Milad Taleby Ahvanooey

Milad Taleby Ahvanooey
Nanjing University | NJU · Department of Information System Engineering

Doctor of Engineering
Looking for potential research collaborators in Cyberspace security.

About

31
Publications
25,688
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
334
Citations
Introduction
Dr. M.T Ahvanooey works as a faculty member at Nanjing University (NJU), China. He is undertaking teaching duties and research projects focusing on the applications of AI in Cyberspace security. Dr. M.T. Ahvanooey has been distinguished as one of the top three Ph.D. talents for the China Scholarship Council (CSC) Elite Outstanding award at NJUST, in October 2019. Also, he is a Senior Member of IEEE and holds two patent applications as the co-founder of Cybercoding IT.Co., Ltd, Nanjing, China.
Additional affiliations
March 2017 - January 2020
Nanjing University of Science and Technology
Position
  • Instructor
Description
  • I have been teaching several CSE subjects such as Semantic Programming, Data Mining, BigData Analysis, and Software Evaluation & Copyright Protection to postgraduate students for four semesters from March 2017 to January 2020.
September 2014 - June 2016
Damghan University
Position
  • Instructor
Description
  • I have been teaching some CS courses such as Advanced Programming, Computer basics & Programming, Data Structures, Electronic Commerce, Research Methods, etc., as a part-time instructor
September 2014 - June 2016
Damghan University
Position
  • Lecturer
Description
  • I have been teaching several CS courses such as Data Structures and Algorithms, Advanced Programming, Research Methods, Electronic Commerce, etc.
Education
December 2019 - June 2022
Nanjing University
Field of study
  • Cybersecurity and Computer Forensics
August 2016 - April 2020
Nanjing University of Science and Technology
Field of study
  • Computer Science & Technology (Cybersecurity)
September 2012 - August 2014
Islamic Azad University Tehran Science and Research Branch
Field of study
  • Computer Engineering (Software)

Publications

Publications (31)
Article
Full-text available
Digital Watermarking is required in multimedia applications where access to sensitive information has to be protected against malicious attacks. Since the digital text is one of the most widely used digital media on the Internet, the significant part of Web sites, social media, articles, eBooks, and so on is only plain text. Thus, copyrights protec...
Article
Information hiding is the science of concealing a secret message or a watermark inside a cover media (a host file/message) for providing various security purposes such as content authentication, integrity verification, covert communication, etc. When the cover media is textual content, the process of hiding is very difficult compared to other digit...
Article
It is increasingly challenging to deal with the volume,variety, velocity, and veracity of misinformation (e.g., dissemination of fake news contents, spurious posts, and fabricated images/videos) from different online platforms. In this article, we present an overview of existing machine learning and information hiding-based misinformation detection...
Article
User authentication remains a challenging issue, despite the existence of a large number of proposed solutions, such as traditional text-based, graphical-based, biometrics-based, web-based, and hardware-based schemes. For example, some of these schemes are not suitable for deployment in an Internet of Things (IoT) setting, partly due to the hardwar...
Chapter
Full-text available
The dark web is often associated with criminal activities such as the sale of exploit kits using cryptocurrencies as payment. However, the difficulty in determining the identities of dark website owners and the tracing of the associated transactions compounds the challenges of investigating dark web activities. In this study, we explore how cryptoc...
Preprint
Full-text available
Recently, the application of deep learning models to diagnose neuropsychiatric diseases from brain imaging data has received more and more attention. However, in practice, exploring interactions in brain functional connectivity based on operational magnetic resonance imaging data is critical for studying mental illness. Since Attention-Deficit and...
Patent
A systematic methodology for providing perfectly secure end-to-end conversation via online messaging platforms (e.g., social media, email servers, and SMS) is presented in which a confidential message formed of secret bits is encrypted using a three-factor authentication scheme and converted to hidden Unicode symbols for transferring under cover of...
Patent
This project affords a new type of authentication system (AI-based lock) which is called AI-NLock for protecting digital gadgets such as Smart doors, Smartphones, etc. This technology works based on a Multi-factor AI-based authentication system that simplifies the users’ usage by requiring them to memorize three digits and an AI robot generates hin...
Article
Full-text available
Purpose -- Blockchain technology is a distributed and decentralized public digital ledger, which is employed to save dynamic transaction data and static records across several computers so that each record could not be modified retroactively without the collusion of the network and alteration of all subsequent blocks. Recently, it has become immens...
Preprint
Full-text available
The dark web is often associated with criminal activities such as the sale of exploit kits using cryptocurrencies as payment. However, the difficulty in determining the identities of dark website owners and the tracing of the associated transactions compounds the challenges of investigating dark web activities. In this study, we explore how cryptoc...
Article
Full-text available
Blockchain technology is the most trusted all-in-one cryptosystem that provides a framework for securing transactions over networks due to its irreversibility and immutability characteristics. Blockchain network, as a decentralized infrastructure, has drawn the attention of various startups, administrators, and developers. This system preserves tra...
Thesis
Text hiding is an intelligent programming technique, which embeds a secret message (SM) or watermark (ω) into a cover text file or message (CM/CT) in an imperceptible way to protect confidential information. Recently, text hiding in forms of watermarking and steganography has found broad applications in, for instance, covert communication, copyrigh...
Article
Full-text available
In statistics and machine learning, feature selection is the process of picking a subset of relevant attributes for utilizing in a predictive model. Recently, rough set-based feature selection techniques, that employ feature dependency to perform selection process, have been drawn attention. Classification of tumors based on gene expression is util...
Presentation
Full-text available
This presentation includes the seven most immanent trends in future computers: 1) Artificial Intelligence (AI) as a Service; 2) 5G data Networks; 3) Autonomous Driving; 4) Wearable Gadgets; 5) Computer Vision; 6) Extended Reality; 7) Blockchain Technology;
Article
Full-text available
Personal Health Records (PHR) are private and vital assets for every patient. There have been introduced many works on various aspects of managing and organizing the PHR so far. However, there is an uncertain remaining issue for the role of PHR in emergencies. In a traditional emergency access system, the patient cannot give consent to emergency st...
Article
Full-text available
Genetic Programming (GP) is an intelligence technique whereby computer programs are encoded as a set of genes which are evolved utilizing a Genetic Algorithm (GA). In other words, the GP employs novel optimization techniques to modify computer programs; imitating the way humans develop programs by progressively re-writing them for solving problems...
Article
Full-text available
Abstract: Modern text hiding is an intelligent programming technique which embeds a secret message/watermark into a cover text message/file in a hidden way to protect confidential information. Recently, text hiding in the form of watermarking and steganography has found broad applications in, for instance, covert communication, copyright protection...
Article
Full-text available
The traditional security risk monitoring technology cannot adapt to Cyber-Physical Power Systems (CPPS) concerning evaluation criteria, real-time monitoring and technical reliability. The aim of this paper is to propose and implement a log analysis architecture for CPPS to detect the log anomalies, which introduces the distributed streaming process...
Book
Due to the wide range of intelligent data hiding in the form of digital watermarking and steganography applications in the modern digital world, almost all the available books focus on many applications of information hiding in multimedia such as image, video, audio, and network. This book is written to provide a clear understanding for the newcome...
Conference Paper
Full-text available
Age estimation is a technique for predicting human ages from digital facial images, which analyzes a person's face image and estimates his/her age based on the year measure. Nowadays, intelligent age estimation and age synthesis have become particularly prevalent research topics in computer vision and face verification systems. Age synthesis is def...
Article
Full-text available
With the popularity of smartphones and widespread use of high-speed Internet, social media has become a vital part of people’s daily life. Currently, text messages are used in many applications, such as mobile chatting, mobile banking, and mobile commerce. However, when we send a text message via short message service (SMS) or social media, the inf...
Article
Full-text available
with the ceaseless usage of web and other online services, it has turned out to be amazingly simple to copy, share, and transmit digital media over the Internet. Since the text is one of the main available data sources and most widely used digital media on the Internet, the significant part of websites, books, articles, daily papers, etc. are just...
Article
Full-text available
Nowadays, a huge number of images are available. However, retrieving a required image for an ordinary user is a challenging task in computer vision systems. During the past two decades, many types of research have been introduced to improve the performance of the automatic annotation of images, which are traditionally focused on content-based image...
Research Proposal
with the ceaseless usage of web and other online services, it has turned out to be amazingly simple to copy, share, and transmit digital media over the Internet [1]. Since the text is one of the main available data sources and most widely used digital media on the Internet, the significant part of websites, books, articles, daily messages, papers,...
Article
Full-text available
Nowadays, the usage of smartphones and their applications have become rapidly popular in people's daily life. Over the last decade, availability of mobile money services such as mobile-payment systems and app markets have significantly increased due to the different forms of apps and connectivity provided by mobile devices, such as 3G, 4G, GPRS, an...
Data
This is a Reviewer Certificate awarded by the Elsevier Reviewer Recognition
Article
Embedding a hidden stream of bits in a cover file to prevent illegal use is called digital watermarking. The cover file could be a text, image, video, or audio. In this study, we propose invisible watermarking based on the text included in a webpage. Watermarks are based on predefined structural and syntactic rules, which are encrypted and then con...
Conference Paper
Steganography is the art of hiding a secret message within cover media without drawing any suspicion to others so that the message can only be detected by its intended recipient. The cover media could be an image, audio, video or text. In this research, a new method for sending a secret message by using steganography and cryptography is provided. T...
Article
In this paper, a new method for copyright protection of digital texts using watermarking of encryption message in digital documents is provided. The method is based on the placement of hidden character before and after special writing characters and blank lines between paragraphs in the main text with subtle changes and high resistance. In the prop...
Article
In this paper, a new method to protect digital content from unauthorized copying using watermarking message in digital documents like (MS Word, MS Excel) is presented which this work is done using hidden Unicode characters insertion toward positions of special punctuation characters (e.g., commas, dots, commas, double quotation, etc.) in the main t...
Conference Paper
Full-text available
Digital watermarking is a technique of hiding a signature or a copyright information through a cover media in an imperceptible way. In this paper, we propose a text watermarking technique which is applicable to use for protecting text documents (MS Word and Excell) with different languages.

