Search Results - "Hashemi, Sattar"
-
1
Two-tier network anomaly detection model: a machine learning approach
Published in Journal of intelligent information systems (01-02-2017)“…Network anomaly detection is one of the most challenging fields in cyber security. Most of the proposed techniques have high computation complexity or based on…”
Get full text
Journal Article -
2
Detecting Cryptomining Malware: a Deep Learning Approach for Static and Dynamic Analysis
Published in Journal of grid computing (01-06-2020)“…Cryptomining malware (also referred to as cryptojacking) has changed the cyber threat landscape. Such malware exploits the victim’s CPU or GPU resources with…”
Get full text
Journal Article -
3
Unsupervised Domain Adaptation Based on Correlation Maximization
Published in IEEE access (2021)“…This research proposes a novel unsupervised domain adaptation algorithm for cross-domain visual recognition. Distance Correlation-based Domain Adaptation or…”
Get full text
Journal Article -
4
Proposing a sparse representational based face verification system to run in a shortage of memory
Published in Multimedia tools and applications (2020)“…Studying face verification has seen tremendous growth over the past years. During the last decade, with the improvement of system processors and memories, deep…”
Get full text
Journal Article -
5
Using reinforcement learning to find an optimal set of features
Published in Computers & mathematics with applications (1987) (01-12-2013)“…Identifying the most characterizing features of observed data is critical for minimizing the classification error. Feature selection is the process of…”
Get full text
Journal Article -
6
A multiview learning method for malware threat hunting: windows, IoT and android as case studies
Published in World wide web (Bussum) (01-03-2020)“…Malware remains a threat to our cyberspace and increasingly digitalized society. Current malware hunting techniques employ a variety of features, such as…”
Get full text
Journal Article -
7
An Effective Model to Predict the Extension of Code Changes in Bug Fixing Process Using Text Classifiers
Published in Iranian journal of science and technology. Transactions of electrical engineering (01-03-2022)“…After the issue tracking system (ITS) receives a bug report, this report is analyzed and triaged. To automate bug handling, past researches focused on topics…”
Get full text
Journal Article -
8
A Novel Cooperative Fuzzy Classifier for Predicting the Permissible Wind Speed Range in Wind Farms
Published in Iranian journal of science and technology. Transactions of electrical engineering (01-03-2021)“…It is important to forecast the wind speed range for managing the operation of wind turbines (WTs). Since the electrical power generated by WTs is highly…”
Get full text
Journal Article -
9
Security Framework of IoT-Based Smart Home
Published in International Journal of Information and Communication Technology Research (Tehran.Print) (01-03-2020)“…Internet of Things (IoT) security and privacy remain a major challenge, mainly due to the massive scale and distributed nature of IoT networks. Smart home is…”
Get full text
Journal Article -
10
A Distributed Clustering Approach for Heterogeneous Environments Using Fuzzy Rough Set Theory
Published in International journal of information science and management (2020)“…Vast majority of data mining algorithms have been designed to work on centralized data, unfortunately however, almost all of nowadays data sets are distributed…”
Get full text
Journal Article -
11
To Combat Multi-Class Imbalanced Problems by Means of Over-Sampling Techniques
Published in IEEE transactions on knowledge and data engineering (01-01-2016)“…Class imbalance problem is quite pervasive in our nowadays human practice. This problem basically refers to the skewness in the data underlying distribution…”
Get full text
Journal Article -
12
Visual domain adaptation via transfer feature learning
Published in Knowledge and information systems (01-02-2017)“…One of the serious challenges in computer vision and image classification is learning an accurate classifier for a new unlabeled image dataset, considering…”
Get full text
Journal Article -
13
An anonymity communication protocol for security and privacy of clients in IoT-based mobile health transactions
Published in Computer networks (Amsterdam, Netherlands : 1999) (08-05-2021)“…Mobile Health (mHealth) technology facilitates patients’ care and decreases healthcare costs by remotely monitoring healthcare processes and medical data…”
Get full text
Journal Article -
14
An Effective Framework for Fast Expert Mining in Collaboration Networks: A Group-Oriented and Cost-Based Method
Published in Journal of computer science and technology (2012)“…The growth of social networks in modern information systems has enabled the collaboration of experts at a scale that was unseen before. Given a task and a…”
Get full text
Journal Article -
15
A bi-level formulation for multiple kernel learning via self-paced training
Published in Pattern recognition (01-09-2022)“…•A novel optimization problem in a bi-level formulation for learning an affective multiple kernel.•Capturing the accurate and complex relationships of data via…”
Get full text
Journal Article -
16
Data-adaptive kernel clustering with half-quadratic-based neighborhood relationship preservation
Published in Knowledge-based systems (08-04-2023)“…Kernel learning approaches have recently attracted much attention to improve the performance of clustering tasks. Although extensive studies have attempted to…”
Get full text
Journal Article -
17
An element-wise kernel learning framework
Published in Applied intelligence (Dordrecht, Netherlands) (01-04-2023)“…An effective kernel learning framework is a fundamental issue which has been attracted considerable attention during the past decade. However, existing…”
Get full text
Journal Article -
18
Hybrid Intrusion Detection: Combining Decision Tree and Gaussian Mixture Model
Published in 2017 14th International ISC (Iranian Society of Cryptology) Conference on Information Security and Cryptology (ISCISC) (01-09-2017)“…Nowadays, cybercrimes have become a major threat for computer networks. Many researchers considered Network Intrusion Detection System (NIDS) as a layer of…”
Get full text
Conference Proceeding -
19
Correction to: Binary domain adaptation with independence maximization
Published in International journal of machine learning and cybernetics (01-06-2022)Get full text
Journal Article -
20
To combat multi-class imbalanced problems by means of over-sampling and boosting techniques
Published in Soft computing (Berlin, Germany) (01-12-2015)“…Imbalanced problems are quite pervasive in many real-world applications. In imbalanced distributions, a class or some classes of data, called minority…”
Get full text
Journal Article