Abolfazl Diyanat

ORCID: 0000-0003-0654-9005
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Advanced Steganography and Watermarking Techniques
  • Image and Video Quality Assessment
  • Digital Media Forensic Detection
  • Chaos-based Image/Signal Encryption
  • Privacy-Preserving Technologies in Data
  • Image and Signal Denoising Methods
  • Mobile Ad Hoc Networks
  • IPv6, Mobility, Handover, Networks, Security
  • Transportation and Mobility Innovations
  • IoT and Edge/Fog Computing
  • Wireless Communication Security Techniques
  • Internet Traffic Analysis and Secure E-voting
  • Opportunistic and Delay-Tolerant Networks
  • Wireless Body Area Networks
  • Indoor and Outdoor Localization Technologies
  • Multimedia Communication and Technology
  • Radio Wave Propagation Studies
  • Advanced Image Processing Techniques
  • Low-power high-performance VLSI design
  • AI in cancer detection
  • Image Processing Techniques and Applications
  • Security in Wireless Sensor Networks
  • Cooperative Communication and Network Coding
  • Mobile Agent-Based Network Management
  • Interconnection Networks and Systems

Iran University of Science and Technology
2020-2025

University of Tehran
2008-2017

Institute for Research in Fundamental Sciences
2016-2017

Sharif University of Technology
2011-2012

Electronics Research Institute
2011

Mobile network operators constantly optimize their networks to ensure superior service quality and coverage. This optimization is crucial for maintaining an optimal user experience requires extensive data collection analysis. One of the primary methods gathering this through drive tests, where technical teams use specialized equipment collect signal information across various regions. However, tests are both costly time-consuming, they face challenges such as traffic conditions,...

10.48550/arxiv.2502.09305 preprint EN arXiv (Cornell University) 2025-02-13

Prostate cancer (Pca) continues to be a leading cause of cancer-related mortality in men, and the limitations precision traditional diagnostic methods such as Digital Rectal Exam (DRE), Prostate-Specific Antigen (PSA) testing, biopsies underscore critical importance accurate staging detection enhancing treatment outcomes improving patient prognosis. This study leverages machine learning deep approaches, along with feature selection extraction methods, enhance PCa pathological predictions...

10.48550/arxiv.2502.09686 preprint EN arXiv (Cornell University) 2025-02-13

Recent studies reveal that an adversary might trace the apparently insignificant traffic rate of source nodes over net and turn such data to invaluable information so as breach privacy victim sources. Inhibiting being able extract from is a complicated task unless taking into consideration flow conservation law effect transmitter queue. A reliable method preserving copes with transmit original packets augmented probabilistically dummy ones change observable aggregated rate. Augmenting...

10.1109/tifs.2016.2515050 article EN IEEE Transactions on Information Forensics and Security 2016-01-06

Caching has been recognized as a viable solution to surmount the limited capability of backhaul links in handling abundant network traffic. Although optimal approaches for minimizing average delivery load do exist, current caching strategies fail avert intelligent adversaries from obtaining invaluable contextual information by inspecting wireless communication and thus, violating users' privacy. Grounded theory, this letter, we propose mathematical model preserving privacy system involving...

10.1109/lcomm.2020.3021919 article EN IEEE Communications Letters 2020-09-04

10.1016/j.jnca.2017.07.015 article EN Journal of Network and Computer Applications 2017-08-08

In today's world, the Internet is recognized as one of essentials human life, playing a significant role in communications, business, and lifestyle. The quality internet services can have widespread negative impacts on individual social levels. Consequently, Quality Service (QoS) has become fundamental necessity for service providers competitive market aiming to offer superior services. success survival these depend their ability maintain high ensure satisfaction.Alongside QoS, concept...

10.48550/arxiv.2406.08564 preprint EN arXiv (Cornell University) 2024-06-12

<title>Abstract</title> In order to design the RAN of a mobile network, it is crucial predict necessary cells and position base stations accurately. This process requires continuous monitoring optimize network quality coverage, considering environmental changes user consumption patterns. One common technique for gathering data on performance across different geographic areas drive testing, which involves traveling through all points designated map, including streets pathways, evaluate...

10.21203/rs.3.rs-4965934/v1 preprint EN Research Square (Research Square) 2024-09-24

Measuring the Quality of Experience (QoE) has become an important research topic, especially in video streaming networks. Since it directly measures customer satisfaction, QoE also becomes interesting topic for network operators. Objective Assessment outperforms applicability high-cost offline subjective procedures. However, quantifying and modeling is still a task with many open challenges. The P.1203 recommendations by ITU-T are distinguished as first standard QoE. This work aims to...

10.22541/au.173115216.61355823/v1 preprint EN Authorea (Authorea) 2024-11-09

We propose a novel image steganalysis method, based on singular value decomposition and noise estimation, for the spatial domain LSB embedding families. first define content independence parameter, DS, that is calculated each rate. Next, we estimate DS curve use estimation to improve approximation accuracy. It shown proposed approach gives an of rate, as well information about existence embedded message (if any). The method can effectively be applied wide range steganography families in...

10.1109/tencon.2011.6129010 article EN 2011-11-01

Multi-dimensional spatial analysis of image pixels have not been much investigated for the steganalysis LSB Steganographic methods. Pixel distribution based methods could be thwarted by intelligently compensating statistical characteristics pixels, as reported in several papers. Simple replacement improved introducing smarter embedding approaches, e.g. matching and LSB+ methods, but they are basically same sense alteration. A new analytical method to detect stego images is proposed this...

10.1109/mmsp.2011.6093791 article EN 2011-10-01

We propose a novel reduced reference quality assessment metric for image transmission rooted in an optimization approach toward parameterized wavelet-based data hiding. The approximation coefficients of one level wavelet transform the original at transmitter are embedded into that horizontal and vertical detail robust invisible manner to be used as feature comparisons receiver side. best type decomposition is obtained by curve fitting process, resulting most optimum parameters terms which...

10.1109/icosp.2008.4697266 article EN 2008-10-01

Non-local means (a.k.a. NL-means) method for image de-noising averages the similar parts of an to reduce random noise. The performance algorithm, however, highly depends on values its parameters. In this paper, we introduce a finding optimum parameters, present linear estimation h parameter, and demonstrate that most important parameter in is almost independent only We also show can be increased by using corner information noisy image. Our modifications result better at less computational cost.

10.1109/icosp.2008.4697264 article EN 2008-10-01

Data Centers (DCs) are required to be scalable large data sets so as accommodate ever increasing demands of resource-limited embedded and mobile devices. Thanks the availability recent high rate millimeter-wave frequency spectrum such 60GHz due favorable attributes this technology, wireless DC (WDC) exhibits potentials being a promising solution especially for small medium scale DCs. This paper investigates problem throughput scalability WDCs using established theory asymptotic multi-hop...

10.48550/arxiv.1506.03551 preprint EN other-oa arXiv (Cornell University) 2015-01-01

Many recent studies reveal that merely encrypting the source content does not inhibit adversary from gaining knowledge about source's behavior. Thus, might be able to extract information network traffic by employing statistical analysis. Based on theory, in this letter, we quantify amount of obtained an overhears channel. We present approach mixes features applications node, such it maximizes ambiguity adversary. Finally, suggest three lower bounds adversary's error probability.

10.1109/lcomm.2016.2558182 article EN IEEE Communications Letters 2016-01-01

So far, various components of image characteristics have been used for steganal- ysis, including the histogram characteristic function, adjacent colors distribu- tion, and sample pair analysis. However, some certain steganography methods proposed that can thwart analysis approaches through man- aging embedding patterns. In this regard, present paper is intended to introduce a new analytical method detecting stego images, which robust against patterns designed specically foil steganalysis...

10.22042/isecure.2013.4.2.1 article EN Isecure. 2012-07-01

In this paper, a robust multiplicative video watermarking scheme is presented. We segment the signal into 3-D blocks like cubes, and then apply wavelet transform to each block. The watermark inserted through multiplying low frequency coefficients by constant parameter that controls power of watermark. proposed extraction procedure based on maximum likelihood rule applied watermarked coefficients.

10.5281/zenodo.42533 article EN 2011-08-29

The present paper is intended to a robust multiplicative video watermarking scheme. In this regard, the signal segmented into 3-D blocks like cubes, and then, wavelet transform applied each block. low frequency components of coefficients are then used for data embedding make process against both malicious unintentional attacks. hidden message inserted through multiplying/dividing these by constant parameter which controls power watermark. watermark extraction relies on maximum...

10.22042/isecure.2013.5.1.6 article EN Isecure. 2013-01-01

Positioning remains a crucial aspect with wide-ranging applications, despite the availability of various solutions and extensive research. The lack transparency surrounding infrastructure topology precise locations base stations operated by telecommunication companies further complicates positioning process. Moreover, as wireless networks continue to evolve advancements like 5G 6G, accurate becomes increasingly important, leveraging vast amounts data artificial intelligence techniques. This...

10.1109/wincom59760.2023.10323029 article EN 2023-10-26
Coming Soon ...