Search Results - "Hashemi, Sattar"

Refine Results
  1. 1

    Two-tier network anomaly detection model: a machine learning approach by Pajouh, Hamed Haddad, Dastghaibyfard, GholamHossein, Hashemi, Sattar

    Published in Journal of intelligent information systems (01-02-2017)
    “…Network anomaly detection is one of the most challenging fields in cyber security. Most of the proposed techniques have high computation complexity or based on…”
    Get full text
    Journal Article
  2. 2

    Detecting Cryptomining Malware: a Deep Learning Approach for Static and Dynamic Analysis by Darabian, Hamid, Homayounoot, Sajad, Dehghantanha, Ali, Hashemi, Sattar, Karimipour, Hadis, Parizi, Reza M., Choo, Kim-Kwang Raymond

    Published in Journal of grid computing (01-06-2020)
    “…Cryptomining malware (also referred to as cryptojacking) has changed the cyber threat landscape. Such malware exploits the victim’s CPU or GPU resources with…”
    Get full text
    Journal Article
  3. 3

    Unsupervised Domain Adaptation Based on Correlation Maximization by Abdi, Lida, Hashemi, Sattar

    Published in IEEE access (2021)
    “…This research proposes a novel unsupervised domain adaptation algorithm for cross-domain visual recognition. Distance Correlation-based Domain Adaptation or…”
    Get full text
    Journal Article
  4. 4

    Proposing a sparse representational based face verification system to run in a shortage of memory by Hazrati Fard, Seyed Mehdi, Hashemi, Sattar

    Published in Multimedia tools and applications (2020)
    “…Studying face verification has seen tremendous growth over the past years. During the last decade, with the improvement of system processors and memories, deep…”
    Get full text
    Journal Article
  5. 5

    Using reinforcement learning to find an optimal set of features by Hazrati Fard, Seyed Mehdi, Hamzeh, Ali, Hashemi, Sattar

    “…Identifying the most characterizing features of observed data is critical for minimizing the classification error. Feature selection is the process of…”
    Get full text
    Journal Article
  6. 6

    A multiview learning method for malware threat hunting: windows, IoT and android as case studies by Darabian, Hamid, Dehghantanha, Ali, Hashemi, Sattar, Taheri, Mohammad, Azmoodeh, Amin, Homayoun, Sajad, Choo, Kim-Kwang Raymond, Parizi, Reza M.

    Published in World wide web (Bussum) (01-03-2020)
    “…Malware remains a threat to our cyberspace and increasingly digitalized society. Current malware hunting techniques employ a variety of features, such as…”
    Get full text
    Journal Article
  7. 7

    An Effective Model to Predict the Extension of Code Changes in Bug Fixing Process Using Text Classifiers by Sepahvand, Reza, Akbari, Reza, Hashemi, Sattar, Boushehrian, Omid

    “…After the issue tracking system (ITS) receives a bug report, this report is analyzed and triaged. To automate bug handling, past researches focused on topics…”
    Get full text
    Journal Article
  8. 8

    A Novel Cooperative Fuzzy Classifier for Predicting the Permissible Wind Speed Range in Wind Farms by Alipour, Mohammadali, Aghaei, Jamshid, Norouzi, Mohammadali, Hashemi, Sattar, Lehtonen, Matti

    “…It is important to forecast the wind speed range for managing the operation of wind turbines (WTs). Since the electrical power generated by WTs is highly…”
    Get full text
    Journal Article
  9. 9

    Security Framework of IoT-Based Smart Home by Shahrouz Sotoudeh, Sattar Hashemi, Hossein Gharaee Garakani

    “…Internet of Things (IoT) security and privacy remain a major challenge, mainly due to the massive scale and distributed nature of IoT networks. Smart home is…”
    Get full text
    Journal Article
  10. 10

    A Distributed Clustering Approach for Heterogeneous Environments Using Fuzzy Rough Set Theory by Mozafari, Niloofar, Mahani, Mohammad-Ali Nikouei, Hashemi, Sattar

    “…Vast majority of data mining algorithms have been designed to work on centralized data, unfortunately however, almost all of nowadays data sets are distributed…”
    Get full text
    Journal Article
  11. 11

    To Combat Multi-Class Imbalanced Problems by Means of Over-Sampling Techniques by Abdi, Lida, Hashemi, Sattar

    “…Class imbalance problem is quite pervasive in our nowadays human practice. This problem basically refers to the skewness in the data underlying distribution…”
    Get full text
    Journal Article
  12. 12

    Visual domain adaptation via transfer feature learning by Tahmoresnezhad, Jafar, Hashemi, Sattar

    Published in Knowledge and information systems (01-02-2017)
    “…One of the serious challenges in computer vision and image classification is learning an accurate classifier for a new unlabeled image dataset, considering…”
    Get full text
    Journal Article
  13. 13

    An anonymity communication protocol for security and privacy of clients in IoT-based mobile health transactions by Attarian, Reyhane, Hashemi, Sattar

    “…Mobile Health (mHealth) technology facilitates patients’ care and decreases healthcare costs by remotely monitoring healthcare processes and medical data…”
    Get full text
    Journal Article
  14. 14

    An Effective Framework for Fast Expert Mining in Collaboration Networks: A Group-Oriented and Cost-Based Method by Farhadi, Farnoush, Sorkhi, Maryam, Hashemi, Sattar, Hamzeh, Ali

    “…The growth of social networks in modern information systems has enabled the collaboration of experts at a scale that was unseen before. Given a task and a…”
    Get full text
    Journal Article
  15. 15

    A bi-level formulation for multiple kernel learning via self-paced training by Alavi, Fatemeh, Hashemi, Sattar

    Published in Pattern recognition (01-09-2022)
    “…•A novel optimization problem in a bi-level formulation for learning an affective multiple kernel.•Capturing the accurate and complex relationships of data via…”
    Get full text
    Journal Article
  16. 16

    Data-adaptive kernel clustering with half-quadratic-based neighborhood relationship preservation by Alavi, Fatemeh, Hashemi, Sattar

    Published in Knowledge-based systems (08-04-2023)
    “…Kernel learning approaches have recently attracted much attention to improve the performance of clustering tasks. Although extensive studies have attempted to…”
    Get full text
    Journal Article
  17. 17

    An element-wise kernel learning framework by Alavi, Fatemeh, Hashemi, Sattar

    “…An effective kernel learning framework is a fundamental issue which has been attracted considerable attention during the past decade. However, existing…”
    Get full text
    Journal Article
  18. 18

    Hybrid Intrusion Detection: Combining Decision Tree and Gaussian Mixture Model by Bitaab, Marzieh, Hashemi, Sattar

    “…Nowadays, cybercrimes have become a major threat for computer networks. Many researchers considered Network Intrusion Detection System (NIDS) as a layer of…”
    Get full text
    Conference Proceeding
  19. 19
  20. 20

    To combat multi-class imbalanced problems by means of over-sampling and boosting techniques by Abdi, Lida, Hashemi, Sattar

    Published in Soft computing (Berlin, Germany) (01-12-2015)
    “…Imbalanced problems are quite pervasive in many real-world applications. In imbalanced distributions, a class or some classes of data, called minority…”
    Get full text
    Journal Article