Personal Website

Dr. Ali Soleymani

Assistant Professor @ Iranians University an e-Institute of Higher Education

Education

PhD

Computer Science, Information Security

National University of Malaysia (UKM)

Thesis Title: Securing Selective Region of Images based on ECC and Chaotic Maps

2010 to 2015

Master of Science

Computer Architecture Engineering

Islamic Azad University – Science and Research Branch – Tehran – Iran

Thesis Subject: A New Method of Image Enhancement for PCA based Face Verification

Bachelor

Computer Hardware Engineering

Islamic Azad University- Meybod Branch – Yazd – Iran

Thesis Subject: Design & Implement of a Digital Filter-Meter

Teaching Experiences

Teaching Experiences

Teaching Interests

Work Experiences

Publications

  1. Build Your own PC, 2003 – Published Book, Translating from English to Persian
  2. Image Encryption: A Hybrid Approach Based on ECC & Chaotic Maps – Lambert Academic Publishing, Germany – ISBN: 978-6200079855
  3. Cloud+, 2021 – Published Book, Translation from English to Persian
  1. Norouzifard, A. Soleymani, J. Shanbehzadeh, “A New Method for Measuring Auto-Fluorescence Changes in Neovascular-AMD after Intravitreal Injection of Bavecizumab” – CTIT09 IEEE Conference, Dubai, UAE, 2009.
  2. Norouzifard, A. Soleymani, J. Shanbehzadeh, “A New System for Measuring Auto-fluorescence Changes in Neovascular-AMD after Intravitreal Injection of Bavecizumab” – Journal of Transactions on Electrical Technology – Vol.2 –No.1- Winter 2010
  3. Soleymani, Z. M. Ali, M. J. Nordin, “A Public Key Image Encryption Scheme Based on ECC” – 6th Malaysian Software Engineering Conference – UKM, 2012.
  4. Soleymani, Z. M. Ali, M. J. Nordin, “A Survey on Principal Aspects of Secure Image Transmission”, World Academy of Science, Engineering and Technology, Vol.6, pp.247-254, 2012.
  5. Soleymani, M. J. Nordin, Z. M. Ali, “A Novel Public-Key Image Encryption Scheme Based on Elliptic Curves over Prime Group Field”, Journal of Image and Graphics, Vol.1, No.1, pp. 43-49, March 2013.
  6. Bokharaein, S. Safa, A. Soleymani, “Brain MR Segmentation through Fuzzy Expectation Maximization and Histogram Based K-Means”, International Journal of Computer and Electrical Engineering vol. 5, no. 5, pp. 438-441, 2013.
  7. Soleimani, A. Soleymani, S. Ahmadi, M. J. Nordin, “Comparative Assessment of Different Energy Mapping Methods in CT-Based Attenuation Correction in PET/CT System Using Whole Body XCAT Phantom”, Procedia Technology, Vol. 8, pp. 920-931, Elsevier, 2013.
  8. Soleymani, M. J. Nordin, A. Noori Hoshyar, Z. M. Ali, E. Sundararajan, “An Image Encryption Scheme Based on Elliptic Curve and a Novel Mapping Method”, Int. Journal of Digital Content Technology and its Applications (JDCTA), Vol. 7, pp. 85-95, September 2013.
  9. Soleymani, M. J. Nordin, Z. M. Ali, L. Golafshan, “A Binary Grouping Approach for Image Encryption Based on Elliptic Curves over Prime Group Field”, MICC13 – 11th IEEE Malaysian International Conference on Communication, 2013.
  10. Soleymani, M. J. Nordin, E. Sundararajan, “A Chaotic Cryptosystem for Images Based on Henon and Arnold Cat Map”, The Scientific World Journal, Security of Information and Network Issue, Vol.2014.
  11. A. Safvati, A. Soleymani, “RFID-based Object Detection System in IoT”, 4th International Conference on Applied Research in Computer Engineering & Signal Processing”, December 2016, Tehran, Iran.
  12. A. Soleymani, A. Shirazipour, “Comparison of image enhancement methods for PCA-based face recognition”, 3rd International Conference on Electrical Engineering, 2018.
  13. Arabgol, A. Soleymani, M. Nourian, “A Review on Botnet Detection Methods in DNS Traffic”, 2nd Conference on Innovations in Computer Science and Electrical Engineering, ICSEE2019.
  14. Arabgol, A. Soleymani, M. Nourian, “DGA botnet detection based on machine learning techniques in DNS query data”, 4th National Congress of Basic Research in Computer Engineering and Information Technology, 2019
  15. Nourbakhsh, A. Soleymani, M. Nourian, “Digital Forensics in Android Operating System”, 3rd national Conference on Electrical and Computer Engineering, 2019.
  16. Soleymani, F. Arabgol, “A Study on the Effects of One-Time Password on Bank’s Customers Satisfaction”, Quarterly Journal of Advanced Banking Studies, 2019.
  17. Ghaemi, A. Soleymani, S. Shojaechaiekar, “Two Factor Authentication in Could-Based Services”, International Conference on Modern Research in Electrical, Computer, Mechanical and Mechatronics Engineering in Iran and Islamic World, 2020.
  18. Nourbakhsh, A. Soleymani, M. Akraminasab, “Application of blockchain in creating a secure Distributed Storage Resource Using Smart Health Contract”, 2nd International Conference on Knowledge Management, Blockchain and Economy, 2020.
  19. Soleymani, F. Arabgol, “A Novel Approach for Detecting DGA-Based Botnets in DNS Queries Using Machine Learning Techniques”, Journal of Computer Networks and Communications, vol. 2021.
  20. Nourbakhsh, A. Soleymani, M. Akraminasab, “Implementing a Distributed Secure Storage Resource for Health Applications using Blockchain and Smart Contract”, 4th International Conference on Interdisciplinary Researches in Electrical, Computer, Mechanical and Mechatronics Engineering in Iran and Islamic World, 2021.
  21. Ghoreishi, A. Soleymani, “”, The 4th National Conference on New Technologies in Electrical, Computer and Mechanical Engineering of Iran, 2021.
  22. Soleymani, F. Shakouri, “A survey on Architecture and Deployment of Containers”, 4th National Conference on New Technologies in Electrical and Computer Engineering, 2021.
  23. Soleymani, N. Nourbakhsh, “A Comprehensive Solution for Digital Forensics in Android Mobile Phone”, 4th National Conference on New Technologies in Electrical and Computer Engineering, 2021.
  24. Arabi, A. Soleymani, “Cryptographic Hash Functions based on Chaotic Mapping”, 1st Digital Transformation and Intelligent Systems Conference, 2021.

Certificates

 

  • ICDL
  • Action Research
  • IELTS 7.0
  • Microsoft Project 2014
  • 2G, 3G, 4G Fundamentals
  • ISMS (ISO 27000)
  • Security+
  • PKI Fundamentals
  • Digital Forensic
  • CEH (Certified Ethical Hacker)
  • Network Simulator (NS-2)
  • Cyber Security – ITU (International Telecommunication Union)
  • Intellectual Property and Commercialization Camp (Inventions)
  • CISSP (Certified Information Security Professional)
  • Malaysian Cryptology and Information Security 2013 (INSPEM)
  • Best Oral Presentation Award on 2nd International Conference on Video and Media- 2012
  • Elliptic Curve Cryptography, Workshop and Summer School, KU Leuven, Belgium – 2013
  • ISI Paper Writing, Publication and Plagiarism Avoidance, UKM, Malaysia.
  • INCOTERMS 2020 – Industrial Research & Training Center of Iran
  • CS/PS/ SIP & LTE Signalling – Hexout – Sweden – 2020
Other Activities
  • Providing various workshops on security and networking.
  • Awarding International Khwarizmi Festival Prize
Conference Presentation and Talks

 

  • 1st International IEEE Conference on Current Trends in Information Technology (CTIT 2009), Dubai, UAE.
  • 6th Malaysian Software Engineering Conference, (MySEC12), Malaysia.
  • International Conference on Cryptography and Computer Security (ICCCS 2012), Paris, France.
  • 2nd International Conference on Video and Media (ICVM 2013), Phuket, Thailand.
  • 4th International Conference on Electrical Engineering and Informatics, (ICEEI 2013), Malaysia.
  • 11th IEEE Malaysian International Conference on Communication, (MICC 2013), Malaysia.
Conference and Journal Review
  • Reviewer of the Frontiers of Computer Science – Springer
  • Reviewer of the Visual Computer Journal (TVCJ) – Springer
  • Reviewer of the ISeCure Journal – Sharif University of Technology
  • Reviewer of the ISI Journal – Public Library of Science (PLOS ONE)
  • Reviewer of IEEE Symposium on Computer and Informatics (ISCI 2012)
  • Reviewer of IEEE Conference on Cyber Security, Cyber Warfare and Digital Forensic (CyberSec 2012)
  • Reviewer of IEEE on Computer Applications and Industrial Electronics (ISCAIE 2012)
  • Reviewer of IEEE Student Conference on Research and Development (SCORED 2012)
  • Reviewer of IEEE International Conference on Control System, Computing and Engineering (ICCSCE 2012)
  • Reviewer and Chair of 4th International Conference on Electrical Engineering and Informatics (ICEEI 2013)
  •  
Grants and Research Assistants
  •  

    1. Title: New Secure Electronic Copyright Protection Techniques Based on Public Key Cryptosystems

    Period: 08/2011 to 08/2012

    Project Code: UKM-GUP-2011-244.

     

    1. Title: Enhancing Secure Files Distribution Based on Digital Watermarking with Public Key Cryptosystems

    Period:  04/2012 to 04/2014

    Project Code: FRGS/1/2012/SG05/UKM/02/1.

Research Interests
    • Image Processing
    • Network and Security
    • Cryptography
    • Mobile Networks
Supervised MSc Thesis
  • Detecting DGA-Based Botnets in DNS Queries Using Machine Learning Techniques
  • Digital Forensics in Android Mobile Phone
  • Two Factor Authentication in Could-Based Services
  • A Distributed Secure Storage Resource for Health Applications using Blockchain and Smart Contract