Apply
Dr. Saman Shojae Chaeikar

Saman Shojae Chaeikar

Dr. Saman Shojae Chaeikar received Master’s and Ph.D. degrees in information security from the University of Technology Malaysia, in 2010 and 2016, respectively. In 2017, he received a postdoctoral fellowship at Iran’s National Elites Foundation hosted at Toosi University of Technology. In 2021, he did his second postdoctoral fellowship at Macquarie University, Sydney, Australia. His research interests include multimedia security, security of autonomous vehicles, cryptography, and machine learning.


Academic Qualifications
  • Postdoc: Macquarie University, Sydney, Australia, May 2021 – Nov 2021, Area: Security of Autonomous Vehicles.
  • Postdoc: K. N. Toosi University of Technology, Tehran, Iran, Apr 2017 – Apr 2018, Area: Multimedia Security.
  • Ph.D.: Computer Science, University of Technology Malaysia, Kuala Lumpur, Malaysia, Mar 2011 – Apr 2016, Area: Multimedia Security.
  • Master: Computer Science, University of Technology Malaysia, Kuala Lumpur, Malaysia, Dec 2008 – Apr 2010, Area: Cryptography.

Teaching Areas
  • Ethical Hacking
  • Digital Forensics
  • Information and Network Security
  • Computer Networks
  • Cryptography
  • Artificial Intelligence

Scholarship and Research Areas
  • Multimedia Security
  • Security of Autonomous Vehicles
  • Cryptography

Grants and Awards

Awards

  • Teaching Recognition Award, Monash University, June 2023.
  • 1st Runner Up Award, International Workshop on AI-Enabled Policing and Law Enforcement, IEEE EDOC conference, October 25th -26th 2021, Gold Coast, Australia.
  • Best presentation award, the 10th International Conference on Computer Modeling and Simulation, January 8th-10th 2018, Sydney, Australia.

Grants

  • A Watermarking Tool for e-Passport Protection, University of Technology Malaysia, Kuala Lumpur, Malaysia, Jan-Jul 2013, fund value: 7,500 AUD.
  • Pixel Similarity Weight (PSW) for supervised information extraction, funded by Iran’s National Elites Foundation and hosted at K. N. Toosi University of Technology, Tehran, Iran, April 2017, fund value: 35,000 AUD.

