Image steganography and steganalysis: Concepts and practice R Chandramouli, M Kharrazi, N Memon Digital Watermarking: Second International Workshop, IWDW 2003, Seoul, Korea …, 2004 | 627* | 2004 |
Blind source camera identification K Mehdi, HT Sencar, N Memon Image Processing, 2004. ICIP'04. 2004 International Conference on 1, 709-712, 2004 | 479* | 2004 |
Image steganalysis with binary similarity measures M Kharrazi, N Memon EURASIP Journal on Advances in Signal Processing, 2749-2757, 2005 | 346* | 2005 |
ODISSEA: A Peer-to-Peer Architecture for Scalable Web Search and Information Retrieval. T Suel, C Mathur, JW Wu, J Zhang, A Delis, M Kharrazi, X Long, ... WebDB 3, 67-72, 2003 | 239 | 2003 |
Performance study of common image steganography and steganalysis techniques M Kharrazi, HT Sencar, N Memon Journal of Electronic Imaging 15 (4), 041104-041104-16, 2006 | 156 | 2006 |
Benchmarking steganographic and steganalysis techniques M Kharrazi, HT Sencar, N Memon Security, Steganography, and Watermarking of Multimedia Contents VII 5681 …, 2005 | 101 | 2005 |
Cover selection for steganographic embedding M Kharrazi, HT Sencar, N Memon 2006 International Conference on Image Processing, 117-120, 2006 | 100 | 2006 |
Data masking: A new approach for steganography? R Radhakrishnan, M Kharrazi, N Memon The Journal of VLSI Signal Processing 41 (3), 293-303, 2005 | 76 | 2005 |
Improving steganalysis by fusion techniques: A case study with image steganography M Kharrazi, HT Sencar, N Memon Transactions on Data Hiding and Multimedia Security I, 123-137, 2006 | 71 | 2006 |
An anomaly-based botnet detection approach for identifying stealthy botnets S Arshad, M Abbaspour, M Kharrazi, H Sanatkar 2011 IEEE International Conference on Computer Applications and Industrial …, 2011 | 57 | 2011 |
Back to static analysis for kernel-level rootkit detection SA Musavi, M Kharrazi IEEE Transactions on Information Forensics and Security 9 (9), 1465-1476, 2014 | 43 | 2014 |
Sencar, and Nasir Memon M Kharrazi, T Husrev Image steganography: Concepts and practice, 2004 | 30 | 2004 |
Improving a computer networks course using the Partov simulation engine B Momeni, M Kharrazi IEEE Transactions on Education 55 (3), 436-443, 2012 | 24 | 2012 |
VulSlicer: Vulnerability detection through code slicing S Salimi, M Kharrazi Journal of Systems and Software 193, 111450, 2022 | 21 | 2022 |
Nabs: A system for detecting resource abuses via characterization of flow content type K Shanmugasundaram, M Kharrazi, N Memon Computer Security Applications Conference, 2004. 20th Annual, 316-325, 2004 | 21* | 2004 |
Detection of fast-flux botnets through DNS traffic analysis E Soltanaghaei, M Kharrazi Scientia Iranica 22 (6), 2389-2400, 2015 | 20 | 2015 |
PSTEG: steganographic embedding through patching [image steganography] K Petrowski, M Kharrazi, HT Sencar, N Memon Proceedings.(ICASSP'05). IEEE International Conference on Acoustics, Speech …, 2005 | 17 | 2005 |
Payload Attribution via Character Dependent Multi-Bloom Filters MH Haghighat, M Tavakoli, M Kharrazi | 16 | 2013 |
2ploc: Preserving privacy in location-based services AS Amoli, M Kharrazi, R Jalili 2010 IEEE Second International Conference on Social Computing, 707-712, 2010 | 15 | 2010 |
Improving real-world vulnerability characterization with vulnerable slices S Salimi, M Ebrahimzadeh, M Kharrazi Proceedings of the 16th ACM International Conference on Predictive Models …, 2020 | 12 | 2020 |