Ali Miri

Ali Miri, PhD

Full Professor, Department of Computer Science · Toronto Metropolitan University

Ali Miri is a Full Professor with the Department of Computer Science at Toronto Metropolitan University, where he directs the newly launched Master of Cybersecurity program and leads the Information and Computer Security Laboratory (iCaSL). His research spans cybersecurity, privacy-preserving technologies, cloud computing and big data, computer networks, and digital communications. He has authored and co-authored over 257 refereed publications, six books, and eight patents in these areas. He has served as general chair or co-chair of more than a dozen international conferences and workshops, and has been a member of over 100 technical program committees. He is a Senior Member of IEEE and serves on the advisory board of the Canadian Institute for Cybersecurity (CIC).

257 Publications
8 Patents
$8.5M Research Funding
100 HQP Trained

Education

PhD in Electrical and Computer Engineering

University of Waterloo, Canada

MSc in Mathematics

University of Toronto, Canada

BSc in Mathematics and Physics

University of Toronto, Canada

Experience

Full Professor, Department of Computer Science
Toronto Metropolitan University
2009 – Present
Graduate Program Director, Master of Cybersecurity
Toronto Metropolitan University
2025 – Present
Founder & Director, Information and Computer Security Laboratory (iCaSL)
Toronto Metropolitan University
2013 – Present
Director, Broadband Internet Innovation Center (BIIC)
Toronto Metropolitan University
2018 – 2023
Research Director, Privacy and Big Data Institute
Ryerson University
2015 – 2019
Graduate Program Director, Department of Computer Science
Ryerson University
2018 – 2019
Associate Chair, Department of Computer Science
Ryerson University
2010 – 2015
Full Professor, School of Information Technology and Engineering (SITE)
University of Ottawa
2008 – 2010
Associate Professor, SITE
University of Ottawa
2005 – 2008
Assistant Professor, SITE
University of Ottawa
2001 – 2005
NSERC Postdoctoral Fellow
University of Toronto & University of Waterloo
1999 – 2001

Research Interests

Cybersecurity Privacy-Preserving Technologies Cloud Computing Big Data Analytics Federated Learning Blockchain IoT Security Differential Privacy Intrusion Detection Cryptography Computer Networks Digital Communications RFID Security Encrypted Search & Computation Machine Learning Security

Publications

67Journal Articles
162Conference Papers
6Books
7Book Chapters
8Patents
7Others
ConfN. Alipourjeddi and A. Miri, "Anomaly Detection in Graphs via Topology-Aware Attention Mechanisms," IEEE TPS 2025, Pittsburgh, USA.
ConfJ. Arbas, N. Alipourjeddi, and A. Miri, "Certified Attribute Privacy in CAN Latent Space," IEEE TPS 2025, Pittsburgh, USA.
ConfN. Alipourjeddi and A. Miri, "Topology-Driven Defense: Detecting Model Poisoning in Federated Learning with Persistence Diagrams," ICISSP 2025, Porto, Portugal.
ConfF. Rashid and A. Miri, "Privacy-Preserving Anomaly Detection Through Sampled, Synthetic Data Generation," SECRYPT 2024, Dijon, France.
ConfM. Alani, A. Mashatan, and A. Miri, "Building Detection-Resistant Reconnaissance Attacks Based on Adversarial Explainability," ACM ASIACCS 2024, Singapore.
ConfN. Alipourjeddi and A. Miri, "Preserving Privacy in High-Dimensional Data Publishing," ICISSP 2024, Rome, Italy.
JournalM. Alani, A. Mashatan, and A. Miri, "XMal: A Lightweight Memory-Based Explainable Obfuscated-Malware Detector," Computer and Security, Vol. 133, 2023.
JournalA. Alalfi, A. Abu Zaid, and A. Miri, "A Model-Driven-Engineering Approach for Detecting Privilege Escalation in IoT Systems," Journal of Object Technology, Vol. 22, No. 1, 2023.
ConfM. Alani, A. Mashatan, and A. Miri, "Explainable Ensemble-Based Detection of Cyber Attacks on Internet of Medical Things," IEEE DASC 2023, Abu Dhabi, UAE.
ConfM. Alani, A. Mashatan, and A. Miri, "Forensic Identification of Android Trojans Using Stacked Ensemble of Deep Neural Networks," ACNS 2023, Kyoto, Japan.
ConfN. Alipourjeddi and A. Miri, "Evaluating Generative Adversarial Networks: A Topological Approach," ICNC 2023, Honolulu, Hawaii.
ConfM. Alani, A. Mashatan, and A. Miri, "XMeDNN: An explainable deep neural network system for intrusion detection in Internet of Medical Things," ICISSP 2023, Lisbon, Portugal.
JournalM. Alani and A. Miri, "Towards an Explainable Universal Feature Set for IoT Intrusion Detection," Sensors, Vol. 22, No. 15, 2022.
JournalS. Ismaeel, A. Miri, and A. Al-khazraji, "An Efficient Single Unit for Virtual-Machine Placement in Cloud Data Centers," Int'l J. of Information and Communication Technology, Vol. 21, No. 1, 2022.
ConfK. Rudavskyy and A. Miri, "Resilience of GANs against Adversarial Attacks," SECRYPT 2022, Lisbon, Portugal.
ConfS. Ghaffaripour and A. Miri, "Parasite Chain Attack Detection in the IOTA Network," IWCMC 2022, Dubrovnik, Croatia.
ConfN. Alipourjeddi and A. Miri, "Publishing Private High-dimensional Datasets: A Topological Approach," IWCMC 2022, Dubrovnik, Croatia.
JournalA. Majed, F. Raji, and A. Miri, "Replication management in peer-to-peer cloud storage systems," Cluster Computing, Vol. 25, No. 1, pp. 401–416, 2021.
ConfS. Ghaffaripour and A. Miri, "Mutually Private Verifiable Machine Learning As-a-Service: A Distributed Approach," IEEE AIIoT 2021. (Best Paper Award)
ConfF. Rashid and A. Miri, "User and Event Behavior Analytics on Differentially Private Data for Anomaly Detection," IEEE BigDataSecurity 2021, New York, USA.
JournalS. M. Dibaj, A. Miri, and A. Mostafavi, "A cloud priority-based dynamic online double auction mechanism (PB-DODAM)," J. of Cloud Computing, Vol. 9, No. 1, 2020.
JournalZ. MovahediNia, M. R. Khayyambashi, and A. Miri, "A static VM placement and hybrid job scheduling model for green data centers," PLOS ONE, Vol. 15, No. 8, 2020.
JournalS. M. Dibaj, A. Miri, and A. Mostafavi, "A cloud dynamic online double auction mechanism (DODAM) for sustainable pricing," Telecom. Systems, Vol. 75, No. 4, 2020.
JournalA. Alizadeh, H. Vranken, A. Zúquete, and A. Miri, "Timely Classification and Verification of Network Traffic Using Gaussian Mixture Models," IEEE Access, Vol. 8, 2020.
JournalM. Shojafar, Z. Pooranian, M. Conti, A. Miri, R. Taheri, and R. Javidan, "On Defending Against Label Flipping Attacks on Malware Detection Systems," Neural Computing and Applications, 2020.
ConfS. M. Dibaj, A. Miri, and A. Mostafavi, "Multi-Unit Market-based Mechanism Design in Cloud Secondary Markets," IEEE EPEC 2020, Edmonton, Canada.
ConfS. Ghaffaripour and A. Miri, "A decentralized, privacy-preserving and crowdsourcing-based approach to medical research," IEEE SMC 2020, Toronto, Canada.
ConfS. M. Dibaj and A. Miri, "C2TOP: A Cloud Competition-based Truthful Online Pricing Mechanism in Secondary Markets," IEEE IEMCON 2020.
ConfS. Ismaeel, M. Kamaludeen, and A. Miri, "Secure Digital Service as a Utility and the Unit of Measure," IEEE IEMCON 2020.
ConfF. Rashid and A. Miri, "An Emerging Strategy for Privacy Preserving Databases: Differential Privacy," HCI 2020, Copenhagen, Denmark.
ConfS. Ghaffaripour and A. Miri, "Enabling Medical Research Through Privacy-Preserving Data Markets," HCI 2020, Copenhagen, Denmark.
JournalH. Poon and A. Miri, "Fast Phrase Search for Encrypted Cloud Storage," IEEE Trans. on Cloud Computing, Vol. 7, Issue 4, pp. 1002–1012, 2019.
ConfS. Ghaffaripour and A. Miri, "Cryptographically Enforced Access Control in Blockchain-Based Platforms," AICCSA 2019, Abu Dhabi, UAE.
ConfF. Alsayoud and A. Miri, "SSD: Cache Or Tier - An Evaluation of SSD Cost and Efficiency Using MapReduce," AICCSA 2019.
ConfM. Shojafar et al. and A. Miri, "Automatic Clustering of Attacks in Intrusion Detection Systems," AICCSA 2019.
ConfS. Ghaffaripour and A. Miri, "Application of Blockchain to Patient-Centric Access Control in Medical Data Management Systems," IEEE IEMCON 2019.
ConfF. Alsayoud and A. Miri, "HMM Optimized Modeling of SSD Storage for I/O MapReduce Workloads," IEEE IEMCON 2019.
ConfF. Rashid and A. Miri, "Secure Textual Data Deduplication Scheme Based on Data Encoding and Compression," IEEE IEMCON 2019.
ConfA. Abu Zaid, M. Alalfi, and A. Miri, "Automated Identification of Over-Privileged SmartThings Apps," IEEE ICSME 2019.
ConfF. Rashid and A. Miri, "Output and Input Data Perturbations for Differentially Private Databases," IEEE World Congress on Services 2019, Milan, Italy.
ConfS. Ismaeel and A. Miri, "A Systematic Cloud Workload Clustering Technique in Large Scale Data Centres," IEEE World Congress on Services 2019.
ConfF. Younis and A. Miri, "Using Honeypots in a Decentralized Framework to Defend Against Adversarial Machine-Learning Attacks," SML 2019, LNCS, Springer.
ConfS. Ismaeel, A. Al-khazraji, and A. Miri, "An Efficient Workload Clustering Framework for Large-Scale Data Centers," ICMSAO 2019, Bahrain.
ConfS. Ismaeel, A. Miri, and A. Al-khazraji, "A Novel Host Readiness Factor used for Energy-Efficient VM Consolidation in Cloud Data Centers," ICMSAO 2019.
ConfS. Ismaeel and A. Miri, "Real-Time Energy-Conserving VM-Provisioning Framework for Cloud-Data Centers," IEEE CCWC 2019, Las Vegas.
ChapterF. Rashid and A. Miri, "Secure Data Deduplication in the Cloud," in Guide to Big Data Applications, Springer, 2018.
ChapterH. Poon and A. Miri, "Search and Computation over Encrypted Data Stores," in Guide to Big Data Applications, Springer, 2018.
JournalS. Ismaeel, R. Karim, and A. Miri, "Proactive Dynamic Virtual-Machine Consolidation for Energy Conservation in Cloud Data Centres," J. of Cloud Computing, Vol. 7, No. 1, 2018.
JournalJ. Zarepour-Ahmadabadi et al. and A. Miri, "A New Gradual Secret Sharing Scheme with Diverse Access Structure," Wireless Personal Comms., Vol. 99, Issue 3, 2018.
ConfS. M. Dibaj, L. Sharifi, A. Miri, et al., "Cloud Computing Energy Efficiency and Fair Pricing Mechanisms for Smart Cities," IEEE EPEC 2018, Toronto.
ConfS. Ghaffaripour, F. Younis, H.-T. Poon, and A. Miri, "An Analysis of the Security of Compressed Sensing Using an Artificial Neural Network," PST 2017, Calgary, Canada.
PatentH. Poon, A. Miri, and M. Kamaludeen, "Encrypted Data - Computer Virus, Malware and Ransom Ware Detection System," Canadian Provisional Patent, 2016.
PatentH. Poon, A. Miri, and M. Kamaludeen, "Encrypted Data - Data Integrity Verification and Auditing system," Canadian Provisional Patent, 2016.
PatentB. Malek and A. Miri, "Systems and Methods for Location-Based Financial Transaction Authentication," PCT Application, 2016.
JournalR. Karim, C. Ding, A. Miri, and M. D. Rahman, "Incorporating services' and users' information and latent features to predict QoS," Cluster Computing, Vol. 19, Issue 3, 2016.
JournalF. Rashid, A. Miri, and I. Woungang, "Secure Image Deduplication Through Image Compression," J. of Info. Security and Applications, Vol. 27-28, 2016.
ConfF. Rashid and A. Miri, "Secure Image Data Deduplication through Compressive Sensing," PST 2016, Auckland, New Zealand.
ConfS. Asiri and A. Miri, "An IoT Trust and Reputation Model Based on Recommender Systems," PST 2016.
ConfH. Poon and A. Miri, "A Combined Solution for Conjunctive Keyword Search, Phrase Search and Auditing for Encrypted Cloud Storage," IEEE Smart World Congress 2016, Toulouse.
ConfH. Poon and A. Miri, "Scanning for Viruses on Encrypted Cloud Storage," IEEE Smart World Congress 2016.
ConfB. Habtemariam et al. and A. Miri, "Privacy Preserving Predictive Analytics with Smart Meters," IEEE BigData Congress 2016.
ConfS. Ismaeel and A. Miri, "Multivariate Time Series ELM for Cloud Data Centre Workload Prediction," HCI 2016, Toronto.
ConfF. Rashid and A. Miri, "Anonymous Authentication with a Bi-directional Identity Federation in the Cloud," HCI 2016.
ConfS. Ismaeel, A. Miri, and A. Al-Khazraji, "Energy-Consumption Clustering in Cloud Data Centre," BigData and Smart City 2016, Muscat, Oman.
PatentB. Malek and A. Miri, "Systems and Methods for Location-Based Financial Transaction Authentication," US Patent Application, 2015.
ConfS. Ismaeel and A. Miri, "Using ELM Techniques to Predict Data Centre VM Requests," IEEE CSCloud 2015.
ConfS. Ismaeel et al. and A. Miri, "Open Source Cloud Management Platforms: A Review," IEEE CSCloud 2015.
ConfH. Poon and A. Miri, "A Low Storage Phase Search Scheme based on Bloom Filters for Encrypted Cloud Services," IEEE CSCloud 2015.
ConfS. Ismaeel et al. and A. Miri, "An Extreme Learning Machine (ELM) Predictor for Electric Arc Furnaces," IEEE CSCloud 2015.
ConfR. Karim, C. Ding, and A. Miri, "End-to-End QoS Prediction Model of Vertically Composed Cloud Services via Tensor Factorization," IEEE ICCAC 2015.
ConfS. Seifzadeh and A. Miri, "Similarity Measure based on Low-Rank Approximations for Highly Scalable Recommender Systems," IEEE BigDataSE 2015.
ConfF. Rashid, A. Miri, and I. Woungang, "Proof of Storage for Video Deduplication in the Cloud," IEEE Cloud 2015.
ConfH. Poon and A. Miri, "Computation and Search over Encrypted XML Documents," IEEE Cloud 2015.
ConfH. Poon and A. Miri, "An Efficient Conjunctive Keyword and Phase Search Scheme for Encrypted Cloud Storage Systems," IEEE Cloud 2015.
ConfR. Karim, C. Ding, and A. Miri, "End-to-End QoS Prediction of Vertical Service Composition in the Cloud," IEEE Cloud 2015.
ConfS. Ismaeel and A. Miri, "A Universal Unit for Measuring Clouds," IEEE IHTC 2015, Ottawa.
ConfS. Ismaeel, A. Miri, and D. Chourishi, "Using the Extreme Learning Machine (ELM) Technique for Heart Disease Diagnosis," IEEE IHTC 2015.
ConfD. Chourishi, A. Miri, et al., "Role-Based Multiple Controllers for Load Balancing and Security in SDN," IEEE IHTC 2015.
ConfF. Alsayoud and A. Miri, "Index Selection on MapReduce Relational-Database," IEEE BigDataService 2015.
ConfF. Rashid, A. Miri, and I. Woungang, "A Secure Video Deduplication Scheme in Cloud Storage Environments using H.264 Compression," IEEE BigDataService 2015.
PatentP. Longa and A. Miri, "Accelerating the scalar multiplication on ECC over prime fields," Canadian Patent, 2014.
PatentP. Longa, A. Miri, and L. Orozco Barbosa, "Exponentiation method using multibase number representation," Canadian Patent, 2014.
JournalN. Pakniat, Z. Eslami, and A. Miri, "A note on selling multiple secrets to a single buyer," Information Sciences, Vol. 279, 2014.
JournalF. Raji, A. Miri, et al., "PESCA: A Peer to Peer Social Network Architecture," IET Information Security, Vol. 9, No. 1, 2014.
JournalF. Raji, A. Miri, et al., "Centralized Privacy-Preserving Framework for Online Social Networks," ISeCure, Vol. 6, No. 1, 2014.
ConfN. Alkhojandi and A. Miri, "Privacy-preserving public auditing in cloud computing with data deduplication," FPS 2014, Montreal.
ConfF. Rashid, A. Miri, and I. Woungang, "Proof of Retrieval and Ownership Protocols for Images through SPIHT Compression," CSS 2014, Paris.
ConfR. Karim, C. Ding, A. Miri, and X. Liu, "End-to-end QoS mapping and aggregation for selecting cloud services," CTS 2014, Minneapolis.
BookA. Miri, Advanced Security and Privacy for RFID Technologies, IGI Global, 2013.
BookJ. Garcia-Alfaro et al. and A. Miri, Proceedings of FPS 2012, LNCS 7743, Springer, 2013.
ChapterB. Malek and A. Miri, "Authentication for RFIDs," in Advanced Security and Privacy for RFID Technologies, IGI Global, 2013.
ChapterI. Onat and A. Miri, "RFID standards," in Advanced Security and Privacy for RFID Technologies, IGI Global, 2013.
ChapterI. Onat and A. Miri, "RFID wireless link threats," in Advanced Security and Privacy for RFID Technologies, IGI Global, 2013.
JournalA. Miri et al., "Guest editorial: security and privacy in ubiquitous computing," Security and Communication Networks, Vol. 6, Issue 12, 2013.
JournalS. Samet, A. Miri, and E. Granger, "Incremental learning of privacy-preserving Bayesian networks," Applied Soft Computing, Vol. 13, Issue 8, 2013.
JournalF. Raji, A. Miri, et al., "CP2: Cryptographic privacy protection framework for online social networks," Computers and Electrical Engineering, Vol. 39, Issue 7, 2013.
JournalB. Malek and A. Miri, "Chaotic masking for securing RFIDs against relay attacks," Security and Communication Networks, Vol. 6, Issue 12, 2013.
JournalF. Raji et al. and A. Miri, "DEFF: A new architecture for private online social networks," Security and Communication Networks, Vol. 6, Issue 12, 2013.
ConfR. Karim, C. Ding, and A. Miri, "An end-to-end QoS mapping approach for cloud service selection," IEEE CLOUD 2013, Santa Clara.
ConfF. Rashid, A. Miri, and I. Woungang, "Secure Enterprise Data Deduplication in the Cloud," IEEE CLOUD 2013.
BookA. Miri and S. Vaudenay, eds., Selected Areas in Cryptography – SAC 2011, LNCS 7118, Springer, 2012.
JournalT. Niyomsataya, A. Miri, and M. Nevins, "Decoding affine reflection group codes with trellises," Advances in Mathematics of Communications, Vol. 6, 2012.
JournalS. Samet and A. Miri, "Privacy-preserving back-propagation and extreme learning machine algorithms," Data and Knowledge Engineering, Vol. 79, 2012.
JournalW. Khreich et al. and A. Miri, "A survey of techniques for incremental learning of HMM parameters," Information Sciences, Vol. 197, 2012.
JournalB. Malek and A. Miri, "Securing Harari's authentication scheme," Int'l J. of Network Security, Vol. 14, 2012.
JournalB. Malek and A. Miri, "Adaptively secure broadcast encryption scheme with short ciphertexts," Int'l J. of Network Security, Vol. 14, 2012.
JournalM. Li, A. Miri, and D. Zhu, "Converting ordinary elliptic curves into binary Edwards form," Int'l J. of Digital Content Technology, Vol. 6, 2012.
JournalW. Khreich et al. and A. Miri, "Adaptive ROC-based ensembles of HMMs applied to anomaly detection," Pattern Recognition, Vol. 45, No. 1, 2012.
JournalA. Lima, A. Miri, and M. Nevins, "Analysis of relay attacks on RFiD systems," IEEE Latin America Transactions, Vol. 10, No. 1, 2012.
ConfN. Mailloux, A. Miri, and M. Nevins, "Compass: Authenticated group key agreement from signcryption," FPS 2012, Montreal.
ConfH. Chung and A. Miri, "On the hardware design and implementation of a chaos-based RFID authentication," ISSPA 2012, Montreal.
ConfH. T. Poon and A. Miri, "On efficient decoding for the fuzzy vault scheme," ISSPA 2012.
ConfF. Rashid, A. Miri, and I. Woungang, "A secure data deduplication framework for cloud environments," PST 2012, Paris.
ConfB. Malek and A. Miri, "Lightweight mutual RFID authentication," IEEE ICC 2012, Ottawa.
ConfA. Awad and A. Miri, "A new image encryption algorithm based on a chaotic DNA substitution method," IEEE ICC 2012.
BookS. Samet and A. Miri, Privacy-Preserving Data Mining, VDM Verlag, 2011.
PatentP. Longa and A. Miri, "Accelerating the scalar multiplication on ECC over prime fields," US Patent 7991162, 2011.
PatentP. Longa, A. Miri, and L. Orozco Barbosa, "Exponentiation method using multibase number representation," US Patent 7991154, 2011.
JournalB. Balamohan et al. and A. Miri, "Time optimal algorithms for black hole search in rings," Discrete Mathematics, Algorithms and Applications, Vol. 3, 2011.
JournalM. Talebinejad, A. D. C. Chan, and A. Miri, "A Lempel-Ziv complexity measure for muscle fatigue estimation," J. of Electromyography and Kinesiology, Vol. 21, 2011.
ConfB. Malek and A. Miri, "Private identification of RFID tags," FPS 2011, Paris.
ConfF. Raji, A. Miri, et al., "Preserving privacy in online social networks (invited paper)," FPS 2011.
ConfA. Lima, A. Miri, and M. Nevins, "Analysis of relay attacks on RFID systems," IEEE I2TS 2011, Brazil.
ConfB. Malek, A. Miri, and L. Orozco Barbosa, "Backward link authentication for RFID tags," IEEE RFID-TA 2011, Barcelona.
ConfN. Mailloux, A. Miri, and M. Nevins, "Forward secure identity-based key agreement for dynamic groups," PST 2011, Montreal.
ConfB. Balamohan et al. and A. Miri, "Improving the optimal bounds for black hole search in rings," SIROCCO 2011, Gdansk.
ConfF. Raji et al. and A. Miri, "Online social network with flexible and dynamic privacy policies," CSSE 2011, Tehran.
ConfW. Khreich et al. and A. Miri, "Incremental boolean combination of classifiers," MCS 2011, Naples.
ConfI. Onat and A. Miri, "A tag count estimation algorithm for dynamic framed aloha based RFID," IEEE ICC 2011, Kyoto.
JournalM. Talebinejad et al. and A. Miri, "Multiplicative multi-fractal modeling of EMG signals," J. of Electromyography and Kinesiology, Vol. 26, 2010.
JournalM. Nevins, C. Karimianpour, and A. Miri, "NTRU over rings beyond Z," Designs, Codes and Cryptography, Vol. 56, 2010.
JournalM. Talebinejad et al. and A. Miri, "Fatigue estimation using novel multi-fractal detrended fluctuation analysis," J. of Electromyography and Kinesiology, Vol. 20, 2010.
JournalW. Khreich et al. and A. Miri, "Iterative boolean combination of classifiers in the ROC space," Pattern Recognition, Vol. 43, No. 8, 2010.
JournalW. Khreich et al. and A. Miri, "On the memory complexity of the forward-backward algorithm," Pattern Recognition Letters, Vol. 31, No. 2, 2010.
ConfB. Balamohan et al. and A. Miri, "Time optimal algorithms for black hole search in rings," COCOA 2010, LNCS, Springer.
ConfB. Malek and A. Miri, "Forward-link authentication for RFIDs," IEEE PIMRC 2010, Istanbul.
ConfW. Khreich et al. and A. Miri, "Boolean combination of classifiers in the ROC space," ICPR 2010.
ConfB. Malek and A. Miri, "Combining attribute-based and access systems," IEEE CSE 2009, Vancouver.

Includes 139 publications spanning 1997–2009, covering topics in cryptography, coding theory, RFID security, wireless sensor networks, privacy-preserving data mining, elliptic curve cryptosystems, FPGA implementations, and more. Key venues include IEEE Transactions on Information Theory, IEEE Transactions on Computers, Pattern Recognition, Computer Networks, Ad Hoc Networks, and major IEEE/ACM conferences.

BookA. Miri, Wireless Sensor and Actor Networks II: Proceedings of WSAN 08, Springer, 2008.
BookC. M. Adams, A. Miri, and M. J. Wiener, eds., Selected Areas in Cryptography – SAC 2007, LNCS 4876, Springer, 2007.
ChapterA. Lima, A. Miri, and M. Nevins, "RFID side channel relay attacks," in Security in RFID and Sensor Networks, Auerbach, 2009.
ChapterI. Onat and A. Miri, "Designing secure wireless embedded systems," in Security in RFID and Sensor Networks, Auerbach, 2009.
JournalT. Niyomsataya, A. Miri, and M. Nevins, multiple publications in IEEE Trans. on Information Theory (2007, 2008, 2009) on space-time codes and affine reflection group codes.
JournalP. Longa and A. Miri, "Fast and flexible elliptic curve point arithmetic over prime fields," IEEE Trans. on Computers, Vol. 57, No. 3, 2008.
JournalA. A. Nezhad, A. Miri, and D. Makrakis, "Location privacy and anonymity preserving routing for WSN," Computer Networks, Vol. 52, No. 18, 2008.
JournalT. Niyomsataya, A. Miri, and M. Nevins, "A new unitary space-time code with high diversity product," IEEE Trans. on Wireless Communications, Vol. 5, No. 11, 2006.
JournalA. Miri, M. Nevins, and T. Niyomsataya, "Applications of representation theory to wireless communications," Design, Codes, and Cryptography, Vol. 41, 2006.
JournalM. J. Bohio and A. Miri, "Efficient identity-based security schemes for ad hoc network routing protocols," Ad Hoc Networks, Vol. 2, 2004.
JournalS. A. Miri and J. Aplevich, "Equivalence of n-dimensional Roesser and Fornasini-Marchesini models," IEEE Trans. on Automatic Control, Vol. 43, 1998.
...and 128 additional conference and journal publications. Full list available upon request.

Students Supervised

Career total: 100 HQP trained (18 undergraduate, 33 master's, 25 doctoral, 20 postdoctoral, 5 visiting scholars)

Postdoctoral Fellows

Shadan GhaffaripourGenerative Models2024–present
Mohammed Al-AniIoT Security Modeling and Analysis2022–2025
Salim RezvaniML-Driven Anomaly Detection2021–2023
Fatema RashidDifferential Privacy2018–2023
Tala TafazoliCloud-Based SOCs2021
Mohammad ShojafarSoftware-Defined Networking2019
Zahra PooranianAI-Based Anomaly Detection2019
Ceni BabaogluBig Data Analytics2018–2019
Raed KareemPredictive Cloud Resource Allocation2015–2016
Fatema RashidCloud Federated Identity Management2015–2016
Sepideh SeifzadehBig Data Analytics2015
Biruk HabtemariamPrivacy Preserving Predictive Analytics with Smart Meters2014–2015
Fatemeh RajiSoftware Defined Networks2014–2015
Behzad MalekSecure Context-Aware Communication2011–2013
Abir AwadChaos-Based Encryption2011–2012
Saeed SametPrivacy in Social Networks2009–2010
Ariane MasudaAlgebraic and Number-Theoretical Aspects of Cryptography2007–2009
Terasan NiyomsatayExtension of WiFi Coverage and Range2008–2009

Doctoral Students

Jamil ArbasFederated Learning2024–present
Narges AlipourjeddiTopological Approach for Data Privacy and AI Security2019–2025
Shadan GhaffaripourPrivacy, Security and Trust in Medical Data Management Systems2017–2022
Reza DibajPricing Models in Cloud Systems2016–2021
Salam IsmaeelEnergy-Aware Real-Time VM-Provisioning Framework2014–2020
Fatimah AlsayoudTransfer Learning-Based Performance Modeling in Big Data Ecosystems2014–2020
Hoi Ting PoonEncrypted Sequential Data Processing: Search and Computation2011–2018
Raed KareemEnd-to-End QoS for Vertical Service Composition in the Cloud2011–2015
Fatemeh RashidSecure Data Deduplication in Cloud Environments2011–2015
Fatemeh RajiPrivacy in Social Networks2009–2014
Wael KhreichHidden Markov Models Intrusion Detection Techniques2006–2011
Behzad MalekLight-weight Authentication Schemes for RFID Systems2006–2010
Ilker OnatSecure Cross-Layer Techniques for Low-Power Wireless Embedded Systems2004–2010
Saeed SametPrivacy-Preserving Data Mining2005–2009
Ali NezhadLocation-Concealing Routing for Multihop Wireless Ad Hoc2003–2009
Mehran TalebinezhadEMG Signals: Signal Processing and Engineering Applications2006–2009
Terasan NiyomsatayLie Group Based Space Time Codes2004–2008
Deholo NaliIdentity-Based Cryptographic Schemes for Large User Communities2002–2005
Ahmed Abdel HafezSecure and Efficient Group Key Agreement Protocols2001–2003

Master's Students

Sher SafiLLM Security Vulnerabilities2024–present
Dawson BrownBlockchain-Based Decentralized PKI2021–2022
Farshad KeshaniAuthenticated Community News Platform using Blockchain2021–2022
Kyrylo RudavskyySecurity of Generative Adversarial Networks2020–2022
Atheer Abu ZaidDetection of Privilege Escalation in IoT Systems2019–2020
David TentyUnified Framework for Heterogeneous Cloud Utilizing Bytecode Containers2016–2018
Fadi YounisDefending Against Adversarial ML Attacks with Honeypots2016–2018
Angelo Duarte-MonteiroOn Federated Identity Management Systems2015–2016
Sarah AsiriA Blockchain-Based IoT Trust Model2015–2017
Fatimah AlsayoudA MapReduce Relational-Database Index-Selection Tool2011–2014
Naelah AlkhojandiPrivacy-Preserving Public Auditing with Data Deduplication in Cloud Computing2011–2014
Harold ChungChaos Based RFID Authentication Protocol2011–2013
Ahmed TechiniDDoS Defence Mechanisms for Mobile Networks2011
Abdolkarim DabbaghSecure Message Routing in Structured P2P Networks using Identity-based Encryption2009–2011
Hamidreza MafiAnalysis of RFID Systems in Supply Chain Management2009
Jin XuGenus Three Hyperelliptic Curve Co-processors2004–2010
Augusto LimaRelay Attack in RFID Systems: Analysis and Modeling2007–2010
Balsingham BalamohanAccelerating Scalar Multiplication on Genus 2 Hyperelliptic Curve Cryptosystems2008–2009
Nick MaillouxGroup Key Agreement from Bilinear Pairings2008–2009
Camelia Karimian PourLattice-based Cryptography2006–2007
Han-Yuen OngPrivacy Preserving Database Access through Dynamic Privacy Filters2006–2007
Melodie SzetoPrivacy-Enhancing Technologies for PIPEDA Compliance in B2C E-business2006–2007
Hoi Ting PoonPractical and Secure Biometric Authentication System2005–2007
Patrick LongaAccelerating Scalar Multiplication on ECC over Prime Fields2005–2007
Mehran TalebinezhadFractal Analysis of Myoelectric Signals2004–2005
Mathew SammuelBiometric Identification and Authentication Techniques2004–2007
Omar AlnaderSecure Distributed On-Line Certificate Authority2004–2006
Grace EliasEfficient Implementation of FPGA-Based Hyperelliptic Curve Cryptosystems2003–2004
Lo Sing ChengEfficient Finite Field Arithmetic with Cryptographic Applications2003–2004
Muhammad BohioIdentity-Based Security Solutions for Mobile Ad Hoc Networks2003–2004
Behzad MalekEfficient Private Information Retrieval2003–2005
Ali AbbasAnalysis and Design of an Internet’s Security Taxonomy2002–2004
Terasan NiyomsatayNew Unitary Space-Time Codes with High Diversity Products2002–2003

Conference & Workshop Organization

General Chair / Co-Chair

2025General co-chair, The 32nd Selected Areas in Cryptography Conference (SAC)
2020General co-chair, The 18th International Conference on Privacy, Security, and Trust (PST 2020)
2018General Chair, The 29th Biennial Symposium on Communications (BSC 2018)
2014General co-chair, IEEE WiMoB & General chair, PST 2014
2012General co-chair, 5th Symposium on Foundations and Practice of Security (FPS)
2011General co-chair, 18th Conference on Selected Areas in Cryptography (SAC)
2010General co-chair, IEEE WiMoB & PST 2010
2009General co-chair, Canadian Workshop in Information Theory (CWIT)
2008General chair, IFIP Conference on Wireless Sensor and Actor Networks (WSAN)
2007General co-chair, 14th Workshop on Selected Areas in Cryptography (SAC)

Organization Committee & TPC Roles

2019Chair, Best Paper Selection Committee, CWIT 2019
2018Workshop Co-Chair, ACM CCS 2018
2015TPC Chair – Security Track, PST 2015
2012Workshop co-chair, IEEE WiMoB
2011Workshop and Tutorial chair, PST 2011
2008Publicity co-chair, IEEE International Symposium on Information Theory (ISIT)
Member of 100+ Technical Program Committees including IEEE ICC, IEEE GLOBECOM, ACM CCS, SAC, PST, FPS, ICISSP, IWCMC, and many others (2004–2025).

Editorial Boards

2012–19Editor, Canadian Journal of Electrical and Computer Engineering
2013–15Editor, Security and Communication Networks Journal
2009–11Editor, International Journal On Advances in Internet Technology

Contact

email
Room 708, 285 Victoria St.
Computer Science
Toronto Metropolitan University