Publication

Peer Reviewed Journal Papers

  • Shojae Chaeikar S, Mirzaei Asl F, Yazdanpanah S, Zamani M, Abdul Manaf A, Khodadadi T, Secure CAPTCHA by Genetic Algorithm (GA) and Multi-Layer Perceptron (MLP). Electronics, 2023: 12(19).
  • Tavakolifar R, Shahabi H, Alizadeh M, Bateni SM, Hashim M, Shirzadi A, Ariffin EH, Wolf ID, Shojae Chaeikar S, Spatial Prediction of Landslide using Hybrid Multi-Criteria Decision-Making Methods: A Case Study, Saqqez-Marivan Mountain Road. Land, 2023: 12.
  • Shojae Chaeikar S, Jolfaei A, Mohammad N. AI-enabled cryptographic key management model for securing communications in the Internet of Vehicles, IEEE Transactions on Intelligent Transportation Systems, 2023: 24(4), 4589-4598.
  • Yazdanpanah S, Shojae Chaeikar S, Jolfaei A. Monitoring the security of audio biomedical signals communications in wearable IoT healthcare. Digital Communications and Networks, 2023: 9, 393-399.
  • Deng N, Li Y, Ma J, Shahabi H, De Oliveira G, Shojae Chaeikar S. A Comparative Study for Landslide Susceptibility Assessment Using Machine Learning Algorithms Based on Grid Unit and Slope Unit. Frontiers in Environmental Science, 2022.
  • Karamizadeh S, Shojae Chaeikar S, Jolfaei A. Adult Content Image Recognition by Boltzmann Machine Limited and Deep Learning. Evolutionary Intelligence, 2022.
  • Shojae Chaeikar S, Ahmadi A, Karamizadeh S, Shoja Chaeikar N. SIKM – an intelligent cryptographic key management framework. Open Computer Science, 2022: 12(1), 17-26.
  • Shojae Chaeikar S, Tadayon M H, Jolfaei A, Alizadeh M. An intelligent cryptographic key management model for secure communications in distributed industrial intelligent systems. International Journal of Intelligent Systems. 2021: 37 (12), 10158-10171.
  • Shojae Chaeikar S, Yazdanpanah S, Shoja Chaeikar N. Secure SMS transmission based on social network messages. International Journal of Internet Technology and Secured Transactions. 2021: 11(2):176-92.
  • Shojae Chaeikar S, Manaf AA, Alarood AA, Zamani M. PFW: polygonal fuzzy weighted – an SVM kernel for the classification of overlapping data groups. Electronics. 2020: 9, 615.
  • Shojae Chaeikar S, Ahmadi A. Ensemble SW image steganalysis: a low dimension method for LSBR detection. Signal Processing: Image Communication. 2019:70: 233-245.
  • Shojae Chaeikar S, Zamani M, Manaf AB, Zeki AM. PSW statistical LSB image steganalysis. Multimedia Tools and Applications. 2018:77(1):805-835.
  • Yazdanpanah S, Shojae Chaeikar S. Secure SMS Method Based on Social Networks. International Journal of Scientific Research in Science, Engineering and Technology. 2016: 2(6): 368-376.
  • Alizadeh M, Hassan WH, Zamani M, Khodadadi T, Shojae Chaeikar S. A prospective study of mobile cloud computing. International Journal of Advancements in Computing Technology. 2013;5(11):198-210.
  • Shojae Chaeikar S, Zamani M, Chukwuekezie CS, Alizadeh M. Electronic Voting Systems for European Union Countries. Journal of Next Generation Information Technology. 2013 Jul 1;4(5):16.
  • Mazdak Z, Azizah BA, Shahidan MA, Shojae Chaeikar S. Mazdak technique for PSNR estimation in audio steganography. Applied Mechanics and Materials. 2012:1(229): 2798-2803.
  • Shojae Chaeikar S, Jafari M, Taherdoost H, Kar NS. Definitions and criteria of CIA security triangle in electronic voting system. International Journal of Advanced Computer Science and Information Technology. 2012 Oct;1(1):14-24.
  • Yazdanpanah S, Shojae Chaeikar S. IKM-based Security Usability Enhancement Model. IRACST-International Journal of Computer Science and Information Technology & Security (IJCSITS). 2012 Aug(4).
  • Taherdoost H, Sahibuddin S, Namayandeh M, Jalaliyoon N, Kalantari A, Shojae Chaeikar S. Smart card adoption model: Social and ethical perspectives. Science. 2012 Aug;3(4).
  • Zamani M, Abdul Manaf AB, Zeidanloo HR, Shojae Chaeikar S. Genetic substitution-based audio steganography for high capacity applications. International Journal of Internet Technology and Secured Transactions. 2011 Jan 1;3(1):97-110.
  • Zeidanloo HR, Manaf AB, Ahmad RB, Zamani M, Shojae Chaeikar S. A proposed framework for P2P Botnet detection. International Journal of Engineering and Technology. 2010 Apr 1;2(2):161.
  • Manaf AB, Zamani M, Ahmad RB, Jaryani F, Taherdoost H, Shojae Chaeikar S, Zeidanloo HR. Genetic Audio Steganography. International J. of Recent Trends in Engineering and Technology. 2010 May;3(2).
  • Zamani M, Manaf AA, Ahmad R, Jaryani F, Taherdoost H, Shojae Chaeikar S, Zeidanloo HR. A novel approach for genetic audio watermarking. Journal of Information Assurance and Security. 2010;5:102-11.

Peer Reviewed Conference Papers

  • Khodadadi T, Zamani M, Shojae Chaeikar S, Javadianasl Y, Talebkhah M, and Alizadeh M. Exploring the benefits and drawbacks of machine learning in cybersecurity to strengthen cybersecurity defences. 30th Annual IEEE Software Technology Conference (STC 2023), 2023 Sep 25-27.
  • Arab F, Zamani M, Karamizadeh S, Khodadadi T, Alizadeh M, and Shojae Chaeikar S. Comparison of Data Hiding Techniques for Video Watermarking Applications. 2022 The 7th International Conference on Computer and Communication Systems, 2022 April 22-25.
  • Khodadadi T, Javadianasl Y, Rabiei F, Alizadeh M, Zamani M, Shojae Chaeikar S. A Novel Graphical Password Authentication Scheme with Improved Usability. In 2021 4th International Symposium on Advanced Electrical and Communication Technologies (ISAECT), 2021, pp. 01-04, doi: 10.1109/ISAECT53699.2021.9668599.
  • Chaeikar SS, Jolfaei A, Mohammad N, Ostovari P. Security Principles and Challenges in Electronic Voting. In2021 IEEE 25th International Enterprise Distributed Object Computing Workshop (EDOCW) 2021 Oct 25 (pp. 38-45). IEEE.
  • Shojae Chaeikar S, Ahmadi A. SW: a blind LSBR image steganalysis technique. In the 10thInternational Conference on Computer Modeling and Simulation2018 Jan 8 (pp. 14-18). ACM.
  • Zamani M, Manaf AB, Abdullah SM, Shojae Chaeikar S. Correlation between PSNR and bit per sample rate in audio steganography. In11thInternational Conference on Signal Processing 2012 Apr 2 (pp. 163-8).
  • Yazdanpanah S, Shojae Chaeikar S, Zamani M, Kourdi R. Security features comparison of master key and IKM cryptographic key management for researchers and developers. In International Conference on Software Technology and Engineering, 3rd(ICSTE 2011) 2011. ASME Press.
  • Shojae Chaeikar S, Moghaddam HS, Zeidanloo HR. Node Based Interpretative Key Management Framework. In Security and Management 2010 (pp. 204-210).
  • Shojae Chaeikar S, Razak SA, Honarbakhsh S, Zeidanloo HR, Zamani M, Jaryani F. Interpretative key management (IKM), a novel framework. In 2010 Second International Conference on Computer Research and Development, 2010 May 7 (pp. 265-269). IEEE.
  • Zamani M, Manaf AB, Ahmad RB, Jaryani F, Shojae Chaeikar S, Zeidanloo HR. Genetic audio watermarking. In International Conference on Business Administration and Information Processing, 2010 Mar 26 (pp. 514-517). Springer, Berlin, Heidelberg.

Book Chapters

  • Shojae Chaeikar S, Manaf AB, Zamani M. Comparative analysis of Master-key and Interpretative Key Management (IKM) frameworks. In Cryptography and Security in Computing 2012. InTech.

Membership
  • Australian Computer Society (ACS).
  • Iran’s National Elites Foundation.

Professional Academic Activities

Journal Editor

  • Journal of Computer Networks and Communications, Guest editor of special issue on: Security Solutions for IoT and Cyber-Physical Systems, Hindawi, April 2021.
  • Journal of Computer Networks and Communications, Guest editor of special issue on: Advances in Machine Learning for Cybersecurity, Hindawi, April 2018.
  • Journal of Next Generation Information Technology, Convergence Information Society (CIS), South Korea, 2019.

Journal Reviewer

  • IEEE Transactions on Industrial Informatics
  • IEEE Systems Journal
  • IEEE Internet of Things Journal
  • Computers and Electrical Engineering
  • Multimedia Tools and Applications
  • Signal Processing
  • Digital Communications and Networks
  • Journal of Ambient Intelligence and Humanized Computing
  • Neurocomputing
  • Journal of Circuits, Systems, and Computers

Conference Technical Program Committee

  • Human Factors in Cybersecurity, 15th International Conference on Applied Human Factors and Ergonomics [AHFE 2024], 22-27 July, 2024, Université Côte d’Azur, Nice, France.
  • 3rd EAI International Conference on Smart Technologies and Innovation Management [EAI MTYMEX 2024], 28-29 March, 2024, Vancouver, Canada.
  • 6th International Conference on Networking and Advanced Systems [ICNAS23], 21-23 October, 2023, Algeria.
  • The 2023 International Conference on Cybersecurity [ICC2023], 16-18 June, 2023, Manhattan, New York, USA.
  • The 2nd International Conference on Artificial Intelligence and Blockchain Technology [AIBT2023], 13-15 Jan, 2023, Zibo, Shandong, China.
  • PC member of Track 5: Security, Privacy, Trust, and Incentives, The 31st International Conference on Computer Communications and Networks [ICCCN 2022], 25 – 28 July, 2022, Waikiki Beach, Honolulu, HI, USA.
  • The 2022 International Conference on Internet Engineering and Information Technology [IEIT2022], 20-21 May, 2022, Wuhan, China.
  • The 2nd International Conference on Artificial Intelligence and Blockchain Technology [ABIT2022], 25-27 Nov 2022, Zibo, Shandong, China.
  • The 2021 International Conference on Internet Engineering and Information Technology [IEIT2021], 10-12 March 2022, Wuhan, China.
  • International Conference on Artificial Intelligence and Blockchain Technology [ABIT2021], 25-27 June 2021, Beijing, China.
  • 2021 3rd International Conference on Soft Computing and its Engineering Applications [icSoftComp2021], 11-12 December 2021, Charusat, Changa, India.
  • 4th International Conference on Recent Trends in Multidisciplinary Research [ICRTMDR2021], 26-27 December 2021, Maldives.
  • 2021 Global Congress on Electrical Engineering [GC-ElecEng 2021], 3rd-5th September 2021, Valencia, Spain.
  • International Conference on Artificial Intelligence and Applications [ICAIA], 15-17 October 2021, Suzhou, Jiangsu, China.
  • 2nd International Workshop on AI-enabled Process Automation – [ICSOC] Conference, 22nd – 25th November 2021, Dubai, UAE.
  • Global 2020 Congress on Networking and Communications, 1st International Conference on Multimedia Systems, Networks and Technologies [MIC-Multimedia 2020], 6th-8th March 2020, Athens, Greece.
  • Global 2020 Congress on Engineering Sciences, Technologies and Applications [GC-Engineering 2020], 1st International Conference on Computer Science and Engineering (MIC-Computing 2020), January 17th-19th 2020, Dubai, UAE.
  • Global 2020 Congress on Electrical Engineering [GC-ElecEng 2020], 4th-5th September 2020, Valencia, Spain.
  • The 9th International Conference on Intelligent Computing and Applications [ICICA2020], February 26th-28th, 2020, Brisbane, Australia.
  • Global 2020 Congress on Communications and Computing Technologies (GC-Technology 2020), 1st International Conference on Information Technologies and Information Systems [MIC-InfoTech 2020], 9th-11th October 2020, Porto, Portugal.
  • International Conference on Artificial Intelligence and Blockchain Technology [ABIT2020], 31st July – 2nd August 2020, Beijing, China.
  • 2nd International Conference on Advancing Knowledge from Multidisciplinary Perspectives in Engineering & Technology [ICAKMPET2020], June 24th – 25th 2020, Istanbul, Turkey.
  • 2020 2nd International Conference on Soft Computing and its Engineering Applications [icSoftComp2020], 11-12 December 2020, Charusat, Changa, India.
  • 8th Annual International Conference on Geo-Spatial Knowledge and Intelligence [GSKI2020], 18-19 December 2020, Xián, Shaanxi, China.
  • International Conference on Data Science and Machine Learning [DSML2020], 24-25 October 2020, Dubai, UAE.
  • International Conference on Recent Challenges in Engineering and Technology [ICRCET2020], 30-31 October 2020, Virtual.
  • 3rd International Conference on Recent Trends in Multidisciplinary Research [ICRTMDR2020], 26-27 December 2020, Maldives.
  • The 9th Annual International Congress of Information and Communication Technology [ICICT2019], January 11th-13th, 2019, Nanning, Guangxi, China.
  • The 1st International Conference on Computer Science and Engineering [MIC-Computing 2019], January 18th-20th, 2019, Dubai, UAE.
  • The 8th International Conference on Intelligent Computing and Applications [ICICA2019], January 16th-19th, 2019, Melbourne, Australia.
  • 1st International Conference on Electrical, Biomedical and Nuclear Engineering Technologies [ElectriTek2019], 15st-17th September 2019, Irbid, Jordan.
  • The 11thInternational Conference on Computer Modeling and Simulation [ICCMS2019], 16th-19th January 2019, Melbourne, Australia.
  • Global 2019 Congress on Electrical Engineering, 2nd International Conference on Digital Signal Processing, MIC-SigProc 2019 Technical Program Committee (TPC), 18th-20th October 2019, Barcelona, Spain.
  • The 10thInternational Conference on Computer Modeling and Simulation [ICCMS2018], 8th-10th January 2018, Sydney, Australia.
  • The International Conference on Network Engineering and Information Security [NEIS2018], April 20th-22nd 2018, Wuhan, China.
  • 4th Annual International Conference on Management, Economics and Social Development [ICMESD2018], May 18th-20th, 2018, Xi’an, Shaanxi, China.
  • 1stInternational Conference on Multimedia Systems, Networks and Technologies [MIC-Multimedia2018], September 28th-30th 2018, Barcelona, Spain.
  • 6th Annual 2018 International Conference on Geo-Spatial Knowledge and Intelligence [GSKI2018], October26th-28th, 2018, Beijing, China.
  • 2018 5th International Conference on Wireless Communication and Sensor Network [WCSN2018], December 14th-16th, 2018, Wuhan, Hubei, China.
  • 2018 2nd International Conference on Advanced Education and Management Science [AEMS2018], December 22th-23th, 2018, Shanghai, China.
  • 2ndAnnual International Conference on Information System and Artificial Intelligence [ISAI2017], July 14th-16th, 2017, Tianjin, China.
  • The international conference on Artificial Intelligence and Computer Engineering [AICE2017], June 23th-25th, 2017, Suzhou, China.
  • 3rdAnnual International Workshop on Wireless Communication and Network [IWWCN2017], December 8th-10th, 2017, Chiang Mai, Thailand.
  • International Conference on Computer Engineering and Information System [CEIS2017], October 20th-22th 2017, Xiamen, China.
  • 5thAnnual 2017 International Conference on Geo-Spatial Knowledge and Intelligence [GSKI2017], December 8th-10th, 2017, Chiang Mai, Thailand.
  • 2017 2ndInternational Conference on Computer, Mechatronics and Electronic Engineering [CMEE2017], December 24th-25th, 2017, Xiamen, China.
  • Japan-Africa Conference on Electronics, Communications, and Computers [JAC-ECC2017], December 18th-20th, 2017, Alexandria, Egypt.

Book Technical Committee

  • Adversarial Multimedia Forensics. Editors: Ehsan Nowroozi, Alireza Jolfaei, Kassem Kallas. Springer, 2023.
  • Multimedia Forensics and Security, subtitle: Foundations, Innovations, and Applications. Editors: Ella Hassanien, A., Mostafa Fouad, M., Manaf, A.A., Zamani, M., Ahmad, R., Kacprzyk, J. (Eds.). ISBN: 978-3-319-44270-9, Hardcover ISBN: 978-3-319-44268-6, DOI: 10.1007/978-3-319-44270-9, Springer, 2017.

Conference Steering Committee

  • Global 2020 Congress on Computer Engineering (GC-CompEng 2020), 14th-16th August 2020, Athens, Greece.
  • Global 2019 Congress on Computer Engineering (GC-CompEng 2019), 16th-18th August 2019, Athens, Greece.

Conference Track Chair

  • Signal, Image and Speech Processing (SISP) track, 1stInternational Conference on Electrical, Biomedical and Nuclear Engineering Technologies (ElectriTek 2019), 15st-17th September 2019, Irbid, Jordan.

Conference Session Chair

  • International conference on Informatics Engineering & Information Science [ICIEIS 2011], Springer, Kuala Lumpur, Malaysia, 2011.

Keynote Speech

  • VIT – International Virtual Conference on “Current Trends in Artificial Intelligence and Information Security” on 18th October 2019.

Invited Talk

  • Recent Trends in Information Security and its Policies. VIT University, India, 17th October 2019.

Technical Committee of Iran’s National Information Security Standards

  • Video surveillance systems for use in security applications – Part 1-1: System requirements – General. (INSO 21122-1-1, 1st edition 2018 – identical with IEC 62676-1-1:2013).
  • Video surveillance systems for use in security applications – System requirements – Part 1-2: Performance requirements for video transmission. (INSO 21122-1-2, 1st edition 2018 – identical with IEC 62676-1-2:2013).
  • Video surveillance systems for use in security applications – Part 2-1: Video transmission protocols – General requirements. (INSO 21122-2-1 1st edition 2018 – identical with IEC 62676-2-1:2013).
  • Video surveillance systems for use in security applications – Part 3: Analog and digital video interfaces. (INSO 21122-3 1st edition 2018 – identical with IEC 62676-3:2013).
  • Identification cards – ICC-managed devices – Part 1: General framework. (INSO 21122-3 1st edition 2018 – identical with ISO/IEC 18328-1: 2015).
  • Identification cards – ICC-managed devices – Part 2: Physical characteristics and test methods for cards with devices. (INSO 21122-3 1st edition 2018 – identical with ISO/IEC 18328-2: 2015).
  • Identification cards – ICC-managed devices – Part 3: Organization, security and commands for interchange. (INSO 21122-3 1st edition 2018 – identical with ISO/IEC 18328-3: 2016).
  • Information technology – Identification cards – Biometric System-on-Card – Part 3: Logical information interchange mechanism. (INSO 21122-3 1st edition 2018 – identical with ISO/IEC 17839-3: 2016).
  • Information technology – Security techniques – Cryptographic techniques based on elliptic curves – Part 5: Elliptic curve generation. (INSO 21122-3 1st edition 2018 – identical with ISO/IEC 15946-5: 2017).
Skip to content