Остановите войну!
for scientists:
default search action
Sattar Hashemi
- > Home > Persons > Sattar Hashemi
Publications
- 2023
- [j57]Fatemeh Alavi, Sattar Hashemi:
An element-wise kernel learning framework. Appl. Intell. 53(8): 9531-9547 (2023) - [j56]Fatemeh Alavi, Sattar Hashemi:
Data-adaptive kernel clustering with half-quadratic-based neighborhood relationship preservation. Knowl. Based Syst. 265: 110373 (2023) - [j55]Reza Sepahvand, Reza Akbari, Behnaz Jamasb, Sattar Hashemi, Omid Boushehrian:
Using word embedding and convolution neural network for bug triaging by considering design flaws. Sci. Comput. Program. 228: 102945 (2023) - 2022
- [j54]Lida Abdi, Sattar Hashemi:
Correction to: Binary domain adaptation with independence maximization. Int. J. Mach. Learn. Cybern. 13(6): 1795 (2022) - [j53]Fatemeh Alavi, Sattar Hashemi:
A bi-level formulation for multiple kernel learning via self-paced training. Pattern Recognit. 129: 108770 (2022) - [i6]Reza Sepahvand, Reza Akbari, Behnaz Jamasb, Sattar Hashemi, Omid Boushehrian:
Using Word Embedding and Convolution Neural Network for Bug Triaging by Considering Design Flaws. CoRR abs/2209.09553 (2022) - 2021
- [j52]Lida Abdi, Sattar Hashemi:
Unsupervised Domain Adaptation Based on Correlation Maximization. IEEE Access 9: 127054-127067 (2021) - [j51]Zahra Moti, Sattar Hashemi, Hadis Karimipour, Ali Dehghantanha, Amir Namavar Jahromi, Lida Abdi, Fatemeh Alavi:
Generative adversarial network to detect unseen Internet of Things malware. Ad Hoc Networks 122: 102591 (2021) - [j50]Reyhane Attarian, Sattar Hashemi:
An anonymity communication protocol for security and privacy of clients in IoT-based mobile health transactions. Comput. Networks 190: 107976 (2021) - 2020
- [j49]Amir Namavar Jahromi, Sattar Hashemi, Ali Dehghantanha, Kim-Kwang Raymond Choo, Hadis Karimipour, David Ellis Newton, Reza M. Parizi:
An improved two-hidden-layer extreme learning machine for malware hunting. Comput. Secur. 89 (2020) - [j48]Hamid Darabian, Ali Dehghantanha, Sattar Hashemi, Sajad Homayoun, Kim-Kwang Raymond Choo:
An opcode-based technique for polymorphic Internet of Things malware detection. Concurr. Comput. Pract. Exp. 32(6) (2020) - [j47]Hamid Darabian, Sajad Homayoun, Ali Dehghantanha, Sattar Hashemi, Hadis Karimipour, Reza M. Parizi, Kim-Kwang Raymond Choo:
Detecting Cryptomining Malware: a Deep Learning Approach for Static and Dynamic Analysis. J. Grid Comput. 18(2): 293-303 (2020) - [j46]Reza Sepahvand, Reza Akbari, Sattar Hashemi:
Predicting the bug fixing time using word embedding and deep long short term memories. IET Softw. 14(3): 203-212 (2020) - [j45]Seyed Mehdi Hazrati Fard, Sattar Hashemi:
Proposing a sparse representational based face verification system to run in a shortage of memory. Multim. Tools Appl. 79(3-4): 2965-2985 (2020) - [j44]Sajad Homayoun, Ali Dehghantanha, Marzieh Ahmadzadeh, Sattar Hashemi, Raouf Khayami:
Know Abnormal, Find Evil: Frequent Pattern Mining for Ransomware Threat Hunting and Intelligence. IEEE Trans. Emerg. Top. Comput. 8(2): 341-351 (2020) - [j43]Amir Namavar Jahromi, Sattar Hashemi, Ali Dehghantanha, Reza M. Parizi, Kim-Kwang Raymond Choo:
An Enhanced Stacked LSTM Method With No Random Initialization for Malware Threat Hunting in Safety and Time-Critical Systems. IEEE Trans. Emerg. Top. Comput. Intell. 4(5): 630-640 (2020) - [j42]Hamid Darabian, Ali Dehghantanha, Sattar Hashemi, Mohammad Taheri, Amin Azmoodeh, Sajad Homayoun, Kim-Kwang Raymond Choo, Reza M. Parizi:
A multiview learning method for malware threat hunting: windows, IoT and android as case studies. World Wide Web 23(2): 1241-1260 (2020) - [c37]Zahra Moti, Sattar Hashemi, Amir Namavar Jahromi:
A Deep Learning-based Malware Hunting Technique to Handle Imbalanced Data. ISCISC 2020: 48-53 - [p1]Amin Azmoodeh, Ali Dehghantanha, Reza M. Parizi, Sattar Hashemi, Bahram Gharabaghi, Gautam Srivastava:
Active Spectral Botnet Detection Based on Eigenvalue Weighting. Handbook of Big Data Privacy 2020: 385-397 - 2019
- [j41]Reyhane Attarian, Lida Abdi, Sattar Hashemi:
AdaWFPA: Adaptive Online Website Fingerprinting Attack for Tor Anonymous Network: A Stream-wise Paradigm. Comput. Commun. 148: 74-85 (2019) - [j40]Sajad Homayoun, Ali Dehghantanha, Marzieh Ahmadzadeh, Sattar Hashemi, Raouf Khayami, Kim-Kwang Raymond Choo, David Ellis Newton:
DRTHIS: Deep ransomware threat hunting and intelligence system at the fog layer. Future Gener. Comput. Syst. 90: 94-104 (2019) - [c35]Reyhane Attarian, Sattar Hashemi:
Investigating the Streaming Algorithms Usage in Website Fingerprinting Attack Against Tor Privacy Enhancing Technology. ISCISC 2019: 33-38 - 2018
- [j39]Esmaeel Radkani, Sattar Hashemi, Alireza Keshavarz-Haddad, Maryam Amir Haeri:
An entropy-based distance measure for analyzing and detecting metamorphic malware. Appl. Intell. 48(6): 1536-1546 (2018) - [j38]Zeinab Khorshidpour, Jafar Tahmoresnezhad, Sattar Hashemi, Ali Hamzeh:
Domain invariant feature extraction against evasion attack. Int. J. Mach. Learn. Cybern. 9(12): 2093-2104 (2018) - [i5]Sajad Homayoun, Ali Dehghantanha, Marzieh Ahmadzadeh, Sattar Hashemi, Raouf Khayami:
Know Abnormal, Find Evil: Frequent Pattern Mining for Ransomware Threat Hunting and Intelligence. CoRR abs/1808.01957 (2018) - 2017
- [j37]Zeinab Khorshidpour, Sattar Hashemi, Ali Hamzeh:
Evaluation of random forest classifier in security domain. Appl. Intell. 47(2): 558-569 (2017) - [j36]Jafar Tahmoresnezhad, Sattar Hashemi:
Exploiting kernel-based feature weighting and instance clustering to transfer knowledge across domains. Turkish J. Electr. Eng. Comput. Sci. 25: 292-307 (2017) - [j34]Zeinab Khorshidpour, Jafar Tahmoresnezhad, Sattar Hashemi, Ali Hamzeh:
Using domain adaptation in adversarial environment. Int. J. Data Min. Model. Manag. 9(3): 201-219 (2017) - [j33]Niloofar Mozafari, Ali Hamzeh, Sattar Hashemi:
Multi-objective perception model for diffusion of information in social networks. Int. J. Data Min. Model. Manag. 9(3): 249-273 (2017) - [j32]Hamed Haddad Pajouh, Gholamhossein Dastghaibyfard, Sattar Hashemi:
Two-tier network anomaly detection model: a machine learning approach. J. Intell. Inf. Syst. 48(1): 61-74 (2017) - [j31]Niloofar Mozafari, Ali Hamzeh, Sattar Hashemi:
Modelling information diffusion based on non-dominated friends in social networks. J. Inf. Sci. 43(6): 801-815 (2017) - [j30]Jafar Tahmoresnezhad, Sattar Hashemi:
Visual domain adaptation via transfer feature learning. Knowl. Inf. Syst. 50(2): 585-605 (2017) - [j29]Hashem Hashemi, Amin Azmoodeh, Ali Hamzeh, Sattar Hashemi:
Graph embedding as a new approach for unknown malware detection. J. Comput. Virol. Hacking Tech. 13(3): 153-166 (2017) - 2016
- [j28]Jafar Tahmoresnezhad, Sattar Hashemi:
An Efficient yet Effective Random Partitioning and Feature Weighting Approach for Transfer Learning. Int. J. Pattern Recognit. Artif. Intell. 30(2): 1651003:1-1651003:23 (2016) - [j27]Lida Abdi, Sattar Hashemi:
To Combat Multi-Class Imbalanced Problems by Means of Over-Sampling Techniques. IEEE Trans. Knowl. Data Eng. 28(1): 238-251 (2016) - [c33]Sina Famouri, Sattar Hashemi, Mohammad Taheri:
Artificial Prediction Markets for Clustering. Australasian Conference on Artificial Intelligence 2016: 365-377 - [c32]Zeinab Khorshidpour, Sattar Hashemi, Ali Hamzeh:
Learning a Secure Classifier against Evasion Attack. ICDM Workshops 2016: 295-302 - 2015
- [j26]Mahsa Badami, Niloofar Mozafari, Ali Hamzeh, Sattar Hashemi:
An ensemble game theoretic approach for multi-objective optimization. AI Commun. 28(3): 553-566 (2015) - [j25]Maryam Sorkhi, Sattar Hashemi:
Effective team formation in collaboration networks using vertex and proficiency similarity measures. AI Commun. 28(4): 637-654 (2015) - [j24]Fatemeh Alavi, Sattar Hashemi:
