Zum Hauptinhalt springen

Showing 1–31 of 31 results for author: Beheshti, A

Searching in archive cs. Search in all archives.
.
  1. arXiv:2406.05409  [pdf, other

    cs.SE cs.AI cs.PL

    Natural Language-Oriented Programming (NLOP): Towards Democratizing Software Creation

    Authors: Amin Beheshti

    Abstract: As generative Artificial Intelligence (AI) technologies evolve, they offer unprecedented potential to automate and enhance various tasks, including coding. Natural Language-Oriented Programming (NLOP), a vision introduced in this paper, harnesses this potential by allowing developers to articulate software requirements and logic in their natural language, thereby democratizing software creation. T… ▽ More

    Submitted 8 June, 2024; originally announced June 2024.

    Comments: Accepted in: 2024 IEEE International Conference on Software Services Engineering (SSE), Shenzhen, China, July 7-13, 2024

  2. arXiv:2406.02594  [pdf, other

    cs.LG cs.AI

    Graph Neural Networks for Brain Graph Learning: A Survey

    Authors: Xuexiong Luo, Jia Wu, Jian Yang, Shan Xue, Amin Beheshti, Quan Z. Sheng, David McAlpine, Paul Sowman, Alexis Giral, Philip S. Yu

    Abstract: Exploring the complex structure of the human brain is crucial for understanding its functionality and diagnosing brain disorders. Thanks to advancements in neuroimaging technology, a novel approach has emerged that involves modeling the human brain as a graph-structured pattern, with different brain regions represented as nodes and the functional relationships among these regions as edges. Moreove… ▽ More

    Submitted 31 May, 2024; originally announced June 2024.

    Comments: 9 pages, 2 figures, IJCAI-2024

    MSC Class: 68T07 (Primary) 68T30 (Secondary)

  3. arXiv:2405.07018  [pdf, other

    cs.CR

    Shadow-Free Membership Inference Attacks: Recommender Systems Are More Vulnerable Than You Thought

    Authors: Xiaoxiao Chi, Xuyun Zhang, Yan Wang, Lianyong Qi, Amin Beheshti, Xiaolong Xu, Kim-Kwang Raymond Choo, Shuo Wang, Hongsheng Hu

    Abstract: Recommender systems have been successfully applied in many applications. Nonetheless, recent studies demonstrate that recommender systems are vulnerable to membership inference attacks (MIAs), leading to the leakage of users' membership privacy. However, existing MIAs relying on shadow training suffer a large performance drop when the attacker lacks knowledge of the training data distribution and… ▽ More

    Submitted 11 May, 2024; originally announced May 2024.

    Comments: This paper has been accepted by IJCAI-24

  4. arXiv:2403.07834  [pdf, other

    eess.IV cs.CV

    When Eye-Tracking Meets Machine Learning: A Systematic Review on Applications in Medical Image Analysis

    Authors: Sahar Moradizeyveh, Mehnaz Tabassum, Sidong Liu, Robert Ahadizad Newport, Amin Beheshti, Antonio Di Ieva

    Abstract: Eye-gaze tracking research offers significant promise in enhancing various healthcare-related tasks, above all in medical image analysis and interpretation. Eye tracking, a technology that monitors and records the movement of the eyes, provides valuable insights into human visual attention patterns. This technology can transform how healthcare professionals and medical specialists engage with and… ▽ More

    Submitted 12 March, 2024; originally announced March 2024.

  5. arXiv:2402.12636  [pdf, other

    cs.CL

    StyleDubber: Towards Multi-Scale Style Learning for Movie Dubbing

    Authors: Gaoxiang Cong, Yuankai Qi, Liang Li, Amin Beheshti, Zhedong Zhang, Anton van den Hengel, Ming-Hsuan Yang, Chenggang Yan, Qingming Huang

    Abstract: Given a script, the challenge in Movie Dubbing (Visual Voice Cloning, V2C) is to generate speech that aligns well with the video in both time and emotion, based on the tone of a reference audio track. Existing state-of-the-art V2C models break the phonemes in the script according to the divisions between video frames, which solves the temporal alignment problem but leads to incomplete phoneme pron… ▽ More

    Submitted 1 July, 2024; v1 submitted 19 February, 2024; originally announced February 2024.

  6. arXiv:2402.08578  [pdf, other

    cs.LG cs.AI cs.DC

    FedLPS: Heterogeneous Federated Learning for Multiple Tasks with Local Parameter Sharing

    Authors: Yongzhe Jia, Xuyun Zhang, Amin Beheshti, Wanchun Dou

    Abstract: Federated Learning (FL) has emerged as a promising solution in Edge Computing (EC) environments to process the proliferation of data generated by edge devices. By collaboratively optimizing the global machine learning models on distributed edge devices, FL circumvents the need for transmitting raw data and enhances user privacy. Despite practical successes, FL still confronts significant challenge… ▽ More

    Submitted 13 February, 2024; originally announced February 2024.

    Comments: Accepted by AAAI 2024

  7. arXiv:2309.12202  [pdf

    eess.SP cs.LG q-bio.NC

    Empowering Precision Medicine: AI-Driven Schizophrenia Diagnosis via EEG Signals: A Comprehensive Review from 2002-2023

    Authors: Mahboobeh Jafari, Delaram Sadeghi, Afshin Shoeibi, Hamid Alinejad-Rokny, Amin Beheshti, David López García, Zhaolin Chen, U. Rajendra Acharya, Juan M. Gorriz

    Abstract: Schizophrenia (SZ) is a prevalent mental disorder characterized by cognitive, emotional, and behavioral changes. Symptoms of SZ include hallucinations, illusions, delusions, lack of motivation, and difficulties in concentration. Diagnosing SZ involves employing various tools, including clinical interviews, physical examinations, psychological evaluations, the Diagnostic and Statistical Manual of M… ▽ More

    Submitted 14 September, 2023; originally announced September 2023.

  8. arXiv:2307.05696  [pdf, other

    cs.IR cs.AI cs.CL

    A Personalized Reinforcement Learning Summarization Service for Learning Structure from Unstructured Data

    Authors: Samira Ghodratnama, Amin Beheshti, Mehrdad Zakershahrak

    Abstract: The exponential growth of textual data has created a crucial need for tools that assist users in extracting meaningful insights. Traditional document summarization approaches often fail to meet individual user requirements and lack structure for efficient information processing. To address these limitations, we propose Summation, a hierarchical personalized concept-based summarization approach. It… ▽ More

    Submitted 8 July, 2023; originally announced July 2023.

    Comments: arXiv admin note: substantial text overlap with arXiv:2108.09443

  9. arXiv:2306.12703  [pdf, other

    cs.LG cs.AI

    OptIForest: Optimal Isolation Forest for Anomaly Detection

    Authors: Haolong Xiang, Xuyun Zhang, Hongsheng Hu, Lianyong Qi, Wanchun Dou, Mark Dras, Amin Beheshti, Xiaolong Xu

    Abstract: Anomaly detection plays an increasingly important role in various fields for critical tasks such as intrusion detection in cybersecurity, financial risk detection, and human health monitoring. A variety of anomaly detection methods have been proposed, and a category based on the isolation forest mechanism stands out due to its simplicity, effectiveness, and efficiency, e.g., iForest is often emplo… ▽ More

    Submitted 23 June, 2023; v1 submitted 22 June, 2023; originally announced June 2023.

