Background
دکتر مائده عاشوری تلوکی

دکتر مائده عاشوری تلوکی

دانشیار

گروه مهندسی فناوری‌اطلاعات
دانشکده مهندسی کامپیوتر

پست الکترونیکی

m.ashouri@eng.ui.ac.ir

آدرس

دانشگاه اصفهان میدان آزادی اصفهان، ایران
کد پستی : 8174673441

برونداد‌های پژوهشی

37

همه موارد

37

مقالات

مرتب سازی بر اساس:

مقالات لاتین
2025

Torki, O., Ashouri, M., Alishahi, M.
Journal of Information Security and Applications (22142126)89
2024

A revocable attribute-based access control with non-monotonic access structure

( Article . )

Ashouri, M., Kahani, N., Barati, M., Abedini, Z.
Annales des Telecommunications/Annals of Telecommunications (00034347)79(11-12)pp. 833-842

Privacy in Generative Models: Attacks and Defense Mechanisms

( Article . )

Azadmanesh, M., Shahgholi, B., Ashouri, M.
pp. 65-89
2023

ADAM-DPGAN: a differential private mechanism for generative adversarial network

( Article . )

Azadmanesh, M., Shahgholi, B., Ashouri, M.
Applied Intelligence (0924669X)53(9)pp. 11142-11161

An Auto-Encoder based Membership Inference Attack against Generative Adversarial Network

( Article . )

Azadmanesh, M., Shahgholi, B., Ashouri, M.
ISeCure (20083076)15(2)pp. 139-153

Hierarchical Deterministic Wallets for Secure Steganography in Blockchain

( Article . )

Torki, O., Ashouri, M., Mahdavi, M.
ISeCure (20083076)15(1)pp. 17-26

On the local convergence of GANs with differential Privacy: Gradient clipping and noise perturbation

( Article . )

Azadmanesh, M., Shahgholi, B., Ashouri, M., Eliasi, H.
Expert Systems with Applications (09574174)224

Optimal Black-Box Traceability in Decentralized Attribute-Based Encryption

( Article . )

Nasiraee, H., Ashouri, M., Liu, X.
IEEE Transactions on Cloud Computing (21687161)11(3)pp. 2459-2472

Privacy-Preserving Attribute-Based Access Control with Non-Monotonic Access Structure

( Article . )

Ashouri, M., Kahani, N., Barati, M.
pp. 32-38

Privacy, reputation, and incentive provision for vehicular social networks

( Article . )

Zamani, S., Torkladani, B., Ashouri, M.
Journal of Reliable Intelligent Environments (21994668)9(4)pp. 447-461
2022

Privacy-Preserving Distributed Data Access Control for CloudIoT

( Article . )

Nasiraee, H., Ashouri, M.
IEEE Transactions on Dependable and Secure Computing (15455971)19(4)pp. 2476-2487
2021

A White-Box Generator Membership Inference Attack Against Generative Models

( Article . )

Azadmanesh, M., Shahgholi, B., Ashouri, M.
pp. 13-17

Blockchain for steganography: advantages, new algorithms and open challenges

( Article . Green )

Torki, O., Ashouri, M., Mahdavi, M.
pp. 1-5
2020

Anonymous decentralized attribute-based access control for cloud-assisted IoT

( Article . )

Nasiraee, H., Ashouri, M.
Future Generation Computer Systems (0167739X)110pp. 45-56

Multi-keyword ranked searchable encryption scheme with access control for cloud storage

( Article . )

Zarezadeh, M., Mala, H., Ashouri, M.
Peer-to-Peer Networking and Applications (19366450)13(1)pp. 207-218
2019

An Efficient Privacy-Preserving Data Aggregation Scheme in Smart Grid

( Article . )

Karampour, A., Ashouri, M., Torkladani, B.
pp. 1967-1971

Developing ghasedak: A mobile application to improve the quality of cancer palliative care

( Article . Green )

Salimian, N., Ehteshami, A., Ashouri, M.
Acta Informatica Medica (03538109)27(1)pp. 19-22

DoS-Resistant Attribute-Based Encryption in Mobile Cloud Computing with Revocation

( Article . Bronze )

Nasiraee, H., Ashouri, M.
International Journal of Engineering Transactions C: Aspects (24237167)32(9)pp. 1290-1298

Efficient privacy-preserving group-nearest-neighbor queries with the presence of active adversaries

( Article . )

Azizi, S., Ashouri, M., Mala, H.
Wireless Networks (10220038)25(8)pp. 4799-4814

Lightweight and anonymous three-factor authentication and access control scheme for real-time applications in wireless sensor networks

( Article . )

Adavoudi-jolfaei, A., Ashouri, M., Aghili, S.F.
Peer-to-Peer Networking and Applications (19366450)12(1)pp. 43-59
2018

An efficient privacy-preserving P2P protocol for computing maximum value in the presence of active adversaries

( Article . )

Ashouri, M.
Peer-to-Peer Networking and Applications (19366450)11(1)pp. 34-43

Dependable and Robust Attribute-Based Encryption in Mobile Cloud Computing

( Article . )

Nasiraee, H., Ashouri, M.
pp. 1536-1541

DoS, impersonation and de-synchronization attacks against an ultra-lightweight RFID mutual authentication protocol for IoT

( Article . )

Aghili, S.F., Ashouri, M., Mala, H.
Journal of Supercomputing (15730484)74(1)pp. 509-525

Toward signature extraction of Metasploit encoding algorithms using static analysis

( Article . )

Ramezani-chemazi, M., Ashouri, M.
International Journal of Security and Networks (17478413)13(2)pp. 71-83
2017

A Lightweight and Secure Data Sharing Protocol for D2D Communications

( Article . )

Mohseni-ejiyeh, A., Ashouri, M., Mahdavi, M.
pp. 42-47

BlindLocation: Supporting user location privacy using blind signature

( Article . )

Ashouri, M., Baraani-dastjerdi, A., Movahedinia, N.
2017pp. 53-59

Cryptographic collusion-resistant protocols for secure sum

( Article . )

Ashouri, M., Baraani-dastjerdi, A.
International Journal of Electronic Security and Digital Forensics (17519128)9(1)pp. 19-34

Lightweight and Secure Authentication Protocol for the Internet of Things in Vehicular Systems

( Article . )

Arasteh, S., Ashouri, M., Aghili, S.F.
pp. 93-98

SeVR+: Secure and privacy-aware cloud-assisted video reporting service for 5G vehicular networks

( Article . )

Mohseni-ejiyeh, A., Ashouri, M.
pp. 2159-2164
2015

The Cloaked-Centroid protocol: location privacy protection for a group of users of location-based services

( Article . )

Ashouri, M., Baraani-dastjerdi, A., Selçuk, A.A.
Knowledge and Information Systems (02191377)45(3)pp. 589-615
2014

Anonymous electronic voting protocol with deniable authentication for mobile ad hoc networks

( Article . Bronze )

Ashouri, M., Baraani-dastjerdi, A.
International Journal of Multimedia and Ubiquitous Engineering (discontinued) (19750080)9(1)pp. 361-368
2013

Preserving location privacy for a group of users

( Article . Bronze )

Ashouri, M., Baraani-dastjerdi, A., Selçuk, A.A.
Turkish Journal Of Electrical Engineering And Computer Sciences (13000632)21(SUPPL. 1)pp. 1857-1870
2012

GLP: A cryptographic approach for group location privacy

( Article . )

Ashouri, M., Baraani-dastjerdi, A., Selçuk, A.A.
Computer Communications (1873703X)35(12)pp. 1527-1533

Homomorphic encryption to preserve location privacy

( Article )

Ashouri, M., Baraani-dastjerdi, A.
International Journal of Security and its Applications (discontinued) (17389976)6(4)pp. 183-190
2009

K-anonymity privacy protection using ontology

( Article . )

Ashouri, M., Nematbakhsh, M.A., Baraani, A.
pp. 682-685