Personal information

Verified email domains

Network, Security, Distributed systems
Iran

Activities

Employment (1)

Yazd University: Yazd, Yazd, IR

1990 to 2025 | Associate professor (Computer Engineering)
Employment
Source: Self-asserted source
Fazlollah Adibnia

Education and qualifications (3)

Universität Bremen: Bremen, Bremen, DE

1992 to 1998 | Phd (Informatik)
Education
Source: Self-asserted source
Fazlollah Adibnia

Sharif University of Technology: Tehran, Tehran, IR

1985 to 1987 | Msc (Computer Eng.)
Education
Source: Self-asserted source
Fazlollah Adibnia

Isfahan University of Technology: Isfahan, Isfahan, IR

1980 to 1984 | Bsc (Computer Eng)
Education
Source: Self-asserted source
Fazlollah Adibnia

Works (26)

Securing IoMT healthcare systems with federated learning and BigchainDB

Future Generation Computer Systems
2025-04 | Journal article
Contributors: Masoumeh Jafari; Fazlollah Adibnia
Source: check_circle
Crossref

A Novel Robust Soft-Computed Range-Free Localization Algorithm Against Malicious Anchor Nodes

Cognitive Computation
2021-07-18 | Journal article
Contributors: Seyed Saber Banihashemian; Fazlollah Adibnia
Source: check_circle
Crossref

A Novel Multi-objective Particle Swarm Algorithm Based on a Neighborhood to Search Depth in Task Scheduling by Considering a New Security Model

2021-05-10 | Journal article
Source: Self-asserted source
Fazlollah Adibnia

Feature Selection based on Particle Swarm Optimization and Mutual Information

Journal of AI and Data Mining
2021-01 | Journal article
Source: Self-asserted source
Fazlollah Adibnia

Incremental collusive fraud detection in large-scale online auction networks

The Journal of Supercomputing
2020-09 | Journal article
Part of ISSN: 0920-8542
Part of ISSN: 1573-0484
Source: Self-asserted source
Fazlollah Adibnia

A new range-free PCA-based localization algorithm in wireless sensor networks

International Journal of Communication Systems
2020-04 | Journal article
Part of ISSN: 1074-5351
Source: Self-asserted source
Fazlollah Adibnia
grade
Preferred source (of 2)‎

A Novel Parallel Jobs Scheduling Algorithm in The Cloud Computing

2019 9th International Conference on Computer and Knowledge Engineering (ICCKE)
2019-10 | Conference paper
Source: Self-asserted source
Fazlollah Adibnia

Proposing a measurement criterion to evaluate the border problem in localization algorithms in WSNs

Computing
2018-12 | Journal article
Part of ISSN: 0010-485X
Part of ISSN: 1436-5057
Source: Self-asserted source
Fazlollah Adibnia
grade
Preferred source (of 2)‎

A New Range-Free and Storage-Efficient Localization Algorithm Using Neural Networks in Wireless Sensor Networks

Wireless Personal Communications
2018-01-02 | Journal article
Contributors: Seyed Saber Banihashemian; Fazlollah Adibnia; Mehdi A. Sarram
Source: check_circle
Crossref

تخمین تلاش کلی نرم افزار و تلاش صرف شده در هر مرحله تولید با استفاده از شبکه بیزی بهینه

فصلنامه علمی-پژوهشی مدیریت فناوری اطلاعات
2017-05 | Journal article
Source: Self-asserted source
Fazlollah Adibnia

Evaluation of Range-Free Localization Algorithms Against Node Compromise Attack

Cankaya University Journal of Science and Engineering (CUJSE)
2017-05-30 | Journal article
Source: Self-asserted source
Fazlollah Adibnia

An improvement on LEACH protocol (EZ-LEACH)

2015 2nd International Conference on Knowledge-Based Engineering and Innovation (KBEI)
2015-11 | Conference paper
Source: Self-asserted source
Fazlollah Adibnia