    Comments: This paper has been accepted by International Joint Conference on Artificial Intelligence (IJCAI-23)

  10. arXiv:2306.01771  [pdf, other

    cs.AI

    ProcessGPT: Transforming Business Process Management with Generative Artificial Intelligence

    Authors: Amin Beheshti, Jian Yang, Quan Z. Sheng, Boualem Benatallah, Fabio Casati, Schahram Dustdar, Hamid Reza Motahari Nezhad, Xuyun Zhang, Shan Xue

    Abstract: Generative Pre-trained Transformer (GPT) is a state-of-the-art machine learning model capable of generating human-like text through natural language processing (NLP). GPT is trained on massive amounts of text data and uses deep learning techniques to learn patterns and relationships within the data, enabling it to generate coherent and contextually appropriate text. This position paper proposes us… ▽ More

    Submitted 28 May, 2023; originally announced June 2023.

    Comments: Accepted in: 2023 IEEE International Conference on Web Services (ICWS); Corresponding author: Prof. Amin Beheshti ([email protected])

  11. arXiv:2302.06114  [pdf, other

    cs.LG

    A Comprehensive Survey on Graph Summarization with Graph Neural Networks

    Authors: Nasrin Shabani, Jia Wu, Amin Beheshti, Quan Z. Sheng, Jin Foo, Venus Haghighi, Ambreen Hanif, Maryam Shahabikargar

    Abstract: As large-scale graphs become more widespread, more and more computational challenges with extracting, processing, and interpreting large graph data are being exposed. It is therefore natural to search for ways to summarize these expansive graphs while preserving their key characteristics. In the past, most graph summarization techniques sought to capture the most important part of a graph statisti… ▽ More

    Submitted 3 January, 2024; v1 submitted 13 February, 2023; originally announced February 2023.

    Comments: 21 pages, 4 figures, 9 tables, Journal of IEEE Transactions on Artificial Intelligence

  12. arXiv:2210.14611  [pdf

    cs.CV cs.LG

    Automatic Diagnosis of Myocarditis Disease in Cardiac MRI Modality using Deep Transformers and Explainable Artificial Intelligence

    Authors: Mahboobeh Jafari, Afshin Shoeibi, Navid Ghassemi, Jonathan Heras, Sai Ho Ling, Amin Beheshti, Yu-Dong Zhang, Shui-Hua Wang, Roohallah Alizadehsani, Juan M. Gorriz, U. Rajendra Acharya, Hamid Alinejad Rokny

    Abstract: Myocarditis is a significant cardiovascular disease (CVD) that poses a threat to the health of many individuals by causing damage to the myocardium. The occurrence of microbes and viruses, including the likes of HIV, plays a crucial role in the development of myocarditis disease (MCD). The images produced during cardiac magnetic resonance imaging (CMRI) scans are low contrast, which can make it ch… ▽ More

    Submitted 1 December, 2023; v1 submitted 26 October, 2022; originally announced October 2022.

  13. arXiv:2210.09766  [pdf, other

    cs.LG

    DAGAD: Data Augmentation for Graph Anomaly Detection

    Authors: Fanzhen Liu, Xiaoxiao Ma, Jia Wu, Jian Yang, Shan Xue, Amin Beheshti, Chuan Zhou, Hao Peng, Quan Z. Sheng, Charu C. Aggarwal

    Abstract: Graph anomaly detection in this paper aims to distinguish abnormal nodes that behave differently from the benign ones accounting for the majority of graph-structured instances. Receiving increasing attention from both academia and industry, yet existing research on this task still suffers from two critical issues when learning informative anomalous behavior from graph data. For one thing, anomalie… ▽ More

    Submitted 18 October, 2022; originally announced October 2022.

