Suivre
Jeffrey Alan Young
Titre
Citée par
Citée par
Année
Dangerous skills got certified: Measuring the trustworthiness of skill certification in voice personal assistant platforms
L Cheng, C Wilson, S Liao, J Young, D Dong, H Hu
Proceedings of the 2020 ACM SIGSAC Conference on Computer and Communications …, 2020
822020
{SkillDetective}: Automated {Policy-Violation} detection of voice assistant applications in the wild
J Young, S Liao, L Cheng, H Hu, H Deng
31st USENIX Security Symposium (USENIX Security 22), 2022
352022
Configurable anonymous authentication schemes for the Internet of Things (IoT)
A Rasheed, RR Hashemi, A Bagabas, J Young, C Badri, K Patel
2019 IEEE International Conference on RFID (RFID), 1-8, 2019
142019
An RNN Model for Exploring the Macroeconomic and Financial Indicators in the Context of the COVID-19 Pandemic
RR Hashemi, OM Ardakani, JA Young, AG Baharami
2022 International Conference on Computational Science and Computational …, 2022
42022
Extraction of the Essential Constituents of the S&P 500 Index
RR Hashemi, OM Ardakani, AA Bahrami, JA Young
2017 international conference on computational science and computational …, 2017
42017
A Mediated Multi-RNN Hybrid System for Prediction of Stock Prices
RR Hashemi, OM Ardakani, AA Bahrami, JA Young
2020 International Conference on Computational Science and Computational …, 2020
32020
A Mining Driven Decision Support System for Joining the European Monetary Union
RR Hashemi, O Ardakani, A Bahrami, J Young, R Campbell
The Eighth International Conference on Advances in Information Mining and …, 2018
32018
Vaccine: A Block Cipher Method for Masking and Unmasking of Ciphertexts’ Features
RR Hashemi, A Rasheed, A Bahrami, J Young
The Second International Conference on Cyber-Technologies and Cyber-Systems …, 2017
22017
Mining the Impact of Social Media on High-Frequency Financial data
RR Hashemi, OM Ardakani, JA Young, C Tamrakar
2021 International Conference on Computational Science and Computational …, 2021
12021
Discovery of burglary hotspots and extraction of their features
A Little, RR Hashemi, JA Young
2020 International Conference on Computational Science and Computational …, 2020
12020
A Methodological Framework for Validating ZKP Authentication Process
JA Young, A Rasheed, RR Heshemi, A Bagabas
2020 IEEE 17th International Conference on Smart Communities: Improving …, 2020
12020
IoT Security Through Device Profiling
JA Young
12019
10 RNN models for evaluating financial indices: examining volatility and demand-supply shifts in financial markets during COVID-19
RR Hashemi, OM Ardakani, J Young, AG Bahrami
Big Data, Data Mining and Data Science: Algorithms, Infrastructures …, 2024
2024
Effects of Phenotypical Patterns on Epigenetic Markers
RR Hashemi, AA Bahrami, JA Young, A Schrey, T Robbins, A Ragsdale, ...
2018 International Conference on Computational Science and Computational …, 2018
2018
A Block Cipher Masking Technique for Single and Multi-Paired-User Environments
RR Hashemi, A Rasheed, J Young, AA Bahrami
International Journal on Advances in Security 11 (1-2), 180, 2018
2018
Mining Diatom Algae Fossil Data for Discovering Past Lake Salinity
RR Hashemi, AA Bahrami, JA Young, NR Tyler, JYS Hodgson
IADIS International Journal on Computer Science & Information Systems 12 (2), 2017
2017
An Ecological-Based Genetic Investigation Using Association Analysis Approach BIOCOMP’16
RR Hashemi, A Bahrami, JA Young, AW Schrey
Proceedings of the 17th International Conference on Bioinformatics and …, 2017
2017
Extraction of Historical Water Salinity from Diatom Algae Fossils: A Data Mining Approach
RR Hashemi, AA Bahrami, JA Young, NR Tyler, J Hodgson
2016
A Grid Based Analysis Approach for Learning From Sparse Data
RR Hashemi, M Bahar, N Tang, J Young
2003
Privacy Preserved Authentication: A Neural Network Approach
RR Hashemi, A Rasheed, J Young, AA Bahrami
Le système ne peut pas réaliser cette opération maintenant. Veuillez réessayer plus tard.
Articles 1–20