default search action
Shahrokh Ghaemmaghami
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j26]Sajjad Amini, Alireza Heshmati, Shahrokh Ghaemmaghami:
Fast adversarial attacks to deep neural networks through gradual sparsification. Eng. Appl. Artif. Intell. 127(Part B): 107360 (2024) - 2022
- [j25]Amir Bidokhti, Shahrokh Ghaemmaghami:
Compound short- and long-term memory for memory augmented neural networks. Eng. Appl. Artif. Intell. 116: 105450 (2022) - [j24]Alireza Heshmati, Sajjad Amini, Shahrokh Ghaemmaghami, Farokh Marvasti:
Designing Low Coherent Measurement Matrix With Controlled Spectral Norm Via an Efficient Approximation of $\ell _\infty$-Norm. IEEE Signal Process. Lett. 29: 2243-2247 (2022) - [j23]Sajjad Amini, Mohammad Soltanian, Mostafa Sadeghi, Shahrokh Ghaemmaghami:
Non-Smooth Regularization: Improvement to Learning Framework Through Extrapolation. IEEE Trans. Signal Process. 70: 1213-1223 (2022) - [c45]Arya Aftab, Alireza Morsali, Shahrokh Ghaemmaghami:
Multi-Head Relu Implicit Neural Representation Networks. ICASSP 2022: 2510-2514 - [c44]Sajjad Amini, Shahrokh Ghaemmaghami:
Towards Robust Visual Transformer Networks via K-Sparse Attention. ICASSP 2022: 4053-4057 - [c43]Arya Aftab, Alireza Morsali, Shahrokh Ghaemmaghami, Benoît Champagne:
LIGHT-SERNET: A Lightweight Fully Convolutional Neural Network for Speech Emotion Recognition. ICASSP 2022: 6912-6916 - 2020
- [j22]M. Khadem-hosseini, Shahrokh Ghaemmaghami, Azra Abtahi, Saeed Gazor, Farrokh Marvasti:
Error Correction in Pitch Detection Using a Deep Learning Based Classification. IEEE ACM Trans. Audio Speech Lang. Process. 28: 990-999 (2020) - [j21]Mohammad Soltanian, Sajjad Amini, Shahrokh Ghaemmaghami:
Spatio-Temporal VLAD Encoding of Visual Events Using Temporal Ordering of the Mid-Level Deep Semantics. IEEE Trans. Multim. 22(7): 1769-1784 (2020) - [j20]Sajjad Amini, Shahrokh Ghaemmaghami:
Towards Improving Robustness of Deep Neural Networks to Adversarial Perturbations. IEEE Trans. Multim. 22(7): 1889-1903 (2020)
2010 – 2019
- 2019
- [j19]Vahideh Amanipour, Shahrokh Ghaemmaghami:
Median Filtering Forensics in Compressed Video. IEEE Signal Process. Lett. 26(2): 287-291 (2019) - [j18]Mohammad Soltanian, Shahrokh Ghaemmaghami:
Hierarchical Concept Score Postprocessing and Concept-Wise Normalization in CNN-Based Video Event Recognition. IEEE Trans. Multim. 21(1): 157-172 (2019) - [j17]Sajjad Amini, Shahrokh Ghaemmaghami:
A New Framework to Train Autoencoders Through Non-Smooth Regularization. IEEE Trans. Signal Process. 67(7): 1860-1874 (2019) - 2018
- [j16]Arash Jalali, Hassan Farsi, Shahrokh Ghaemmaghami:
A Universal Image Steganalysis System Based On Double Sparse Representation Classification (DSRC). Multim. Tools Appl. 77(13): 16347-16366 (2018) - [j15]Vahideh Amanipour, Shahrokh Ghaemmaghami:
Video-Tampering Detection and Content Reconstruction via Self-Embedding. IEEE Trans. Instrum. Meas. 67(3): 505-515 (2018) - [c42]Bardia Azizian, Shahrokh Ghaemmaghami:
Tampering Detection and Restoration of Compressed Video. ISCISC 2018: 1-5 - [c41]Zahra Esmaeilbeig, Shahrokh Ghaemmaghami:
Compressed Video Watermarking for Authentication and Reconstruction of the Audio Part. ISCISC 2018: 1-6 - 2017
- [i2]Kazem Qazanfari, Shahrokh Ghaemmaghami:
An improvement on LSB+ method. CoRR abs/1709.06726 (2017) - 2015
- [j14]Farshid Farhat, Shahrokh Ghaemmaghami:
Towards blind detection of low-rate spatial embedding in image steganalysis. IET Image Process. 9(1): 31-42 (2015) - [j13]Soodeh Ahani, Shahrokh Ghaemmaghami:
Colour image steganography method based on sparse representation. IET Image Process. 9(6): 496-505 (2015) - [j12]Soodeh Ahani, Shahrokh Ghaemmaghami, Z. Jane Wang:
A Sparse Representation-Based Wavelet Domain Speech Steganography Method. IEEE ACM Trans. Audio Speech Lang. Process. 23(1): 80-91 (2015) - [i1]Hossein Bakhshi Golestani, Shahrokh Ghaemmaghami:
Enhance Robustness of Image-in-Image Watermarking through Data Partitioning. CoRR abs/1501.01758 (2015) - 2014
- [j11]Ehsan Shakeri, Shahrokh Ghaemmaghami:
An extended feature set for blind image steganalysis in contourlet domain. ISC Int. J. Inf. Secur. 6(2): 169-181 (2014) - [c40]Amir Bidokhti, Shahrokh Ghaemmaghami:
A generalized multi-layer information hiding scheme using wet paper coding. ISCISC 2014: 210-213 - 2013
- [j10]Abolfazl Diyanat, Mohammad Ali Akhaee, Shahrokh Ghaemmaghami:
Robust multiplicative video watermarking using statistical modeling. ISC Int. J. Inf. Secur. 5(1): 83-95 (2013) - [j9]Mona Omidyeganeh, Shahrokh Ghaemmaghami, Shervin Shirmohammadi:
Application of 3D-wavelet statistics to video analysis. Multim. Tools Appl. 65(3): 441-465 (2013) - [j8]Mona Omidyeganeh, Shahrokh Ghaemmaghami, Shervin Shirmohammadi:
Group-based spatio-temporal video analysis and abstraction using wavelet parameters. Signal Image Video Process. 7(4): 787-798 (2013) - [c39]Ehsan Shakeri, Shahrokh Ghaemmaghami:
An efficient feature extraction methodology for blind image steganalysis using contourlet transform and Zernike moments. ISCISC 2013: 1-6 - 2012
- [j7]Farshid Farhat, Abolfazl Diyanat, Shahrokh Ghaemmaghami, Mohammad Reza Aref:
Eigenvalues-based LSB steganalysis. ISC Int. J. Inf. Secur. 4(2): 97-106 (2012) - [j6]Mohammad Rabiee, Mahmoud Ahmadian-Attari, Shahrokh Ghaemmaghami:
A Low Complexity NSAF Algorithm. IEEE Signal Process. Lett. 19(11): 716-719 (2012) - [c38]Mona Omidyeganeh, Abbas Javadtalab, Shahrokh Ghaemmaghami, Shervin Shirmohammadi:
A Robust Wavelet-based Approach to Fingerprint Indentification. ICME Workshops 2012: 413-417 - 2011
- [j5]Mona Omidyeganeh, Shahrokh Ghaemmaghami, Shervin Shirmohammadi:
Video Keyframe Analysis Using a Segment-Based Statistical Metric in a Visually Sensitive Parametric Space. IEEE Trans. Image Process. 20(10): 2730-2737 (2011) - [c37]Abolfazl Diyanat, Mohammad Ali Akhaee, Shahrokh Ghaemmaghami:
Robust video watermarking using maximum likelihood decoder. EUSIPCO 2011: 2044-2048 - [c36]Anahita Shojaei-Hashemi, Mostafa Mehdipour-Ghazi, Shahrokh Ghaemmaghami, Hamid Soltanian-Zadeh:
Universal Steganalysis Based on Local Prediction Error in Wavelet Domain. IIH-MSP 2011: 165-168 - [c35]Farshid Farhat, Abolfazl Diyanat, Shahrokh Ghaemmaghami, Mohammad Reza Aref:
Multi-dimensional correlation steganalysis. MMSP 2011: 1-6 - 2010
- [j4]Ehsan Jahangiri, Shahrokh Ghaemmaghami:
Very Low Rate Scalable Speech Coding through Classified Embedded Matrix Quantization. EURASIP J. Adv. Signal Process. 2010 (2010) - [j3]Jalil Shirazi, Shahrokh Ghaemmaghami:
Improvement to speech-music discrimination using sinusoidal model based features. Multim. Tools Appl. 50(2): 415-435 (2010) - [c34]Mahdi Ramezani, Shahrokh Ghaemmaghami:
Adaptive Image Steganography with Mod-4 Embedding Using Image Contrast. CCNC 2010: 1-4 - [c33]Mahdi Ramezani, Shahrokh Ghaemmaghami:
Towards Genetic Feature Selection in Image Steganalysis. CCNC 2010: 1-4 - [c32]Saeed Sarreshtedari, Shahrokh Ghaemmaghami:
High Capacity Image Steganography in Wavelet Domain. CCNC 2010: 1-5 - [c31]Mona Omidyeganeh, Shahrokh Ghaemmaghami, Shervin Shirmohammadi:
Autoregressive Video Modeling through 2D Wavelet Statistics. IIH-MSP 2010: 272-275 - [c30]Zahra Kavehvash, Shahrokh Ghaemmaghami:
On Limits of Embedding in 3D Images Based on 2D Watson's Model. IWDW 2010: 293-304
2000 – 2009
- 2009
- [c29]Saeed Sarreshtedari, Mohsen Ghotbi, Shahrokh Ghaemmaghami:
On the effect of spatial to compressed domains transformation in LSB-based image steganography. AICCSA 2009: 260-264 - [c28]Saeed Reza Khosravirad, Taraneh Eghlidos, Shahrokh Ghaemmaghami:
Higher-order statistical steganalysis of random LSB steganography. AICCSA 2009: 629-632 - [c27]Hossein Malekmohamadi, Shahrokh Ghaemmaghami:
Reduced complexity enhancement of steganalysis of LSB-matching image steganography. AICCSA 2009: 1013-1017 - [c26]Mohammad Ali Akhaee, Shahrokh Ghaemmaghami, Amir Nikooienejad, Farokh Marvasti:
Robust Image Data Hiding Using Geometric Mean Quantization. GLOBECOM 2009: 1-6 - [c25]Saeed Sarreshtedari, Mohsen Ghotbi, Shahrokh Ghaemmaghami:
One-third probability embedding: Less detectable LSB steganography. ICME 2009: 1002-1005 - [c24]Hossein Malekmohamadi, Shahrokh Ghaemmaghami:
Steganalysis of LSB based image steganography using spatial and frequency domain features. ICME 2009: 1744-1747 - [c23]Seyed Mojtaba Seyedhosseini Tarzjani, Shahrokh Ghaemmaghami:
Detection of LSB Replacement and LSB Matching Steganography Using Gray Level Run Length Matrix. IIH-MSP 2009: 787-790 - 2008
- [c22]Ehsan Jahangiri, Shahrokh Ghaemmaghami:
Scalable speech coding at rates below 900 BPS. ICME 2008: 85-88 - [c21]Jalil Shirazi, Shahrokh Ghaemmaghami, Farbod Razzazi:
Improvements in audio classification based on sinusoidal modeling. ICME 2008: 1485-1488 - [c20]Shahrokh Ghaemmaghami, Jalil Shirazi:
Birth-Death Frequencies Variance of Sinusoidal Model - A New Feature for Audio Classification. SIGMAP 2008: 139-144 - 2007
- [c19]Ehsan Jahangiri, Shahrokh Ghaemmaghami:
High Rate Data Hiding in Speech Signal. SIGMAP 2007: 291-296 - 2006
- [c18]Mohammad S. Kiaei, Shahrokh Ghaemmaghami, Shahram Khazaei:
Efficient Fully Format Compliant Selective Scrambling Methods for Compressed Video Streams. AICT/ICIW 2006: 42 - [c17]Amir Houman Sadr, Shahrokh Ghaemmaghami:
A Collusion-Resistant Video Watermarking Scheme. Information Hiding 2006: 343-354 - [c16]Amir Houmansadr, Hamed Pirsiavash, Shahrokh Ghaemmaghami:
Robust Content-Based Video Watermarking Exploiting Motion Entropy Masking Effect. SIGMAP 2006: 252-259 - 2005
- [c15]Mohammad Sayad Haghighi, Shahrokh Ghaemmaghami:
Towards Energy Optimization of Transparent Watermarks using Entropy Masking. EuroIMSA 2005: 259-264 - [c14]Mohammad Sayad Haghighi, Shahrokh Ghaemmaghami:
An Optimal SVD-based Watermarking Framework through Linear Programming. EuroIMSA 2005: 271-274 - [c13]Amir Houman Sadr, Shahrokh Ghaemmaghami:
Robustness Enhancement of Content-Based Watermarks Using Entropy Masking Effect. IWDW 2005: 444-458 - 2004
- [c12]Yousof Erfani, Shahrokh Ghaemmaghami:
Increasing robustness of one bit embedding spread spectrum audio watermarking against malicious attack. Circuits, Signals, and Systems 2004: 69-73 - [c11]Yousof Erfani, Shahrokh Ghaemmaghami:
Improving Robustness of ISS-watermarking against malicious attack. International Conference on Computational Intelligence 2004: 497-501 - [c10]Shahrokh Ghaemmaghami:
Audio Segmentation and Classification based on a Selective Analysis Scheme. MMM 2004: 42-47 - 2003
- [j2]Shahrokh Ghaemmaghami, Mohamed A. Deriche, Sridha Sridharan:
Interpolative coding of speech parameters using hierarchical temporal decomposition. Digit. Signal Process. 13(3): 433-456 (2003) - 2000
- [c9]Shahrokh Ghaemmaghami:
Toward Naturalness in Narrow-Band Speech Compression. IEEE International Conference on Multimedia and Expo (I) 2000: 440-443
1990 – 1999
- 1999
- [c8]Shahrokh Ghaemmaghami, Mohamed A. Deriche:
An improved model for speech excitation using time-frequency characterisation. ISSPA 1999: 47-50 - 1998
- [j1]Shahrokh Ghaemmaghami, Mohamed A. Deriche, Boualem Boashash:
Interpolation of pitch contour using temporal decomposition. Int. J. Speech Technol. 2(3): 215-225 (1998) - [c7]Shahrokh Ghaemmaghami, Mohamed A. Deriche:
A new approach to modeling excitation in very low-rate speech coding. ICASSP 1998: 597-600 - [c6]Shahrokh Ghaemmaghami, Mohamed A. Deriche, Sridha Sridharan:
Hierarchical temporal decomposition: a novel approach to efficient compression of spectral characteristics of speech. ICSLP 1998 - 1997
- [c5]Shahrokh Ghaemmaghami, Mohamed A. Deriche, Boualem Boashash:
Comparative study of different parameters for temporal decomposition based speech coding. ICASSP 1997: 1703-1706 - [c4]Shahrokh Ghaemmaghami, Mohamed A. Deriche, Boualem Boashash:
On modeling event functions in temporal decomposition based speech coding. EUROSPEECH 1997: 1299-1302 - 1996
- [c3]Shahrokh Ghaemmaghami, Mohamed A. Deriche:
A new approach to very low-rate speech coding using temporal decomposition. ICASSP 1996: 224-227 - [c2]Shahrokh Ghaemmaghami, Mohamed A. Deriche, Boualem Boashash:
Formant Detection Through Instantaneous-frequency Estimation Using Recursive Least Square Algorithm. ISSPA 1996: 81-84 - [c1]Shahrokh Ghaemmaghami, Mohamed A. Deriche:
The Effect Of Different Parameter Sets On Reconstructed Speech Quality Using Temporal Decomposition. ISSPA 1996: 764-767
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 22:06 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint