default search action
Mojtaba Mahdavi
This is just a disambiguation page, and is not intended to be the bibliography of an actual person. The links to all actual bibliographies of persons of the same or a similar name can be found below. Any publication listed on this page has not been assigned to an actual author yet. If you know the true author of one of the publications listed below, you are welcome to contact us.
Person information
Other persons with the same name
- Mojtaba Mahdavi 0001 — Lund University, Department of Electrical and Information Technology, Sweden
- Mojtaba Mahdavi 0002 — University of Isfahan, Department of Information Technology Engineering, Iran
- Mojtaba Mahdavi 0003 — University of Auckland Business School, New Zealand
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j14]Masoume Akraminasab, Mojtaba Mahdavi, Hamid Mala:
Enhancing privacy in commit-chains based on blind signature. Expert Syst. Appl. 244: 122920 (2024) - [j13]Morteza Darvish Morshedi Hosseini, Mojtaba Mahdavi, Shahram Etemadi Borujeni:
Modification in spatial, extraction from transform: Keyless side-information steganography for JPEG. J. Vis. Commun. Image Represent. 103: 104249 (2024) - [c14]Mojtaba Mahdavi:
Towards Low-Complexity Hardware Realization of Adaptive Filters. BlackSeaCom 2024: 368-375 - [c13]Mojtaba Mahdavi:
Memristor-Based Square Root Computation for Signal Processing Applications. BlackSeaCom 2024: 376-381 - [c12]Mojtaba Mahdavi:
Efficient Hardware Acceleration of Mean Squared Error Calculation Through In-Memory Computing. COINS 2024: 1-6 - [c11]Mojtaba Mahdavi:
Reconfigurable Band-Stop Filter Design using Computing In Memory. SmartGridComm 2024: 478-484 - [c10]Mojtaba Mahdavi:
Hardware Realization of Vector and Matrix Norm Calculation for Signal Processing Applications. WINCOM 2024: 1-7 - [c9]Mojtaba Mahdavi:
Channel Estimation using Processing In Memory Based on System Identification Technique. WINCOM 2024: 1-8 - 2023
- [j12]Omid Torki, Maede Ashouri-Talouki, Mojtaba Mahdavi:
Hierarchical Deterministic Wallets for Secure Steganography in Blockchain. ISC Int. J. Inf. Secur. 15(1): 73-81 (2023) - [c8]Marcus Valtonen Örnhag, Stefan Ingi Adalbjörnsson, Püren Güler, Mojtaba Mahdavi:
A Critical Look at Recent Trends in Compression of Channel State Information. ICASSP 2023: 1-5 - [i4]Hanieh Rafiee, Mojtaba Mahdavi, AhmadReza NaghshNilchi:
Introducing a New Evaluation Criteria for EMD-Base Steganography Method. CoRR abs/2308.07970 (2023) - 2021
- [c7]Omid Torki, Maede Ashouri-Talouki, Mojtaba Mahdavi:
Blockchain for steganography: advantages, new algorithms and open challenges. ISCISC 2021: 1-5 - [i3]Omid Torki, Maede Ashouri-Talouki, Mojtaba Mahdavi:
Blockchain for steganography: advantages, new algorithms and open challenges. CoRR abs/2101.03103 (2021) - [i2]Samira Hosseini, Mojtaba Mahdavi:
Image content dependent semi-fragile watermarking with localized tamper detection. CoRR abs/2106.14150 (2021) - 2020
- [j11]Sara Akhtari, Neda Moghim, Mojtaba Mahdavi:
Middleman covert channel establishment based on MORE routing protocol using network coding in ad hoc networks. Int. J. Commun. Syst. 33(7) (2020) - [i1]Alireza Parchami, Mojtaba Mahdavi:
Full Quaternion Representation of Color images: A Case Study on QSVD-based Color Image Compression. CoRR abs/2007.09758 (2020)
2010 – 2019
- 2019
- [c6]Arian Balouchestani, Mojtaba Mahdavi, Yeganeh Hallaj, Delaram Javdani:
SANUB: A new method for Sharing and Analyzing News Using Blockchain. ISCISC 2019: 139-143 - 2018
- [j10]Atefeh Mohseni-Ejiyeh, Maede Ashouri-Talouki, Mojtaba Mahdavi:
An Incentive-Aware Lightweight Secure Data Sharing Scheme for D2D Communication in 5G Cellular Networks. ISC Int. J. Inf. Secur. 10(1): 15-27 (2018) - [j9]Pegah Nikbakht Bideh, Mojtaba Mahdavi, Shahram Etemadi Borujeni, Sima Arasteh:
Security analysis of a key based color image watermarking vs. a non-key based technique in telemedicine applications. Multim. Tools Appl. 77(24): 31713-31735 (2018) - [j8]Samira Taheri, Mojtaba Mahdavi, Neda Moghim:
A dynamic timing-storage covert channel in vehicular ad hoc networks. Telecommun. Syst. 69(4): 415-429 (2018) - 2017
- [j7]Mojtaba Mahdavi, Mahdi Shabany:
A 13 Gbps, 0.13 μm CMOS, Multiplication-Free MIMO Detector. J. Signal Process. Syst. 88(3): 273-285 (2017) - [c5]Atefeh Mohseni-Ejiyeh, Maede Ashouri-Talouki, Mojtaba Mahdavi:
A Lightweight and Secure Data Sharing Protocol for D2D Communications. ISCISC 2017: 42-47 - 2016
- [j6]Fatemeh Tahmasbi, Neda Moghim, Mojtaba Mahdavi:
Adaptive ternary timing covert channel in IEEE 802.11. Secur. Commun. Networks 9(16): 3388-3400 (2016) - [j5]Alireza Shafieinejad, Norooz Motamedi, Faramarz Hendessi, Mojtaba Mahdavi:
INCP: Practical Wireless Network Coding for Multiple Unicast Sessions. Wirel. Pers. Commun. 91(2): 623-651 (2016) - [c4]Samira Hosseini, Mojtaba Mahdavi:
Counterfeiting attack on adjusted expanded-bit multiscale quantization-based semi-fragile watermarking technique. ISCISC 2016: 13-19 - [c3]Zahra Hatefi, Mojtaba Mahdavi, Pegah Nikbakht Bideh:
Feature extraction for detection of watermarking algorithm. ISCISC 2016: 32-37 - 2013
- [j4]Mojtaba Mahdavi, Mahdi Shabany:
Novel MIMO Detection Algorithm for High-Order Constellations in the Complex Domain. IEEE Trans. Very Large Scale Integr. Syst. 21(5): 834-847 (2013) - [c2]Arash Ardakani, Mojtaba Mahdavi, Mahdi Shabany:
An efficient VLSI architecture of QPP interleaver/deinterleaver for LTE turbo coding. ISCAS 2013: 797-800 - 2012
- [c1]Katayoun Neshatpour, Mojtaba Mahdavi, Mahdi Shabany:
A low-complexity high-throughput ASIC for the SC-FDMA MIMO detectors. ISCAS 2012: 3065-3068 - 2010
- [j3]Mojtaba Mahdavi, Shadrokh Samavi, Sorina Dumitrescu, Fereshteh Aalamifar, Parisa Abedikhoozani:
Real-Time Steganalysis of LSB-Replacement in Digital Audio Streams. J. Circuits Syst. Comput. 19(7): 1399-1421 (2010) - [j2]Vajiheh Sabeti, Shadrokh Samavi, Mojtaba Mahdavi, Shahram Shirani:
Steganalysis and payload estimation of embedding in pixel differences using neural networks. Pattern Recognit. 43(1): 405-415 (2010)
2000 – 2009
- 2009
- [j1]Vajiheh Sabeti, Shadrokh Samavi, Mojtaba Mahdavi, Shahram Shirani:
Steganalysis of embedding in difference of image pixel pairs by neural network. ISC Int. J. Inf. Secur. 1(1): 17-26 (2009)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-20 22:00 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint