Mehrdad Aliasgari

536 total citations
25 papers, 252 citations indexed

About

Mehrdad Aliasgari is a scholar working on Artificial Intelligence, Information Systems and Computer Networks and Communications. According to data from OpenAlex, Mehrdad Aliasgari has authored 25 papers receiving a total of 252 indexed citations (citations by other indexed papers that have themselves been cited), including 12 papers in Artificial Intelligence, 11 papers in Information Systems and 9 papers in Computer Networks and Communications. Recurrent topics in Mehrdad Aliasgari's work include User Authentication and Security Systems (7 papers), Network Security and Intrusion Detection (6 papers) and Cryptography and Data Security (5 papers). Mehrdad Aliasgari is often cited by papers focused on User Authentication and Security Systems (7 papers), Network Security and Intrusion Detection (6 papers) and Cryptography and Data Security (5 papers). Mehrdad Aliasgari collaborates with scholars based in United States, Taiwan and Jordan. Mehrdad Aliasgari's co-authors include Marina Blanton, Hossein Sayadi, Yihua Zhang, Aaron Steele, Houman Homayoun, Hosein Mohammadi Makrani, Amin Rezaei, Michael Black, Nicholas J. Miller and Setareh Rafatirad and has published in prestigious journals such as IEEE Access, IEEE Transactions on Information Forensics and Security and Journal of Computer Security.

In The Last Decade

Mehrdad Aliasgari

23 papers receiving 244 citations

Peers — A (Enhanced Table)

Peers by citation overlap · career bar shows stage (early→late) cites · hero ref

Name h Career Trend Papers Cites
Mehrdad Aliasgari United States 10 137 131 95 74 56 25 252
Keith Jones United Kingdom 7 68 0.5× 125 1.0× 74 0.8× 49 0.7× 47 0.8× 19 206
M.H. Kang United States 8 206 1.5× 92 0.7× 49 0.5× 116 1.6× 37 0.7× 18 264
Anna Shubina United States 8 158 1.2× 159 1.2× 117 1.2× 129 1.7× 40 0.7× 16 299
Stefan Lucks Germany 8 228 1.7× 63 0.5× 81 0.9× 67 0.9× 143 2.6× 37 310
Dominique Unruh Germany 11 231 1.7× 56 0.4× 113 1.2× 114 1.5× 50 0.9× 31 307
Ruan de Clercq Belgium 9 267 1.9× 105 0.8× 103 1.1× 63 0.9× 45 0.8× 13 305
Thomas Given-Wilson France 9 96 0.7× 75 0.6× 54 0.6× 105 1.4× 12 0.2× 25 203
Chris Hall United States 6 253 1.8× 101 0.8× 97 1.0× 73 1.0× 148 2.6× 7 362

Countries citing papers authored by Mehrdad Aliasgari

Since Specialization
Citations

This map shows the geographic impact of Mehrdad Aliasgari's research. It shows the number of citations coming from papers published by authors working in each country. You can also color the map by specialization and compare the number of citations received by Mehrdad Aliasgari with the expected number of citations based on a country's size and research output (numbers larger than one mean the country cites Mehrdad Aliasgari more than expected).

Fields of papers citing papers by Mehrdad Aliasgari

Since Specialization
Physical SciencesHealth SciencesLife SciencesSocial Sciences

This network shows the impact of papers produced by Mehrdad Aliasgari. Nodes represent research fields, and links connect fields that are likely to share authors. Colored nodes show fields that tend to cite the papers produced by Mehrdad Aliasgari. The network helps show where Mehrdad Aliasgari may publish in the future.

Co-authorship network of co-authors of Mehrdad Aliasgari

This figure shows the co-authorship network connecting the top 25 collaborators of Mehrdad Aliasgari. A scholar is included among the top collaborators of Mehrdad Aliasgari based on the total number of citations received by their joint publications. Widths of edges represent the number of papers authors have co-authored together. Node borders signify the number of papers an author published with Mehrdad Aliasgari. Mehrdad Aliasgari is excluded from the visualization to improve readability, since they are connected to all nodes in the network.