A Rate based Congestion Control Mechanism Using Fuzzy Controller in MANETs

International Journal of Computers Communications & Control
2013-06-02 | Journal article
Part of ISSN: 1841-9844
Part of ISSN: 1841-9836
Source: Self-asserted source
Fazlollah Adibnia
grade
Preferred source (of 2)‎

A mechanism-based QoS and security requirements consideration for MANETs QoS routing

6th International Symposium on Telecommunications (IST)
2012-11 | Conference paper
Part of ISBN: 9781467320733
Part of ISBN: 9781467320726
Part of ISBN: 9781467320719
Source: Self-asserted source
Fazlollah Adibnia

Condition aware robust routing algorithm with cross layer technique for ad hoc situations

Procedia Computer Science
2011 | Journal article
Part of ISSN: 1877-0509
Source: Self-asserted source
Fazlollah Adibnia

A Secure Mechanism for QoS Routing in Mobile Ad Hoc Networks with QoS Requirements Consideration

2010 International Conference on Computational Intelligence and Communication Networks
2010-11 | Conference paper
Source: Self-asserted source
Fazlollah Adibnia
grade
Preferred source (of 2)‎

Hybrid Routing Protocol for Prolonged Network Lifetime in Large Scale Wireless Sensor Network

2009 International Conference on Information and Multimedia Technology
2009 | Conference paper
Source: Self-asserted source
Fazlollah Adibnia

False Alert Reduction on Network-Based Intrusion Detection Systems by Means of Feature Frequencies

2009 International Conference on Advances in Computing, Control, and Telecommunication Technologies
2009-12 | Conference paper
Part of ISBN: 9781424453214
Source: Self-asserted source
Fazlollah Adibnia
grade
Preferred source (of 2)‎

The investigation of vulnerability test in application software

2009 International Conference on the Current Trends in Information Technology (CTIT)
2009-12 | Conference paper
Source: Self-asserted source
Fazlollah Adibnia
grade
Preferred source (of 3)‎

Adaptive DSR Protocol with Cooperative Agents for Different Mobility and Traffic Patterns

2008 Third International Conference on Systems and Networks Communications
2008 | Conference paper
Source: Self-asserted source
Fazlollah Adibnia

Energy-aware distributed algorithm for virtual backbone in wireless sensor networks

2008 International Conference on Innovations in Information Technology
2008-12 | Conference paper
Source: Self-asserted source
Fazlollah Adibnia
grade
Preferred source (of 2)‎

Simplifying Concurrent Programming of Networked Embedded Systems

2008 IEEE International Symposium on Parallel and Distributed Processing with Applications
2008-12 | Journal article
Source: Self-asserted source
Fazlollah Adibnia
grade
Preferred source (of 2)‎

Optimal distributed algorithm for minimum connected dominating sets in Wireless Sensor Networks

2008 5th IEEE International Conference on Mobile Ad Hoc and Sensor Systems
2008-09 | Conference paper
Source: Self-asserted source
Fazlollah Adibnia

Distributed algorithm for connected Dominating Sets in Wireless Sensor Networks with different transmission ranges

2008 International Symposium on Telecommunications
2008-08 | Conference paper
Source: Self-asserted source
Fazlollah Adibnia
grade
Preferred source (of 2)‎

An approach to select the best spanning tree in Metro Ethernet networks

2008 8th IEEE International Conference on Computer and Information Technology
2008-07 | Conference paper
Source: Self-asserted source
Fazlollah Adibnia

Intrusion detection in encrypted accesses with SSH protocol to network public servers

2008 International Conference on Computer and Communication Engineering
2008-05 | Conference paper
Source: Self-asserted source
Fazlollah Adibnia

Peer review (17 reviews for 9 publications/grants)

Review activity for Annales des télécommunications. (1)
Review activity for Artificial intelligence review. (1)
Review activity for Computer communications. (1)
Review activity for Computer networks. (1)
Review activity for Information sciences. (1)
Review activity for Journal of network and computer applications. (3)
Review activity for New generation computing. (1)
Review activity for Physical communication. (1)
Review activity for Telecommunications systems. (7)