An image encryption method based on chaos system and AES algorithm A Arab, MJ Rostami, B Ghavami The Journal of Supercomputing 75, 6663-6682, 2019 | 194 | 2019 |
A novel parallel image encryption with chaotic windows based on logistic map MJ Rostami, A Shahba, S Saryazdi, H Nezamabadi-pour Computers & Electrical Engineering 62, 384-400, 2017 | 94 | 2017 |
A novel bit level multiphase algorithm for image encryption based on PWLCM chaotic map A Hasheminejad, MJ Rostami Optik 184, 205-213, 2019 | 68 | 2019 |
An image encryption algorithm using the combination of chaotic maps AA Arab, MJB Rostami, B Ghavami Optik 261, 169122, 2022 | 29 | 2022 |
CoSE: A SRLG-disjoint routing algorithm MJ Rostami, S Khorsandi, AA Khodaparast Fourth European Conference on Universal Multiservice Networks (ECUMN'07), 86-92, 2007 | 29 | 2007 |
Proposing a novel Dynamic AES for image encryption using a chaotic map key management approach M Shariatzadeh, MJ Rostami, M Eftekhari Optik 246, 167779, 2021 | 24 | 2021 |
MSDP with ACO: A maximal SRLG disjoint routing algorithm based on ant colony optimization MJ Rostami, AAE Zarandi, SM Hoseininasab Journal of Network and Computer Applications 35 (1), 394-402, 2012 | 20 | 2012 |
Using well logs to predict a multimin porosity model by optimized spread rbf networks M Baneshi, M Behzadijo, M Rostami, M Schaffie, H Nezamabadi-pour Energy Sources, Part A: Recovery, Utilization, and Environmental Effects 37 …, 2015 | 13 | 2015 |
Chaos-based image encryption using sum operation modulo 4 and 256 MJ Rostami, S Saryazdi, H Nezamabadi-pour, A Shahba IETE Journal of Research 62 (2), 179-188, 2016 | 10 | 2016 |
Accurate estimation of petrophysical indexes by RBF, ANFIS, and MLP Networks M Baneshi, M Schaffie, H Nezamabadi-pour, M Behzadijo, M Rostami Energy Sources, Part A: Recovery, Utilization, and Environmental Effects 37 …, 2015 | 4 | 2015 |
Image encryption using a standard map and a teaching-learning based optimization algorithm M Abedzadeh, MJ Rostami, M Shariatzadeh Multimedia Tools and Applications 82 (19), 29199-29225, 2023 | 2 | 2023 |
An adaptive image encryption scheme guided by fuzzy models M Shariatzadeh, MJ Rostami, M Eftekhari arXiv preprint arXiv:2208.07825, 2022 | 2 | 2022 |
Preventing TMTO Attack in AES-CCMP in IEEE 802.11 i I Saberi, B Shojaie, M Salleh, M Niknafskermani, MJ Rostami Computer Networks: 19th International Conference, CN 2012, Szczyrk, Poland …, 2012 | 1 | 2012 |
Design and implementation of a tool for executable acceptance test driven development A Mazandarani, MJ Rostami, AM Norouzzadeh International Journal of Computer Theory and Engineering 3 (6), 755, 2011 | 1 | 2011 |
Path-shrinking sink mobility in wireless sensor networks V Choubine, MJ Rostami, A Mazandarani 2010 International Conference on Electronics and Information Engineering 1 …, 2010 | 1 | 2010 |
A Fair Request-Grant Matching Algorithm for Fabric Scheduling in Packet Switches MJ Rostami, AA Khodaparast, S Khorsandi 2007 12th IEEE Symposium on Computers and Communications, 877-883, 2007 | 1 | 2007 |
A New Scheme for Image Compression and Encryption Using ECIES, Henon Map, and AEGAN M Shariatzadeh, M Eftekhari, MJ Rostami arXiv preprint arXiv:2208.07635, 2022 | | 2022 |
On Hierarchical Multiple Imputation Method for Handling Missing Data A Sheikhi, A Arabpour, M Khosravi, M Mashinchi, R Pourmousa, ... Journal of Mahani Mathematical Research 10 (2), 103-114, 2021 | | 2021 |
DC to AC Switched-Capacitor Single Source Inverter with Voltage Boosting Capability MJ Rostami, J Adabi, M Rezanejad Journal of Iranian Association of Electrical and Electronics Engineers 18 (2 …, 2021 | | 2021 |
Relay Placement Based on Divide-and-Conquer R Akhlaghinia, A Kavianfar, MJ Rostami International Journal of Computer Theory and Engineering 3 (1), 71, 2011 | | 2011 |