    Comments: Regular paper accepted by the 22nd IEEE International Conference on Data Mining (ICDM 2022)

  14. arXiv:2203.10093  [pdf, other

    cs.LG cs.AI cs.NE q-bio.NC

    Deep reinforcement learning guided graph neural networks for brain network analysis

    Authors: Xusheng Zhao, Jia Wu, Hao Peng, Amin Beheshti, Jessica J. M. Monaghan, David McAlpine, Heivet Hernandez-Perez, Mark Dras, Qiong Dai, Yangyang Li, Philip S. Yu, Lifang He

    Abstract: Modern neuroimaging techniques, such as diffusion tensor imaging (DTI) and functional magnetic resonance imaging (fMRI), enable us to model the human brain as a brain network or connectome. Capturing brain networks' structural information and hierarchical patterns is essential for understanding brain functions and disease states. Recently, the promising network representation learning capability o… ▽ More

    Submitted 24 July, 2022; v1 submitted 18 March, 2022; originally announced March 2022.

  15. arXiv:2201.05203  [pdf

    cs.SI

    An Intelligent System for Multi-topic Social Spam Detection in Microblogging

    Authors: Bilal Abu-Salih, Dana Al Qudah, Malak Al-Hassan, Seyed Mohssen Ghafari, Tomayess Issa, Ibrahim Aljarah, Amin Beheshti, Sulaiman Alqahtan

    Abstract: The communication revolution has perpetually reshaped the means through which people send and receive information. Social media is an important pillar of this revolution and has brought profound changes to various aspects of our lives. However, the open environment and popularity of these platforms inaugurate windows of opportunities for various cyber threats, thus social networks have become a fe… ▽ More

    Submitted 13 January, 2022; originally announced January 2022.

  16. arXiv:2112.12582  [pdf

    q-bio.OT cs.LG

    Beyond Low Earth Orbit: Biological Research, Artificial Intelligence, and Self-Driving Labs

    Authors: Lauren M. Sanders, Jason H. Yang, Ryan T. Scott, Amina Ann Qutub, Hector Garcia Martin, Daniel C. Berrios, Jaden J. A. Hastings, Jon Rask, Graham Mackintosh, Adrienne L. Hoarfrost, Stuart Chalk, John Kalantari, Kia Khezeli, Erik L. Antonsen, Joel Babdor, Richard Barker, Sergio E. Baranzini, Afshin Beheshti, Guillermo M. Delgado-Aparicio, Benjamin S. Glicksberg, Casey S. Greene, Melissa Haendel, Arif A. Hamid, Philip Heller, Daniel Jamieson , et al. (31 additional authors not shown)

    Abstract: Space biology research aims to understand fundamental effects of spaceflight on organisms, develop foundational knowledge to support deep space exploration, and ultimately bioengineer spacecraft and habitats to stabilize the ecosystem of plants, crops, microbes, animals, and humans for sustained multi-planetary life. To advance these aims, the field leverages experiments, platforms, data, and mode… ▽ More

    Submitted 22 December, 2021; originally announced December 2021.

    Comments: 28 pages, 4 figures

  17. arXiv:2112.12554  [pdf

    q-bio.OT cs.LG

    Beyond Low Earth Orbit: Biomonitoring, Artificial Intelligence, and Precision Space Health

    Authors: Ryan T. Scott, Erik L. Antonsen, Lauren M. Sanders, Jaden J. A. Hastings, Seung-min Park, Graham Mackintosh, Robert J. Reynolds, Adrienne L. Hoarfrost, Aenor Sawyer, Casey S. Greene, Benjamin S. Glicksberg, Corey A. Theriot, Daniel C. Berrios, Jack Miller, Joel Babdor, Richard Barker, Sergio E. Baranzini, Afshin Beheshti, Stuart Chalk, Guillermo M. Delgado-Aparicio, Melissa Haendel, Arif A. Hamid, Philip Heller, Daniel Jamieson, Katelyn J. Jarvis , et al. (31 additional authors not shown)

    Abstract: Human space exploration beyond low Earth orbit will involve missions of significant distance and duration. To effectively mitigate myriad space health hazards, paradigm shifts in data and space health systems are necessary to enable Earth-independence, rather than Earth-reliance. Promising developments in the fields of artificial intelligence and machine learning for biology and health can address… ▽ More

    Submitted 22 December, 2021; originally announced December 2021.

    Comments: 31 pages, 4 figures

  18. arXiv:2107.02126  [pdf, other

    cs.CL

    A Survey on Deep Learning Event Extraction: Approaches and Applications

    Authors: Qian Li, Jianxin Li, Jiawei Sheng, Shiyao Cui, Jia Wu, Yiming Hei, Hao Peng, Shu Guo, Lihong Wang, Amin Beheshti, Philip S. Yu

    Abstract: Event extraction (EE) is a crucial research task for promptly apprehending event information from massive textual data. With the rapid development of deep learning, EE based on deep learning technology has become a research hotspot. Numerous methods, datasets, and evaluation metrics have been proposed in the literature, raising the need for a comprehensive and updated survey. This article fills th… ▽ More

    Submitted 15 November, 2022; v1 submitted 5 July, 2021; originally announced July 2021.

  19. arXiv:2105.10911  [pdf, other

    cs.DB cs.LG

    A Query Language for Summarizing and Analyzing Business Process Data

    Authors: Amin Beheshti, Boualem Benatallah, Hamid Reza Motahari-Nezhad, Samira Ghodratnama, Farhad Amouzgar

    Abstract: In modern enterprises, Business Processes (BPs) are realized over a mix of workflows, IT systems, Web services and direct collaborations of people. Accordingly, process data (i.e., BP execution data such as logs containing events, interaction messages and other process artifacts) is scattered across several systems and data sources, and increasingly show all typical properties of the Big Data. Und… ▽ More

    Submitted 23 May, 2021; originally announced May 2021.

    Comments: arXiv admin note: text overlap with arXiv:1908.09232 by other authors

  20. Tensor Laplacian Regularized Low-Rank Representation for Non-uniformly Distributed Data Subspace Clustering

    Authors: Eysan Mehrbani, Mohammad Hossein Kahaei, Seyed Aliasghar Beheshti

    Abstract: Low-Rank Representation (LRR) highly suffers from discarding the locality information of data points in subspace clustering, as it may not incorporate the data structure nonlinearity and the non-uniform distribution of observations over the ambient space. Thus, the information of the observational density is lost by the state-of-art LRR models, as they take a constant number of adjacent neighbors… ▽ More

    Submitted 6 March, 2021; originally announced March 2021.

  21. arXiv:2001.04825  [pdf

    cs.IR cs.CY cs.LG stat.ML

    Enabling the Analysis of Personality Aspects in Recommender Systems

    Authors: Shahpar Yakhchi, Amin Beheshti, Seyed Mohssen Ghafari, Mehmet Orgun

    Abstract: Existing Recommender Systems mainly focus on exploiting users' feedback, e.g., ratings, and reviews on common items to detect similar users. Thus, they might fail when there are no common items of interest among users. We call this problem the Data Sparsity With no Feedback on Common Items (DSW-n-FCI). Personality-based recommender systems have shown a great success to identify similar users based… ▽ More

    Submitted 7 January, 2020; originally announced January 2020.

    Comments: This article contains 3 figures and 14 pages

    ACM Class: H.3.3; H.4.0; J.4; E.0

    Journal ref: Twenty-Third Pacific Asia Conference on Information Systems, China 2019

  22. Eliminating Impulsive Noise in Pilot-Aided OFDM Channels via Dual of Penalized Atomic Norm

    Authors: Iman Valiulahi, Farzad Parvaresh, Ali Asghar Beheshti

    Abstract: In this paper, we propose a novel estimator for pilot-aided orthogonal frequency division multiplexing (OFDM) channels in an additive Gaussian and impulsive perturbation environment. Due to sensor failure which might happen because of man-made noise, a number of measurements in high rate communication systems is often corrupted by impulsive noise. High power impulsive noise is generally an obstacl… ▽ More

    Submitted 21 August, 2019; originally announced August 2019.

  23. Classification of Vehicles Based on Audio Signals using Quadratic Discriminant Analysis and High Energy Feature Vectors

    Authors: Ali Dalir, Ali Asghar Beheshti, Morteza Hoseini Masoom

    Abstract: The focus of this paper is on classification of different vehicles using sound emanated from the vehicles. In this paper,quadratic discriminant analysis classifies audio signals of passing vehicles to bus, car, motor, and truck categories based on features such as short time energy, average zero cross rate, and pitch frequency of periodic segments of signals. Simulation results show that just by c… ▽ More

    Submitted 3 April, 2018; originally announced April 2018.

    Journal ref: International Journal on Soft Computing (IJSC) Vol.6, No. 1, February 2015

  24. An Elliptic Curve-based Signcryption Scheme with Forward Secrecy

    Authors: M. Toorani, A. A. Beheshti

    Abstract: An elliptic curve-based signcryption scheme is introduced in this paper that effectively combines the functionalities of digital signature and encryption, and decreases the computational costs and communication overheads in comparison with the traditional signature-then-encryption schemes. It simultaneously provides the attributes of message confidentiality, authentication, integrity, unforgeabili… ▽ More

    Submitted 19 March, 2012; v1 submitted 11 May, 2010; originally announced May 2010.

    Comments: 13 Pages, 5 Figures, 2 Tables

    MSC Class: 94Axx ACM Class: E.3; K.6.5; D.4.6; K.6.m

    Journal ref: Journal of Applied Sciences, Vol.9, No.6, pp.1025-1035, 2009

  25. arXiv:1004.3521  [pdf

    cs.CR

    Cryptanalysis of an Elliptic Curve-based Signcryption Scheme

    Authors: M. Toorani, A. A. Beheshti

    Abstract: The signcryption is a relatively new cryptographic technique that is supposed to fulfill the functionalities of encryption and digital signature in a single logical step. Although several signcryption schemes are proposed over the years, some of them are proved to have security problems. In this paper, the security of Han et al.'s signcryption scheme is analyzed, and it is proved that it has many… ▽ More

    Submitted 19 March, 2012; v1 submitted 20 April, 2010; originally announced April 2010.

    Comments: 6 Pages, 2 Figures

    MSC Class: 94Axx ACM Class: E.3; K.6.5; D.4.6; K.6.m

    Journal ref: International Journal of Network Security, Vol. 10, No. 1, pp. 51-56, Jan. 2010

  26. A Directly Public Verifiable Signcryption Scheme based on Elliptic Curves

    Authors: M. Toorani, A. A. Beheshti

    Abstract: A directly public verifiable signcryption scheme is introduced in this paper that provides the security attributes of message confidentiality, authentication, integrity, non-repudiation, unforgeability, and forward secrecy of message confidentiality. It provides the attribute of direct public verifiability so anyone can verify the signcryption without any need for any secret information from the c… ▽ More

    Submitted 16 March, 2012; v1 submitted 17 February, 2010; originally announced February 2010.

    Comments: 4 Pages, 2 Figures, 2 Tables

    MSC Class: 94Axx ACM Class: E.3; K.6.5; D.4.6; K.6.m

    Journal ref: Proceedings of the 14th IEEE Symposium on Computers and Communications (ISCC'09), pp.713-716, July 2009

  27. Cryptanalysis of an Efficient Signcryption Scheme with Forward Secrecy Based on Elliptic Curve

    Authors: M. Toorani, A. A. Beheshti

    Abstract: The signcryption is a relatively new cryptographic technique that is supposed to fulfill the functionalities of encryption and digital signature in a single logical step. Several signcryption schemes are proposed throughout the years, each of them having its own problems and limitations. In this paper, the security of a recent signcryption scheme, i.e. Hwang et al.'s scheme is analyzed, and it is… ▽ More

    Submitted 16 March, 2012; v1 submitted 17 February, 2010; originally announced February 2010.

