Network implementation in FPGA Without Multipliers. INNS DLIA@IJCNN 2023: 407-414 - [i1]Mohamad Ali Mehrabi, Yeshwanth Bethi, André van Schaik, Andrew Wabnitz, Saeed Afshar:
Efficient Implementation of a Multi-Layer Gradient-Free Online-Trainable Spiking Neural Network on FPGA. CoRR abs/2305.19468 (2023) - 2022
- [j6]Mohamad Ali Mehrabi, Alireza Jolfaei:
Efficient Cryptographic Hardware for Safety Message Verification in Internet of Connected Vehicles. ACM Trans. Internet Techn. 22(4): 86:1-86:16 (2022) - 2021
- [j5]Mohamad Ali Mehrabi, Naila Mukhtar, Alireza Jolfaei:
Power Side-Channel Analysis of RNS GLV ECC Using Machine and Deep Learning Algorithms. ACM Trans. Internet Techn. 21(3): 65:1-65:20 (2021) - 2020
- [j4]Mohamad Ali Mehrabi, Christophe Doche, Alireza Jolfaei:
Elliptic Curve Cryptography Point Multiplication Core for Hardware Security Module. IEEE Trans. Computers 69(11): 1707-1718 (2020)
2010 – 2019
- 2019
- [j3]Mohamad Ali Mehrabi:
Improved Sum of Residues Modular Multiplication Algorithm. Cryptogr. 3(2): 14 (2019) - [j2]Mohamad Ali Mehrabi, Christophe Doche:
Low-Cost, Low-Power FPGA Implementation of ED25519 and CURVE25519 Point Multiplication. Inf. 10(9): 285 (2019) - 2017
- [c3]Abdullah Al Nahid, Mohamad Ali Mehrabi, Yinan Kong:
Frequency-domain information along with LSTM and GRU methods for histopathological breast-image classification. ISSPIT 2017: 410-415 - 2010
- [j1]Mojtaba Abolghasemi, Hassan Aghaeinia, Karim Faez, Mohammad Ali Mehrabi:
Detection of LSB+/-1 steganography based on co-occurrence matrix and bit plane clipping. J. Electronic Imaging 19(1): 013014 (2010)
2000 – 2009
- 2008
- [c2]Mojtaba Abolghasemi, Hassan Aghaeinia, Karim Faez, Mohammad Ali Mehrabi:
Steganalysis of LSB Matching Based on Co-occurrence Matrix and Removing Most Significant Bit Planes. IIH-MSP 2008: 1527-1530 - 2007
- [c1]Mohammad Ali Mehrabi, Karim Faez, Ali Reza Bayesteh:
Image Steganalysis Based on Statistical Moments of Wavelet Subband Histograms in Different Frequencies and Support Vector Machine. ICNC (1) 2007: 587-590
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-02 22:34 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint