Yashar Salami

Yashar Salami
Qazvin Islamic Azad University | QIAU · Faculty of Electrical Engineering, Computer and Information Technology

Doctor of Philosophy of Computer Networks
Security & Privacy, Fog & Cloud computing, Internet of things, Blockchain & Distributed System

About

23
Publications
25,266
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
70
Citations
Introduction
I have actively contributed to the field with numerous publications in prestigious journals such as Nature, Springer, IEEE, John Wiley and Hindawi. I have amassed over 100 citations and achieved a notable h-index of 7 . Notably, I had the opportunity to publish an article in the 5th most cited journal in the world. Additionally, I have the honor of being the first student to have their doctoral thesis published in the esteemed journal Nature, marking a globally recognized achievement.
Additional affiliations
September 2018 - present
Qazvin Islamic Azad University
Position
  • PhD Candidate
Description
  • In 2018, I started a Ph.D. at Qazvin Islamic Azad University. I am currently researching security in fog-cloud environments.
Education
October 2015 - September 2017
Islamic Azad University of Tabriz
Field of study
  • Information Technology (Network)
February 2012 - February 2015
Independent Researcher
Independent Researcher
Field of study
  • Software Technology Engineering
February 2010 - February 2012
Technical and Vocational University
Field of study
  • Software Technology Engineering

Publications

Publications (23)
Article
Full-text available
Internet of Vehicles (IOV) is a section of the Internet of Things (IoT) which makes road transportation smart and provides security for the passengers traveling along the roads. Fog computation can be considered as a complement for IOV because it is close to the user and can communicate with Road Side Units (RSU) and process information with low la...
Article
Full-text available
Security in cyberspace has become an important problem in the modern world. Security threats are a disadvantage for jobbers on cloud computing, thus using different levels of information security in different contexts, is required more than ever. In distributed systems, encryption and key exchange are used to create security. The Diffie–Hellman pro...
Article
Full-text available
The fog computing architecture allows data exchange with the vehicle network, sensor networks, etc. However, before exchanging data, the nodes need to know each other and key exchange. Yashar et al. recently proposed a secure key exchange scheme for the fog federation. However, their proposed scheme has a high computational overhead and is not suit...
Article
Full-text available
Increasing contrast is one of the vital issues in meteorological image processing, which is crucial for improving image quality and weather condition detection. One of the most common methods for enhancing contrast in digital images is histogram equalization. This method is simple and effective, but it often leads to illogical contrast enhancement...
Article
Full-text available
Today, with the advancement of blockchain and Internet of Things (IoT) technologies, there is a growing need for authentication protocols and key exchanges to facilitate communication between these diverse technologies. Authentication and key exchange protocols are designed using symmetric and asymmetric encryption methods, each with varying comput...
Article
Full-text available
The Internet of Vehicles (IoV) plays a crucial role in advancing intelligent transportation systems. However, due to limited processing power, IoV faces challenges in independently handling large volumes of data, necessitating the use of offloading as a solution. Offloading data in wireless environments raises security concerns, highlighting the ne...
Conference Paper
Full-text available
— The spread of the Internet of Things has led to the emergence of smart homes, smart cars, and intelligent cities, positively impacting human life. This development has also affected Unmanned Aerial Vehicles and has given Unmanned Aerial Vehicles a special place in the military, cinema, and urban traffic management industries. However, one of the...
Article
Full-text available
The Internet of Things (IoT) is growing and has significantly impacted today's life. Although the IoT plays an essential role in human life, it has processing limitations, and this has caused it to not perform well in the face of extensive processing. To solve this limitation in the IoT, the offloading technique is used. Due to the nature of wirele...
Article
Full-text available
The security of communication between Internet of Things devices is a big concern in this field, and with the increase in the number of devices and users, the current architecture and communication protocols cannot adequately respond to the system's needs, such as authentication and access authorization. One of the important solutions to this probl...
Article
Full-text available
The Internet of Things allows vehicles to communicate with their surroundings and send various traffic and road conditions to other vehicles, making driving better. Data received from other vehicles sometimes need to be processed. In this state, the data should be sent to the Roadside unit for processing and fog if necessary. The source and destina...
Article
Full-text available
The ever-increasing growth of the population and their concentration in cities has destructive and often catastrophic effects on natural habitats and human life and exposes cities to painful crises, including environmental and human destruction, which has caused humans to turn to technologies emerging to reduce environmental risks. Blockchain is a...
Article
Full-text available
Considering that in automatic weather station systems, raw data is collected by sensors by AWSs, and these sensors themselves cannot process raw data. The data is sent to the CPS unsafely for processing, considering that the raw data in the wireless network is sent. No encryption operation or key exchange has been performed between the communicatio...
Article
Full-text available
Information security has become an important issue in the modern world due to its increasing popularity in Internet commerce and communication technologies such as the Internet of Things. Future media actors are considered a threat to security. Therefore, the need to use different levels of information security in different fields is more needed. A...
Preprint
Full-text available
Today, with the development of blockchain and Internet of Things technologies, we need authentication protocols and key exchanges to communicate with these different technologies. Symmetric and asymmetric encryption methods are used to design authentication and key exchange protocols, each of which has different computation costs. In the Internet o...
Preprint
Full-text available
Intelligent driving has reduced traffic and accidents, which has increased road safety. One of the advantages of Smart vehicles is communication with the environment, communication with the environment makes the driver aware of the traffic situation and accidents, and other things. However, the vehicle needs to be able to authenticate the other par...
Conference Paper
The public key encryption is one of the most widely used methods based on mathematical complexity, which is used for protecting transferred messages between the two communicative sides. Many encryption systems work on the basis of Prime numbers, which obtaining these numbers is difficult for modern computers. But with the advent of quantum compu...

Questions

Questions (44)
Question
Can the use of ChatGPT and other AI technologies pose a threat to human jobs, or can this technology be seen as a complement to enhance productivity and creativity in the workforce?

Network

Cited By