Questions

Questions (2)
Question
Dear cybersecurity activists;
This is a kindly request to participate in an expert opinion-mining survey concerning the privacy risk assessment of users’ Privately Sensitive Data (PSD) in social media. The PSD could be any information that users did not share publicly on their profiles, such as real identity name, birthdate, phone number, current location, etc.
Through this survey, we seek the experts' opinions on the importance of influencing factors that affect the actions of developers, users, and inspectors in government agencies when they are involved in the development and usage of social media. These opinions can help us explore the relationships between these three groups of influencers in intelligent decision-making for privacy risk assessment of users' PSD in social media.
*Note that we assume an expert participant has an education background in computer science, Information, and communication systems with a minor in cybersecurity or worked in government agencies such as cybercrime research centers or taskforce operations for at least one year. The collected data from this survey will be employed to validate an AI-based privacy risk-assessment model called AFPr-AM, which is a collaborative research project between a group of researchers from (NJU, China), (UTSA, USA), and (WUT, Poland).
Estimated required time: 3 minutes
Question
During the past two decades a lot of attention has been paid to the use of special logics to analyze the cryptographic protocols, foremost among these being the logic of Burrows, Abadi and Needham (the BAN logic). In our project, the idea is hiding a secret message through the text in which the main point is similar to cryptography and difference is imperceptibility of the secret message. We also have same keys with cryptsystems. Could you please give me any example of Ban Logic which is used in text steganography or recommend me any other formal proofs that can be used in steganography?

Network

Cited By

Projects

Projects (6)
Project
In this project, we investigate the potential covert channels through the network protocols and encoding systems, as well as, the possibility of malware detection using machine learning techniques by assessing hidden features.
Project
In this project, we investigate the efficiency of machine learning and information hiding-based techniques for misinformation detection on social media. Moreover, we study existing threats and limitations of the state-of-the-art approaches with the aim of addressing these issues and presenting efficient countermeasures.
Project
Based on the mathematical theory of financial modeling and risk characteristics of cryptocurrencies, we first study the open challenges of investments in cryptocurrencies, the risk assessment theories using fuzzy expert systems, and the efficiency of the existing risk assessment models. Secondly, we study novel game-theoretic models and fuzzy analytic hierarchy process (FAHP) based expert systems considering the determinant factors on the trustworthiness of investments in cryptocurrencies. Thirdly, we propose a novel machine learning mechanism using a combination of game-theoretic models and FAHP-based expert systems for assessing risks of investments in the cryptoassets. Finally, we build up a web-based prototype system according to our proposed solution for forensics identification of high-risk cryptocurrencies to verify the practical implications of our research outcomes. To the best of our knowledge, there is no available risk assessment model, which can assess the trustworthiness of investments in cryptoassets.