MVDroid: an android malicious VPN detector using neural networks
Seraj S. et al, (2023), Neural Computing and Applications
HamDroid: permission-based harmful android anti-malware detection using neural networks
Seraj S. et al, (2022), Neural Computing and Applications
A quantum blind signature scheme for electronic payments
Khodambashi S. and Zakerolhosseini A., (2014), 22nd Iranian Conference on Electrical Engineering, ICEE 2014, 879 - 884
A sessional blind signature based on quantum cryptography
Khodambashi S. and Zakerolhosseini A., (2014), Quantum Information Processing, 13, 121 - 130
Efficient RNS to binary converters for the new 4-moduli set {2n, 2n+1-1, 2n-1, 2n-1-1}
Esmaeildoust M. et al, (2012), ieice electronics express, 9, 1 - 7
A scalable architecture to control LED displays
Khodambashi S. et al, (2010), 2010 2nd International Conference on Industrial and Information Systems, IIS 2010, 1, 456 - 459
An impulse noise fading technique based on local histogram processing
Khodambashi S. and Moghaddam ME., (2009), IEEE International Symposium on Signal Processing and Information Technology, ISSPIT 2009, 95 - 100