    Comments: 5 Pages, 2 Figures

    MSC Class: 94A60 ACM Class: E.3; K.6.5; D.4.6; K.6.m

    Journal ref: Proceedings of 2008 International Conference on Computer and Electrical Engineering (ICCEE'08), pp.428-432, Dec. 2008

  28. LPKI - A Lightweight Public Key Infrastructure for the Mobile Environments

    Authors: M. Toorani, A. A. Beheshti

    Abstract: The non-repudiation as an essential requirement of many applications can be provided by the asymmetric key model. With the evolution of new applications such as mobile commerce, it is essential to provide secure and efficient solutions for the mobile environments. The traditional public key cryptography involves huge computational costs and is not so suitable for the resource-constrained platforms… ▽ More

    Submitted 16 March, 2012; v1 submitted 17 February, 2010; originally announced February 2010.

    Comments: 6 Pages, 6 Figures

    MSC Class: 94Axx ACM Class: E.3; K.6.5; C.2; D.4.6; H.4.3; K.4.4; C.1.3; K.6.m

    Journal ref: Proceedings of the 11th IEEE International Conference on Communication Systems (IEEE ICCS'08), pp.162-166, Guangzhou, China, Nov. 2008

  29. Solutions to the GSM Security Weaknesses

    Authors: M. Toorani, A. A. Beheshti

    Abstract: Recently, the mobile industry has experienced an extreme increment in number of its users. The GSM network with the greatest worldwide number of users succumbs to several security vulnerabilities. Although some of its security problems are addressed in its upper generations, there are still many operators using 2G systems. This paper briefly presents the most important security flaws of the GSM ne… ▽ More

    Submitted 16 March, 2012; v1 submitted 17 February, 2010; originally announced February 2010.

    Comments: 6 Pages, 2 Figures

    MSC Class: 94Axx ACM Class: C.1.3; C.2; D.4.6; K.6.5; K.6.m; E.3

    Journal ref: Proceedings of the 2nd International Conference on Next Generation Mobile Applications, Services, and Technologies (NGMAST'08), pp.576-581, Cardiff, UK, Sep. 2008

  30. A new approach to content-based file type detection

    Authors: M. C. Amirani, M. Toorani, A. A. Beheshti

    Abstract: File type identification and file type clustering may be difficult tasks that have an increasingly importance in the field of computer and network security. Classical methods of file type detection including considering file extensions and magic bytes can be easily spoofed. Content-based file type detection is a newer way that is taken into account recently. In this paper, a new content-based meth… ▽ More

    Submitted 16 March, 2012; v1 submitted 17 February, 2010; originally announced February 2010.

    Comments: 6 Pages, 5 Figure, 2 Tables

    MSC Class: 94Axx ACM Class: H.3.2; I.5.1; I.2.6; E.5; I.7; C.2; F.1; D.4.3

    Journal ref: Proceedings of the 13th IEEE Symposium on Computers and Communications (ISCC'08), pp.1103-1108, July 2008

  31. SSMS - A Secure SMS Messaging Protocol for the M-payment Systems

    Authors: M. Toorani, A. A. Beheshti

    Abstract: The GSM network with the greatest worldwide number of users, succumbs to several security vulnerabilities. The short message service (SMS) is one of its superior and well-tried services with a global availability in the GSM networks. The main contribution of this paper is to introduce a new secure application layer protocol, called SSMS, to efficiently embed the desired security attributes in the… ▽ More

    Submitted 16 March, 2012; v1 submitted 17 February, 2010; originally announced February 2010.

    Comments: 6 Pages, 5 Figures

    MSC Class: 94Axx ACM Class: E.3; K.6.5; C.2; D.4.6; H.4.3; K.4.4; C.1.3

    Journal ref: Proceedings of the 13th IEEE Symposium on Computers and Communications (ISCC'08), pp.700-705, July 2008