Personal information

Verified email addresses

Security, Privacy, Machine Learning, Federated Learning, Blockchain
Iran

Biography

Reza Fotohi is a researcher specializing in AI security and privacy with an extensive academic and research background. He earned his Ph.D. in Computer Software Engineering from Shahid Beheshti University (SBU), Tehran, ranking 17th in the national Ph.D. entrance exam (2019) and graduating as a top student with a GPA of 19/20. He has published extensively in high‑impact journals on cybersecurity and privacy, with over 1,813 citations, an h‑index of 28, and an i10‑index of 35. Dr. Reza Fotohi has been recognized among the World’s Top 2% of Scientists by Stanford University (2021, 2022, 2023, and 2024). He has served as a reviewer for leading journals, including IEEE Communications Surveys and Tutorials, IEEE Internet of Things Journal, IEEE Transactions on Artificial Intelligence, IEEE Transactions on Reliability, ACM Transactions on Privacy and Security, Applied Soft Computing, Artificial Intelligence Review, and Computers & Security. His research focuses on developing secure and lightweight AI‑driven models, particularly in privacy‑preserving federated learning (PPFL) models for intelligent enterprises.

Activities

Education and qualifications (1)

Shahid Beheshti University: Tehran, Tehran, IR

2019-09-23 to 2025-01-07 | Ph.D. (Faculty of Computer Science and Engineering)
Education
Source: Self-asserted source
Reza Fotohi

Professional activities (14)

Stanford University: Stanford, US

2024 | Recognized among the top 2% of researchers worldwide
Distinction
Source: Self-asserted source
Reza Fotohi

University of Applied Science and Technology: Ardabil, Ardabil, IR

2023 | University’s Top Lecturer, Ardabil, Iran (Computer Engineering)
Distinction
Source: Self-asserted source
Reza Fotohi

Stanford University: Stanford, US

2023 | Recognized among the top 2% of researchers worldwide (Computer Engineering)
Distinction
Source: Self-asserted source
Reza Fotohi

National Elite Foundation: Tehran, Tehran, IR

2023 | Selected to use the student facilities in Tehran, Iran
Distinction
Source: Self-asserted source
Reza Fotohi

Stanford University: Stanford, US

2022 | Recognized among the top 2% of researchers worldwide
Distinction
Source: Self-asserted source
Reza Fotohi

National Elite Foundation: Tehran, Tehran, IR

2022 | Selected to use the student facilities in Tehran, Iran
Distinction
Source: Self-asserted source
Reza Fotohi

5th National Conference on Advances in Enterprise Architecture (NCAEA): Mashhad, Tehran, IR

2022 | Best Paper Award (Computer Engineering)
Distinction
Source: Self-asserted source
Reza Fotohi

Stanford University: Stanford, US

2021 | Recognized among the top 2% of researchers worldwide
Distinction
Source: Self-asserted source
Reza Fotohi

National Elite Foundation: Tehran, Tehran, IR

2021 | Selected to use the student facilities in Tehran, Iran
Distinction
Source: Self-asserted source
Reza Fotohi

National Organization of Educational Testing: Tehran, Tehran, IR

2019 | Ranked 17th in the Nationwide Ph.D. Entrance Exam among 2,367 participants, Iran
Distinction
Source: Self-asserted source
Reza Fotohi

Islamic Azad University Shabestar: Shabestar, IR

2014 | Ranked among the top 3 outstanding M.Sc. students in East Azerbaijan, Iran (Computer Engineering)
Distinction
Source: Self-asserted source
Reza Fotohi

Islamic Azad University Shabestar: Shabestar, IR

2014 | Outstanding Thesis Award (M.Sc.), East Azerbaijan, Iran (Computer Engineering)
Distinction
Source: Self-asserted source
Reza Fotohi

Islamic Azad University Shabestar: Shabestar, IR

2014 | Outstanding Researcher Award (M.Sc.), East Azerbaijan, Iran (Computer Engineering)
Distinction
Source: Self-asserted source
Reza Fotohi

University of Applied Science and Technology: Shabestar, East Azerbaijan, IR

2010 | Ranked among the top 3 outstanding B.Sc. students, East Azerbaijan, Iran. (Computer Engineering)
Distinction
Source: Self-asserted source
Reza Fotohi

Works (44)

A Lightweight and Secure Deep Learning Model for Privacy-Preserving Federated Learning in Intelligent Enterprises

IEEE Internet of Things Journal
2024 | Journal article | Author
Part of ISSN: 2327-4662
Part of ISSN: 2372-2541
Contributors: Reza Fotohi; Fereidoon Shams Aliee; Bahar Farahani
Source: Self-asserted source
Reza Fotohi

Decentralized and robust privacy-preserving model using blockchain-enabled Federated Deep Learning in intelligent enterprises

Applied Soft Computing
2024-08 | Journal article | Author
Part of ISSN: 1568-4946
Contributors: Reza Fotohi; Fereidoon Shams Aliee; Bahar Farahani
Source: Self-asserted source
Reza Fotohi

Hardening of the Internet of Things by using an intrusion detection system based on deep learning

Cluster Computing
2023 | Journal article
Contributors: Varastan, Bahman; Jamali, Shahram; Fotohi, Reza
Source: check_circle
Web of Science Researcher Profile Sync

A reliable and secure method for network-layer attack discovery and elimination in mobile ad-hoc networks based on a probabilistic threshold

Security and Privacy
2022 | Journal article
Contributors: Ebazadeh, Yaser; Fotohi, Reza
Source: check_circle
Web of Science Researcher Profile Sync

A Request Redirection Algorithm in Content Delivery Network: Using PROMETHEE Approach

Wireless Personal Communications
2022 | Journal article
Contributors: Khansoltani, Amin; Jamali, Shahram; Fotohi, Reza
Source: check_circle
Web of Science Researcher Profile Sync

A Self-Adaptive Intrusion Detection System for Securing UAV-to-UAV Communications Based on the Human Immune System in UAV Networks

Journal of Grid Computing
2022 | Journal article
Contributors: Fotohi, Reza; Abdan, Masoud; Ghasemi, Sanaz
Source: check_circle
Web of Science Researcher Profile Sync

An Approach to Environmental Monitoring in Sparse Linear Wireless Sensor Networks for Energy Conservation Using Dual Sinks

Wireless Personal Communications
2022 | Journal article
Contributors: Pakdel, Hossein; JahanshahinAff, Mohsen; Fotohi, Reza
Source: check_circle
Web of Science Researcher Profile Sync

Federated Learning: Solutions, Challenges, and Promises

2022 6th Iranian Conference on Advances in Enterprise Architecture (ICAEA)
2022-11-16 | Conference paper
Contributors: Reza Fotohi; Fereidoon Shams Aliee; Bahar Farahani
Source: Self-asserted source
Reza Fotohi

A firefly algorithm for power management in wireless sensor networks (WSNs)

The Journal of Supercomputing
2021 | Journal article
Contributors: Pakdel, Hossein; Fotohi, Reza
Source: check_circle
Web of Science Researcher Profile Sync

Big Data-Aware Intrusion Detection System in Communication Networks: a Deep Learning Approach

Journal of Grid Computing
2021 | Journal article
Contributors: Mahdavisharif, Mahzad; Jamali, Shahram; Fotohi, Reza
Source: check_circle
Web of Science Researcher Profile Sync

Congestion Control in High-speed Networks Using the Probabilistic Estimation Approach

ArXiv
2021 | Journal article
Contributors: Jamali, Shahram; Mahmoud Talebi, Mir; Fotohi, Reza
Source: check_circle
Web of Science Researcher Profile Sync

Performance-aware placement and chaining scheme for virtualized network functions: a particle swarm optimization approach

The Journal of Supercomputing
2021 | Journal article
Contributors: Asgari, Samane; Jamali, Shahram; Fotohi, Reza; Nooshyar, Mahdi
Source: check_circle
Web of Science Researcher Profile Sync
grade
Preferred source (of 3)‎

Securing communication between things using blockchain technology based on authentication and SHA-256 to improving scalability in large-scale IoT

Computer Networks
2021 | Journal article
Contributors: Fotohi, Reza; Aliee, Fereidoon Shams
Source: check_circle
Web of Science Researcher Profile Sync

A Crisis-driven e-Learning Capability Maturity Model in the Age of COVID-19 : Process-based Maturity Assessment

2021 5th National Conference on Advances in Enterprise Architecture (NCAEA)
2021-12-01 | Conference paper
Contributors: Hanieh Kashfi; Bahar Farahani; Reza Fotohi; Fereidoon Shams Aliee
Source: Self-asserted source
Reza Fotohi

A Lightweight and Scalable Physical Layer Attack Detection Mechanism for the Internet of Things (IoT) Using Hybrid Security Schema

Wireless Personal Communications
2021-08 | Journal article | Author
Part of ISSN: 0929-6212
Part of ISSN: 1572-834X
Contributors: Reza Fotohi; Hossein Pakdel
Source: Self-asserted source
Reza Fotohi
grade
Preferred source (of 2)‎

Defense against flooding attacks using probabilistic thresholds in the internet of things ecosystem

Security and Privacy
2021-05 | Journal article | Author
Part of ISSN: 2475-6725
Part of ISSN: 2475-6725
Contributors: Seyed Meysam Zarei; Reza Fotohi
Source: Self-asserted source
Reza Fotohi

File fragment recognition based on content and statistical features

Multimedia Tools and Applications
2021-05 | Journal article | Author
Part of ISSN: 1380-7501
Part of ISSN: 1573-7721
Contributors: Marzieh Masoumi; Ahmad Keshavarz; Reza Fotohi
Source: Self-asserted source
Reza Fotohi
grade
Preferred source (of 2)‎

Congestion control in high‐speed networks using the probabilistic estimation approach

International Journal of Communication Systems
2021-05-10 | Journal article | Author
Part of ISSN: 1074-5351
Part of ISSN: 1099-1131
Contributors: shahram jamali; Mir Mahmoud Talebi; Reza Fotohi
Source: Self-asserted source
Reza Fotohi

A method based on encryption and node rating for securing the RPL protocol communications in the IoT ecosystem

International Journal of Communication Systems
2021-02 | Journal article | Author
Part of ISSN: 1074-5351
Part of ISSN: 1099-1131
Contributors: Mina Zaminkar; Fateme Sarkohaki; Reza Fotohi
Source: Self-asserted source
Reza Fotohi
grade
Preferred source (of 2)‎

Online rating system development using blockchain-based distributed ledger technology

Wireless Networks
2021-01-08 | Journal article
Part of ISSN: 1022-0038
Part of ISSN: 1572-8196
Source: Self-asserted source
Reza Fotohi
grade
Preferred source (of 2)‎

Securing Wireless Sensor Networks Against Denial-of-Sleep Attacks Using RSA Cryptography Algorithm and Interlock Protocol

ArXiv
2020 | Journal article
Contributors: Fotohi, Reza; Firoozi Bari, Somayyeh; Yusefi, Mehdi
Source: check_circle
Web of Science Researcher Profile Sync

An agent-based self-protective method to secure communication between UAVs in unmanned aerial vehicle networks

Vehicular Communications
2020-12 | Journal article | Author
Part of ISSN: 2214-2096
Contributors: Reza Fotohi; Eslam Nazemi; Fereidoon Shams Aliee
Source: Self-asserted source
Reza Fotohi
grade
Preferred source (of 3)‎

Secure communication between UAVs using a method based on smart agents in unmanned aerial vehicles

The Journal of Supercomputing
2020-11-02 | Journal article
Part of ISSN: 0920-8542
Part of ISSN: 1573-0484
Source: Self-asserted source
Reza Fotohi
grade
Preferred source (of 4)‎

SoS-RPL: Securing Internet of Things Against Sinkhole Attack Using RPL Protocol-Based Node Rating and Ranking Mechanism

Wireless Personal Communications
2020-09-16 | Journal article
Part of ISSN: 0929-6212
Part of ISSN: 1572-834X
Source: Self-asserted source
Reza Fotohi
grade
Preferred source (of 3)‎

Securing Wireless Sensor Networks Against Denial‐of‐Sleep Attacks Using RSA Cryptography Algorithm and Interlock Protocol

International Journal of Communication Systems
2020-03 | Journal article | Author
Part of ISSN: 1074-5351
Part of ISSN: 1099-1131
Contributors: Reza Fotohi; Somayyeh Firoozi Bari; Mehdi Yusefi
Source: Self-asserted source
Reza Fotohi

Securing of Unmanned Aerial Systems (UAS) against security threats using human immune system

Reliability Engineering & System Safety
2020-01 | Journal article
Part of ISSN: 0951-8320
Contributors: Reza Fotohi
Source: Self-asserted source
Reza Fotohi
grade
Preferred source (of 2)‎

Multi-level trust-based intelligence schema for securing of internet of things (IoT) against security threats using cryptographic authentication

The Journal of Supercomputing
2020-01-10 | Journal article
Part of ISSN: 0920-8542
Part of ISSN: 1573-0484
Source: Self-asserted source
Reza Fotohi
grade
Preferred source (of 2)‎

NIASHPT: a novel intelligent agent-based strategy using hello packet table (HPT) function for trust Internet of Things

The Journal of Supercomputing
2020-01-08 | Journal article
Part of ISSN: 0920-8542
Part of ISSN: 1573-0484
Source: Self-asserted source
Reza Fotohi

A novel countermeasure technique to protect WSN against denial-of-sleep attacks using firefly and Hopfield neural network (HNN) algorithms

The Journal of Supercomputing
2020-01-07 | Journal article
Part of ISSN: 0920-8542
Part of ISSN: 1573-0484
Source: Self-asserted source
Reza Fotohi
grade
Preferred source (of 2)‎

An Artificial Immune Based Approach for Detection and Isolation Misbehavior Attacks in Wireless Networks

Journal of Computers
2018 | Journal article
Part of ISSN: 1796-203X
Source: Self-asserted source
Reza Fotohi
grade
Preferred source (of 2)‎

An Artificial Immune System based Method for Defense against Wormhole Attack in Mobile Adhoc Networks

TABRIZ JOURNAL OF ELECTRICAL ENGINEERING
2018 | Journal article
Source: Self-asserted source
Reza Fotohi

An Efficient Routing Protocol in Mobile Ad-hoc Networks by using Artificial Immune System

International Journal of Advanced Computer Science and Applications
2017 | Journal article
Part of ISSN: 2156-5570
Part of ISSN: 2158-107X
Source: Self-asserted source
Reza Fotohi
grade
Preferred source (of 3)‎

DAWA: Defending against wormhole attack in MANETs by using fuzzy logic and artificial immune system

The Journal of Supercomputing
2017-12 | Journal article
Part of ISSN: 0920-8542
Part of ISSN: 1573-0484
Source: Self-asserted source
Reza Fotohi
grade
Preferred source (of 2)‎

A Hybrid Routing Method for Mobile ad-hoc Networks

Journal of Advances in Computer Research
2016 | Journal article
Source: Self-asserted source
Reza Fotohi

A New Approach for Improvement Security against DoS Attacks in Vehicular Ad-hoc Network

International Journal of Advanced Computer Science and Applications
2016 | Journal article
Part of ISSN: 2156-5570
Part of ISSN: 2158-107X
Source: Self-asserted source
Reza Fotohi
grade
Preferred source (of 3)‎

P-method: improving AODV routing protocol for against network layer attacks in mobile Ad-Hoc networks

International Journal of Computer Science and Information Security
2016 | Journal article
Source: Self-asserted source
Reza Fotohi

Defending against Wormhole Attack in MANET Using an Artificial Immune System

New Review of Information Networking
2016-07-02 | Journal article
Part of ISSN: 1361-4576
Part of ISSN: 1740-7869
Source: Self-asserted source
Reza Fotohi
grade
Preferred source (of 2)‎

Defense against the attacks of the black hole, gray hole and wormhole in MANETs based on RTT and PFT

International Journal of Computer Science and Network Solutions (IJCSNS)
2015 | Journal article
Source: Self-asserted source
Reza Fotohi

A comprehensive study on defence against wormhole attack methods in mobile Ad hoc networks

International journal of Computer Science & Network Solutions
2014 | Journal article
Source: Self-asserted source
Reza Fotohi

Queue based job scheduling algorithm for cloud computing

International Research Journal of Applied and Basic Sciences
2013 | Journal article
Source: Self-asserted source
Reza Fotohi

A Cluster Based Job Scheduling Algorithm for Grid Computing

International Journal of Information Technology and Computer Science
2013-11-01 | Journal article
Part of ISSN: 2074-9007
Part of ISSN: 2074-9015
Source: Self-asserted source
Reza Fotohi
grade
Preferred source (of 2)‎

Performance Evaluation of AODV, LHC-AODV, OLSR, UL-OLSR, DSDV Routing Protocols

International Journal of Information Technology and Computer Science
2013-09-01 | Journal article
Part of ISSN: 2074-9007
Part of ISSN: 2074-9015
Source: Self-asserted source
Reza Fotohi
grade
Preferred source (of 2)‎

An Improvement over AODV Routing Protocol by Limiting Visited Hop Count

International Journal of Information Technology and Computer Science
2013-08-01 | Journal article
Part of ISSN: 2074-9007
Part of ISSN: 2074-9015
Source: Self-asserted source
Reza Fotohi
grade
Preferred source (of 2)‎

Improvement over the OLSR Routing Protocol in Mobile Ad Hoc Networks by Eliminating the Unnecessary Loops

International Journal of Information Technology and Computer Science
2013-05-01 | Journal article
Part of ISSN: 2074-9007
Part of ISSN: 2074-9015
Source: Self-asserted source
Reza Fotohi
grade
Preferred source (of 2)‎

Peer review (508 reviews for 113 publications/grants)

