Background
دکتر مجتبی مهدوی

دکتر مجتبی مهدوی

استادیار

گروه مهندسی فناوری‌اطلاعات
دانشکده مهندسی کامپیوتر

پست الکترونیکی

m.mahdavi@eng.ui.ac.ir

آدرس

دانشگاه اصفهان میدان آزادی اصفهان، ایران
کد پستی : 8174673441


برونداد‌های پژوهشی
35

همه موارد

35

مقالات

مرتب سازی بر اساس:

مقالات لاتین
2025

Rafiei, H., Mahdavi, M., Naghshnilchi, A.R.
Publication Date: 2025
Journal of Supercomputing (15730484)81(14)
Heydari, G., Mahdavi, M., Mala, H.
Publication Date: 2025
SN Computer Science (2662995X)6(6)
Mahvash, M., Moghim, N., Mahdavi, M., Amiri, M., Shetty, S.
Publication Date: 2025
Pervasive and Mobile Computing (15741192)106

Mobile crowd sensing based spectrum monitoring with privacy protection and malicious behavior detection using hyperledger fabric and identity mixer

( Article . )

Yaqoubi, Z., Shahgholi, B., Seifhashemi, F., Mahdavi, M.
Publication Date: 2025
Journal of Supercomputing (15730484)81(7)

NGEMD & ADV-NGEMD: a unified framework for high-capacity, efficient, and adversarially secure image steganography

( Article . )

Rafiei, H., Mahdavi, M., Naghshnilchi, A.R.
Publication Date: 2025
Journal of Visual Communication and Image Representation (10473203)112

Preventing collusion in secure computation with preprocessing via function secret sharing

( Article . )

Heydari, G., Mahdavi, M., Mala, H.
Publication Date: 2025
Expert Systems with Applications (09574174)289
2024

Enhancing privacy in commit-chains based on blind signature

( Article . )

Akraminasab, M., Mahdavi, M., Mala, H.
Publication Date: 2024
Expert Systems with Applications (09574174)244

Modification in spatial, extraction from transform: Keyless side-information steganography for JPEG

( Article . )

Darvish morshedi hosseini, M., Mahdavi, M., Etemadi borujeni, S.
Publication Date: 2024
Journal of Visual Communication and Image Representation (10473203)103
2023

Hierarchical Deterministic Wallets for Secure Steganography in Blockchain

( Article . )

Torki, O., Ashouri, M., Mahdavi, M.
Publication Date: 2023
ISeCure (20083076)15(1)pp. 17-26
2021

Blockchain for steganography: advantages, new algorithms and open challenges

( Article . Green )

Torki, O., Ashouri, M., Mahdavi, M.
Publication Date: 2021
pp. 1-5
2020

A reliable and efficient micro-protocol for data transmission over an RTP-based covert channel

( Article . )

Azadmanesh, M., Mahdavi, M., Shahgholi, B.
Publication Date: 2020
Multimedia Systems (14321882)26(2)pp. 173-190

A Semi-blind Watermarking Method for Authentication of Face Images Using Autoencoders

( Article . )

Mahdavi, M., Khalilidan S., Balouchestani, A., Moti Z., Hallaj, Y.
Publication Date: 2020
2025 29th International Computer Conference, Computer Society of Iran, CSICC 2025pp. 229-233

Middleman covert channel establishment based on MORE routing protocol using network coding in ad hoc networks

( Article . )

Akhtari, S., Moghim, N., Mahdavi, M.
Publication Date: 2020
International Journal of Communication Systems (10991131)33(7)
2019

SANUB: A new method for sharing and analyzing news using blockchain

( Article . )

Mahdavi, M., Balouchestani, A., Hallaj, Y., Javdani D.
Publication Date: 2019
2025 29th International Computer Conference, Computer Society of Iran, CSICC 2025pp. 139-143
2018

A dynamic timing-storage covert channel in vehicular ad hoc networks

( Article . )

Taheri, S., Mahdavi, M., Moghim, N.
Publication Date: 2018
Telecommunication Systems (10184864)69(4)pp. 415-429

Security analysis of a key based color image watermarking vs. a non-key based technique in telemedicine applications

( Article . )

Bideh, P.N., Mahdavi, M., Etemadi borujeni, S., Arasteh, S.
Publication Date: 2018
Multimedia Tools and Applications (13807501)77(24)pp. 31713-31735

Security Analysis of two Key Based Watermarking Schemes Based on QR Decomposition

( Article . )

Mahdavi, M., Arasteh S., Bideh, P.N., Hosseini S., Chapnevis A., Arasteh, S.
Publication Date: 2018
2025 29th International Computer Conference, Computer Society of Iran, CSICC 2025pp. 1499-1504
2017

A Lightweight and Secure Data Sharing Protocol for D2D Communications

( Article . )

Mohseni-ejiyeh, A., Ashouri, M., Mahdavi, M.
Publication Date: 2017
pp. 42-47

Binary middleman covert channel in ExOR protocol

( Article . )

Mahdavi, M., Akhtari, S., Moghim, N.
Publication Date: 2017
2025 29th International Computer Conference, Computer Society of Iran, CSICC 2025pp. 1469-1474
2016

Adaptive ternary timing covert channel in IEEE 802.11

( Article . Hybrid Gold )

Tahmasbi, F., Moghim, N., Mahdavi, M.
Publication Date: 2016
Security and Communication Networks (discontinued) (19390122)9(16)pp. 3388-3400

Counterfeiting attack on adjusted expanded-bit multiscale quantization-based semi-fragile watermarking technique

( Article . )

Mahdavi, M., Hosseini S.
Publication Date: 2016
2025 29th International Computer Conference, Computer Society of Iran, CSICC 2025pp. 13-19

Feature extraction for detection of watermarking algorithm

( Article . )

Mahdavi, M., Hatefi Z., Nikbakht P.
Publication Date: 2016
2025 29th International Computer Conference, Computer Society of Iran, CSICC 2025pp. 32-37

INCP: Practical Wireless Network Coding for Multiple Unicast Sessions

( Article . )

Shafieinejad, A., Motamedi, N., Hendessi, F., Mahdavi, M.
Publication Date: 2016
Wireless Personal Communications (1572834X)91(2)pp. 623-651

Modification in spatial, extraction from transform: A new approach for JPEG steganography

( Article . )

Mahdavi, M., Darvish morshedi hosseini, M.
Publication Date: 2016
2025 29th International Computer Conference, Computer Society of Iran, CSICC 2025pp. 134-140

Ternary timing covert channel in wireless 802.11

( Article . )

Mahdavi, M., Tahmasbi, F., Moghim, N.
Publication Date: 2016
2025 29th International Computer Conference, Computer Society of Iran, CSICC 2025pp. 73-78
2015

Code-based timing Covert channel in IEEE 802.11

( Article . )

Mahdavi, M., Tahmasbi, F., Moghim, N.
Publication Date: 2015
2025 29th International Computer Conference, Computer Society of Iran, CSICC 2025pp. 12-17

F plus KS: A new feature selection strategy for steganalysis

( Article . )

Mahdavi, M., Darvish morshedi hosseini, M.
Publication Date: 2015
2025 29th International Computer Conference, Computer Society of Iran, CSICC 2025

Targeted dewatermarking of two non-blind SVD-based image watermarking schemes

( Article . )

Mahdavi, M., Nikbakht P.
Publication Date: 2015
2025 29th International Computer Conference, Computer Society of Iran, CSICC 2025pp. 80-86

Targeted watermark removal of a SVD-based image watermarking scheme

( Article . )

Mahdavi, M., Nikbakht P.
Publication Date: 2015
2025 29th International Computer Conference, Computer Society of Iran, CSICC 2025

Threshold feature selection (TFS), an improvement over forward selection in steganalysis feature selection

( Article . )

Mahdavi, M., Darvish morshedi hosseini, M.
Publication Date: 2015
2025 29th International Computer Conference, Computer Society of Iran, CSICC 2025pp. 187-194
2014

Improving reversible image watermarking using additive interpolation technique

( Article . )

Mahdavi, M., Khorramdin M., Amini M., Torabi, N.
Publication Date: 2014
2025 29th International Computer Conference, Computer Society of Iran, CSICC 2025pp. 961-965
2012

Robust audio watermarking based on HWD and SVD

( Article . )

Karimimehr, S., Samavi s., S., Rezaee kaviani, H., Mahdavi, M.
Publication Date: 2012
pp. 1363-1367
2010

Real-time steganalysis of LSB-replacement in digital audio streams

( Article . )

Mahdavi, M., Samavi s., S., Dumitrescu, S., Aalamifar, F., Abedikhoozani, P.
Publication Date: 2010
Journal of Circuits, Systems and Computers (17936454)19(7)pp. 1399-1421

Steganalysis and payload estimation of embedding in pixel differences using neural networks

( Article . )

Sabeti, V., Samavi s., S., Mahdavi, M., Shirani s., S.
Publication Date: 2010
Pattern Recognition (00313203)43(1)pp. 405-415
2007

Steganalysis of pixel-value differencing steganographic method

( Article . )

Sabeti, V., Samavi s., S., Mahdavi, M., Shirani s., S.
Publication Date: 2007
pp. 292-295