Ali Miri

2.0k total citations
113 papers, 1.2k citations indexed

About

Ali Miri is a scholar working on Artificial Intelligence, Information Systems and Computer Networks and Communications. According to data from OpenAlex, Ali Miri has authored 113 papers receiving a total of 1.2k indexed citations (citations by other indexed papers that have themselves been cited), including 65 papers in Artificial Intelligence, 51 papers in Information Systems and 37 papers in Computer Networks and Communications. Recurrent topics in Ali Miri's work include Cryptography and Data Security (38 papers), Privacy-Preserving Technologies in Data (27 papers) and Cloud Computing and Resource Management (21 papers). Ali Miri is often cited by papers focused on Cryptography and Data Security (38 papers), Privacy-Preserving Technologies in Data (27 papers) and Cloud Computing and Resource Management (21 papers). Ali Miri collaborates with scholars based in Canada, Iran and United States. Ali Miri's co-authors include Salam Ismaeel, Saeed Samet, Patrick Longa, Chen Ding, Éric Granger, Robert Sabourin, Wael Khreich, Mohammed M. Alani, Isaac Woungang and Atefeh Mashatan and has published in prestigious journals such as PLoS ONE, IEEE Transactions on Information Theory and IEEE Access.

In The Last Decade

Ali Miri

106 papers receiving 1.1k citations

Peers — A (Enhanced Table)

Peers by citation overlap · career bar shows stage (early→late) cites · hero ref

Name h Career Trend Papers Cites
Ali Miri Canada 20 570 540 448 154 149 113 1.2k
Saeed Jalili Iran 18 510 0.9× 335 0.6× 252 0.6× 131 0.9× 135 0.9× 92 981
Yonglong Luo China 17 491 0.9× 296 0.5× 257 0.6× 165 1.1× 294 2.0× 110 1.1k
Daya Gupta India 20 497 0.9× 569 1.1× 556 1.2× 66 0.4× 123 0.8× 116 1.2k
Chunfu Jia China 19 1.1k 1.9× 764 1.4× 497 1.1× 253 1.6× 255 1.7× 139 1.6k
Mehdi Hosseinzadeh Aghdam Iran 16 625 1.1× 271 0.5× 197 0.4× 119 0.8× 240 1.6× 27 1.0k
William Eberle United States 14 470 0.8× 185 0.3× 280 0.6× 114 0.7× 106 0.7× 57 841
Yihua Huang China 16 402 0.7× 346 0.6× 218 0.5× 83 0.5× 194 1.3× 78 815
H. Kargupta United States 17 1.2k 2.1× 279 0.5× 434 1.0× 205 1.3× 169 1.1× 33 1.6k
Sanjay Kumar India 21 600 1.1× 191 0.4× 230 0.5× 159 1.0× 183 1.2× 100 1.3k

Countries citing papers authored by Ali Miri

Since Specialization
Citations

This map shows the geographic impact of Ali Miri's research. It shows the number of citations coming from papers published by authors working in each country. You can also color the map by specialization and compare the number of citations received by Ali Miri with the expected number of citations based on a country's size and research output (numbers larger than one mean the country cites Ali Miri more than expected).

Fields of papers citing papers by Ali Miri

Since Specialization
Physical SciencesHealth SciencesLife SciencesSocial Sciences

This network shows the impact of papers produced by Ali Miri. Nodes represent research fields, and links connect fields that are likely to share authors. Colored nodes show fields that tend to cite the papers produced by Ali Miri. The network helps show where Ali Miri may publish in the future.

Co-authorship network of co-authors of Ali Miri

This figure shows the co-authorship network connecting the top 25 collaborators of Ali Miri. A scholar is included among the top collaborators of Ali Miri based on the total number of citations received by their joint publications. Widths of edges represent the number of papers authors have co-authored together. Node borders signify the number of papers an author published with Ali Miri. Ali Miri is excluded from the visualization to improve readability, since they are connected to all nodes in the network.

All Works

20 of 20 papers shown
1.
Alani, Mohammed M., Atefeh Mashatan, & Ali Miri. (2024). Building Detection-Resistant Reconnaissance Attacks Based on Adversarial Explainability. 16–23.
2.
Alani, Mohammed M., Atefeh Mashatan, & Ali Miri. (2023). XMal: A lightweight memory-based explainable obfuscated-malware detector. Computers & Security. 133. 103409–103409. 22 indexed citations
3.
Khayyambashi, Mohammad Reza, et al.. (2020). A static VM placement and hybrid job scheduling model for green data centers. PLoS ONE. 15(8). e0237238–e0237238. 4 indexed citations
4.
Arbabisarjou, Azizollah, et al.. (2016). Effect of the Implementation of the Family Physician Program 2015 on Fair Accessibility for People to Health Care Services in the Sistan Region. Global Journal of Health Science. 8(12). 20–20. 2 indexed citations
6.
Ismaeel, Salam & Ali Miri. (2015). Using ELM Techniques to Predict Data Centre VM Requests. 80–86. 19 indexed citations
7.
Ismaeel, Salam, et al.. (2015). Open Source Cloud Management Platforms: A Review. 1. 470–475. 10 indexed citations
8.
Ismaeel, Salam & Ali Miri. (2015). A universal unit for measuring clouds. 2. 1–4. 3 indexed citations
9.
Miri, Ali, et al.. (2013). Proof of retrieval and ownership protocols for enterprise-level data deduplication. Conference of the Centre for Advanced Studies on Collaborative Research. 81–90. 6 indexed citations
10.
Miri, Ali, et al.. (2013). Secure Enterprise Data Deduplication in the Cloud. 6. 367–374. 10 indexed citations
11.
Miri, Ali, et al.. (2012). Securing Harari's Authentication Scheme.. International journal of network security. 14. 206–210. 1 indexed citations
12.
García-Alfaro, Joaquín, Frédéric Cuppens, Nora Cuppens-Boulahia, Ali Miri, & Nadia Tawbi. (2012). Proceedings of the 5th international conference on Foundations and Practice of Security. 1 indexed citations
14.
Miri, Ali & Serge Vaudenay. (2012). Selected Areas in Cryptography. Lecture notes in computer science. 20 indexed citations
15.
Lima, José, et al.. (2012). Analysis of Relay Attacks on RFiD Systems. IEEE Latin America Transactions. 10(1). 1274–1282. 2 indexed citations
16.
Miri, Ali, et al.. (2011). Online Social Network with flexible and dynamic privacy policies. 135–142. 12 indexed citations
17.
Chan, Adrian D. C., et al.. (2009). Fatigue estimation using a novel multi-fractal detrended fluctuation analysis-based approach. Journal of Electromyography and Kinesiology. 20(3). 433–439. 19 indexed citations
18.
Longa, Patrick & Ali Miri. (2006). Area-Efficient FIR Filter Design on FPGAs using Distributed Arithmetic. 248–252. 35 indexed citations
19.
Adams, Carlisle, et al.. (2005). Using Threshold Attribute-Based Encryption for Practical Biometric-Based Access Control. International journal of network security. 1(3). 173–182. 27 indexed citations
20.
Miri, Ali, et al.. (2004). Efficient Revocation of Dynamic Security Privileges in Hierarchically Structured Communities.. 17. 219–223. 2 indexed citations

Rankless uses publication and citation data sourced from OpenAlex, an open and comprehensive bibliographic database. While OpenAlex provides broad and valuable coverage of the global research landscape, it—like all bibliographic datasets—has inherent limitations. These include incomplete records, variations in author disambiguation, differences in journal indexing, and delays in data updates. As a result, some metrics and network relationships displayed in Rankless may not fully capture the entirety of a scholar's output or impact.

Explore authors with similar magnitude of impact

Rankless by CCL
2026