Review activity for ["Jordanian journal of computers and information technology.","المجلة الأردنية للحاسوب وتكنولوجيا المعلومات"] (1)
Review activity for ACM transactions on autonomous and adaptive systems. (1)
Review activity for ACM transactions on privacy and security. (1)
Review activity for Ad hoc networks. (1)
Review activity for Applied artificial intelligence : (1)
Review activity for Applied sciences. (1)
Review activity for Applied soft computing. (6)
Review activity for Applied soft computing. (2)
Review activity for Arabian journal for science and engineering. (11)
Review activity for Artificial intelligence review. (6)
Review activity for Artificial intelligence review. (12)
Review activity for Automatika. (1)
Review activity for China Communications. (1)
Review activity for Cogent engineering. (2)
Review activity for Cognitive computation and systems. (1)
Review activity for Complexity (1)
Review activity for Computer communications. (2)
Review activity for Computer communications. (20)
Review activity for Computer methods in biomechanics and biomedical engineering. (4)
Review activity for Computers & security. (1)
Review activity for Concurrency and computation. (6)
Review activity for Connection science. (1)
Review activity for Cybernetics and systems. (4)
Review activity for Electronics letters. (2)
Review activity for Elektrik. (5)
Review activity for Engineering applications of artificial intelligence. (1)
Review activity for Environmental pollutants & bioavailability. (2)
Review activity for Expert systems. (1)
Review activity for Future generation computer systems. (1)
Review activity for Human-centric computing and information sciences. (10)
Review activity for IEEE access : (17)
Review activity for IEEE aerospace and electronic systems magazine (2)
Review activity for IEEE Communications surveys and tutorials. (7)
Review activity for IEEE internet computing. (2)
Review activity for IEEE internet of things journal. (3)
Review activity for IEEE network. (2)
Review activity for IEEE sensors journal. (3)
Review activity for IEEE systems journal. (1)
Review activity for IEEE transactions on aerospace and electronic systems. (3)
Review activity for IEEE transactions on artificial intelligence. (1)
Review activity for IEEE transactions on cognitive communications and networking. (1)
Review activity for IEEE transactions on engineering management / (4)
Review activity for IEEE transactions on fuzzy systems : (1)
Review activity for IEEE transactions on green communications and networking. (2)
Review activity for IEEE transactions on intelligent vehicles. (3)
Review activity for IEEE transactions on knowledge and data engineering. (2)
Review activity for IEEE transactions on mobile computing. (3)
Review activity for IEEE transactions on network and service management. (9)
Review activity for IEEE transactions on network science and engineering. (4)
Review activity for IEEE transactions on reliability. (2)
Review activity for IEEE transactions on vehicular technology. (3)
Review activity for IET communications. (3)
Review activity for IET intelligent transport systems. (1)
Review activity for IET signal processing. (1)
Review activity for IET smart cities. (1)
Review activity for IET software. (1)
Review activity for Information security journal. (1)
Review activity for Intelligent and converged networks. (1)
Review activity for Intelligent transportation systems, IEEE transactions on. (2)
Review activity for International journal of aerospace engineering. (2)
Review activity for International journal of communication systems. (38)
Review activity for International journal of computers & applications. (1)
Review activity for International journal of information technology & decision making. (1)
Review activity for International journal of numerical modelling (1)
Review activity for International journal of parallel, emergent and distributed systems. (2)
Review activity for Iran Journal of Computer Science (3)
Review activity for Iran Journal of Computer Science. (1)
Review activity for Iranian journal of fuzzy systems. (1)
Review activity for Journal of advanced transportation. (1)
Review activity for Journal of advances in computer engineering and technology. (9)
Review activity for Journal of ambient intelligence & humanized computing (40)
Review activity for Journal of ambient intelligence and humanized computing. (67)
Review activity for Journal of control and decision. (2)
Review activity for JOURNAL OF CURRENT SCIENCE AND TECHNOLOGY (1)
Review activity for Journal of grid computing. (1)
Review activity for Journal of grid computing. (1)
Review activity for Journal of healthcare engineering. (1)
Review activity for Journal of intelligent & fuzzy systems. (1)
Review activity for Journal of intelligent & robotic systems. (1)
Review activity for Journal of intelligent & robotic systems. (2)
Review activity for Journal of interconnection networks. (5)
Review activity for Journal of network and computer applications. (1)
Review activity for Journal of sensors. (1)
Review activity for Journal on special topics in mobile networks and applications. (1)
Review activity for Knowledge-based systems. (2)
Review activity for Mathematical problems in engineering. (2)
Review activity for Molecular Biology International (1)
Review activity for National Academy Science letters. (1)
Review activity for National Academy Science letters. (2)
Review activity for Network (1)
Review activity for Neural Processing Letters. (8)
Review activity for Neural processing letters. (15)
Review activity for PloS one. (1)
Review activity for Proceedings of the Institution of Mechanical Engineers. (1)
Review activity for Science progress. (1)
Review activity for Security and communication networks. (11)
Review activity for Security and privacy. (1)
Review activity for Sustainable computing. (1)
Review activity for Telecommunication systems. (5)
Review activity for Telecommunications systems. (2)
Review activity for The journal of supercomputing. (8)
Review activity for The journal of supercomputing. (16)
Review activity for The visual computer (2)
Review activity for The visual computer. (4)
Review activity for Transactions on emerging telecommunications technologies. (1)
Review activity for Transactions on internet and information systems (14)
Review activity for Tsinghua Science and Technology. (1)
Review activity for Vehicles. (1)
Review activity for Vehicular communications. (1)
Review activity for Wireless communications and mobile computing (7)
Review activity for Wireless personal communications. (5)
Review activity for Wireless personal communications. (10)
Review activity for Wǎngjì wǎnglù jìshù xuékān. (3)