All Works

20 of 20 papers shown
2.
Hwang, Jin‐Ha, et al.. (2023). Machine Learning in Chaos-Based Encryption: Theory, Implementations, and Applications. IEEE Access. 11. 125749–125767. 14 indexed citations
3.
Aliasgari, Mehrdad, et al.. (2023). Mitigating Autonomous Vehicle GPS Spoofing Attacks through Scene Text Observations. Proceedings of the ... Annual Hawaii International Conference on System Sciences.
4.
Rezaei, Amin, et al.. (2023). Attacks on Continuous Chaos Communication and Remedies for Resource Limited Devices. 1–8. 2 indexed citations
5.
Aliasgari, Mehrdad, et al.. (2022). Machine Learning Architecture for Signature-based IoT Intrusion Detection in Smart Energy Grids. 671–676. 3 indexed citations
6.
Rezaei, Amin, et al.. (2022). Global Attack and Remedy on IC-Specific Logic Encryption. 145–148. 9 indexed citations
7.
Sayadi, Hossein, et al.. (2022). Towards AI-Enabled Hardware Security: Challenges and Opportunities. 1–10. 5 indexed citations
9.
Makrani, Hosein Mohammadi, et al.. (2021). When Machine Learning Meets Hardware Cybersecurity: Delving into Accurate Zero-Day Malware Detection. 85–90. 26 indexed citations
10.
Gao, Yifeng, Hosein Mohammadi Makrani, Mehrdad Aliasgari, et al.. (2021). Adaptive-HMD: Accurate and Cost-Efficient Machine Learning-Driven Malware Detection using Microarchitectural Events. 1–7. 11 indexed citations
11.
Sayadi, Hossein, Han Wang, Hosein Mohammadi Makrani, et al.. (2020). Recent Advancements in Microarchitectural Security: Review of Machine Learning Countermeasures. 949–952. 20 indexed citations
12.
Aliasgari, Mehrdad, et al.. (2018). Security Vulnerabilities in Mobile Health Applications. 21–26. 15 indexed citations
13.
Chen, Wendy, et al.. (2017). Automated Detection of Sewer Pipe Structural Defects Using Machine Learning. Proceedings of the Water Environment Federation. 2017(6). 4605–4615. 3 indexed citations
14.
Aliasgari, Mehrdad, et al.. (2016). Mobile Healthcare in an Increasingly Connected Developing World. 4(2). 76–97. 3 indexed citations
15.
Aliasgari, Mehrdad, et al.. (2016). Secure computation of hidden Markov models and secure floating-point arithmetic in the malicious model. International Journal of Information Security. 16(6). 577–601. 17 indexed citations
16.
Aliasgari, Mehrdad, Garrett K. Chan, & Mohammad Mozumdar. (2016). Iot-1-Pass-Security: L(One)-Pass Authenticated Key Agreement Protocol For Energy Constraint Iot Applications. International Journal on Smart Sensing and Intelligent Systems. 9(2). 598–615. 1 indexed citations
17.
Aliasgari, Mehrdad, et al.. (2015). Sesame: a secure and convenient mobile solution for passwords. 1–5. 3 indexed citations
18.
Aliasgari, Mehrdad & Marina Blanton. (2013). Secure computation of hidden Markov models. 242–253. 8 indexed citations
19.
Blanton, Marina & Mehrdad Aliasgari. (2013). Analysis of Reusability of Secure Sketches and Fuzzy Extractors. IEEE Transactions on Information Forensics and Security. 8(9). 1433–1445. 32 indexed citations
20.
Aliasgari, Mehrdad, Marina Blanton, Yihua Zhang, & Aaron Steele. (2012). Secure Computation on Floating Point Numbers.. IACR Cryptology ePrint Archive. 2012. 405. 38 indexed citations

Rankless uses publication and citation data sourced from OpenAlex, an open and comprehensive bibliographic database. While OpenAlex provides broad and valuable coverage of the global research landscape, it—like all bibliographic datasets—has inherent limitations. These include incomplete records, variations in author disambiguation, differences in journal indexing, and delays in data updates. As a result, some metrics and network relationships displayed in Rankless may not fully capture the entirety of a scholar's output or impact.

Explore authors with similar magnitude of impact

Rankless by CCL
2026