Majid Mollaeefar

Majid Mollaeefar
Fondazione Bruno Kessler | FBK · Security & Trust (ST)

Phd

About

10
Publications
2,877
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
216
Citations

Publications

Publications (10)
Preprint
Full-text available
The rapid evolution of Large Language Models (LLMs) has unlocked new possibilities for applying artificial intelligence across a wide range of fields, including privacy engineering. As modern applications increasingly handle sensitive user data, safeguarding privacy has become more critical than ever. To protect privacy effectively, potential threa...
Conference Paper
Full-text available
In the rapidly evolving landscape of Artificial Intelligence (AI), ensuring the trustworthiness of AI tools deployed in sensitive use cases, such as judicial or healthcare processes, is paramount. The management of AI risks in judicial systems necessitates a holistic approach that includes various elements, such as technical, ethical considerations...
Article
Cybersecurity risk management consists of several steps including the selection of appropriate controls to minimize risks. This is a difficult task that requires to search through all possible subsets of a set of available controls and identify those that minimize the risks of all stakeholders. Since stakeholders may have different perceptions of t...
Preprint
Full-text available
Cybersecurity risk management consists of several steps including the selection of appropriate controls to minimize risks. This is a difficult task that requires to search through all possible subsets of a set of available controls and identify those that minimize the risks of all stakeholders. Since stakeholders may have different perceptions of t...
Conference Paper
Full-text available
To ensure the effectiveness of the adopted security measures and minimize the impact of security issues on the rights and freedom of individuals, the General Data Protection Regulation (GDPR) requires to carry out a Data Processing Impact Assessment (DPIA). Such an assessment differs from traditional risk analyses in which the actor carrying out th...
Article
Full-text available
In this paper, the digital image fragile watermarking method based on chaotic maps is proposed. Our method has some significant advantageous in comparison with other available methods. Firstly, we reduce watermark payloads, while they have high quality of recovery and security. In watermark embedding phase, we process the image in order to produce...
Article
Full-text available
This paper, presents a novel chaos-based image steganography algorithm. Because of efficient property of chaos based security systems besides steganography applicability in providing secure communication, chaos based steganography algorithms served as a hot topic in recent researches. The proposed scheme possess novelties and advantageous such as:...
Article
Full-text available
In the following paper, the novel method for color image encryption has proposed based on high level chaotic maps . We introduced two novel chaotic maps “Cosinus-Arcsinus (CA)” and “Sinus-Power Logistic (SPL)”, which have better chaotic behaviour against other available chaotic maps. Our scheme like other image encryption schemes has two main phase...
Conference Paper
Full-text available
with rapid intention of using computer networks as a media for communication, providing security for this media has gained attention of many researchers. Therefore, Image encryption methods are studied widely in order to provide secure platform for sharing images between end parties. In this paper, a novel approach for image encryption based on mix...
Conference Paper
Full-text available
Image encryption field has motivated many researchers, recently and too many studies held by them. We propose a high dependency method the original image and parameter G. Moreover, we use a new simple chaotic map with bigger Lyapunov exponents and so stronger chaotic behaviour, against which one used by Xing-yuan Wang et al, in diffusion phase. In...

Network

Cited By