DFP-SEPSF: A dynamic frequent pattern tree to mine strong emerging patterns in streamwise features. Eng. Appl. Artif. Intell. 37: 54-70 (2015) - [j23]Kamyab Tahernezhad, Kimia Bazargan Lari, Ali Hamzeh, Sattar Hashemi:
HC-MOEA: A hierarchical clustering approach for increasing the solution's diversity in multiobjective evolutionary algorithms. Intell. Data Anal. 19(1): 187-208 (2015) - [j22]Hedayatollah Dallaki, Kimia Bazargan Lari, Ali Hamzeh, Sattar Hashemi, Ashkan Sami:
Scaling up the hybrid Particle Swarm Optimization algorithm for nominal data-sets. Intell. Data Anal. 19(4): 825-844 (2015) - [j21]Lida Abdi, Sattar Hashemi:
To combat multi-class imbalanced problems by means of over-sampling and boosting techniques. Soft Comput. 19(12): 3369-3385 (2015) - [c31]Yasaman Sarlati, Sattar Hashemi, Niloofar Mozafari:
Adopting Community Features to Detect Social Spammers. EISIC 2015: 153-156 - [i4]Farzaneh Shoeleh, Mahshid Majd, Ali Hamzeh, Sattar Hashemi:
Knowledge Representation in Learning Classifier Systems: A Review. CoRR abs/1506.04002 (2015) - 2014
- [j20]Niloofar Mozafari, Sattar Hashemi, Ali Hamzeh:
A statistical approach for clustering in streaming data. Artif. Intell. Res. 3(1): 38-45 (2014) - 2013
- [j18]Hamidreza Alvari, Sattar Hashemi, Ali Hamzeh:
Discovering overlapping communities in social networks: A novel game-theoretic approach. AI Commun. 26(2): 161-177 (2013) - [j17]Mahsa Badami, Ali Hamzeh, Sattar Hashemi:
An enriched game-theoretic framework for multi-objective clustering. Appl. Soft Comput. 13(4): 1853-1868 (2013) - [j16]Seyed Mehdi Hazrati Fard, Ali Hamzeh, Sattar Hashemi:
Using reinforcement learning to find an optimal set of features. Comput. Math. Appl. 66(10): 1892-1904 (2013) - [j15]Mojtaba Eskandari, Zeinab Khorshidpour, Sattar Hashemi:
HDM-Analyser: a hybrid analysis approach based on data mining techniques for malware detection. J. Comput. Virol. Hacking Tech. 9(2): 77-93 (2013) - [c28]Lida Abdi, Sattar Hashemi:
GAB-EPA: A GA Based Ensemble Pruning Approach to Tackle Multiclass Imbalanced Problems. ACIIDS (1) 2013: 246-254 - [c27]Amin Azmoodeh, Sattar Hashemi:
To Boost Graph Clustering Based on Power Iteration by Removing Outliers. DaEng 2013: 249-258 - [c26]Fatemeh Alavi, Sattar Hashemi:
Mining Jumping Emerging Patterns by Streaming Feature Selection. KSE (2) 2013: 337-349 - [c25]Lida Abdi, Sattar Hashemi:
An Ensemble Pruning Approach Based on Reinforcement Learning in Presence of Multi-class Imbalanced Data. SocProS (1) 2013: 589-600 - 2012
- [j14]Mahmood Deypir, Mohammad Hadi Sadreddini, Sattar Hashemi:
Towards a variable size sliding window model for frequent itemset mining over data streams. Comput. Ind. Eng. 63(1): 161-172 (2012) - [j13]Mina Alibeigi, Sattar Hashemi, Ali Hamzeh:
DBFS: An effective Density Based Feature Selection scheme for small sample size and high dimensional imbalanced data sets. Data Knowl. Eng. 81-82: 67-103 (2012) - [j12]Farnoush Farhadi, Maryam Sorkhi, Sattar Hashemi, Ali Hamzeh:
An Effective Framework for Fast Expert Mining in Collaboration Networks: A Group-Oriented and Cost-Based Method. J. Comput. Sci. Technol. 27(3): 577-590 (2012) - [j11]Elham Hoseini, Sattar Hashemi, Ali Hamzeh:
SPCF: a stepwise partitioning for collaborative filtering to alleviate sparsity problems. J. Inf. Sci. 38(6): 578-592 (2012) - [j10]Mojtaba Eskandari, Sattar Hashemi:
ECFGM: enriched control flow graph miner for unknown vicious infected code detection. J. Comput. Virol. 8(3): 99-108 (2012) - [j9]Mojtaba Eskandari, Sattar Hashemi:
A graph mining approach for detecting unknown malwares. J. Vis. Lang. Comput. 23(3): 154-162 (2012) - [c24]M. Javad Zomorodian, Ali Adeli, Mehrnoosh Sinaee, Sattar Hashemi:
Improving Nearest Neighbor Classification by Elimination of Noisy Irrelevant Features. ACIIDS (2) 2012: 11-21 - [c22]Elham Hoseini, Sattar Hashemi, Ali Hamzeh:
Link Prediction in Social Network Using Co-clustering Based Approach. AINA Workshops 2012: 795-800 - [c21]Alireza Hajibagheri, Hamidreza Alvari, Ali Hamzeh, Sattar Hashemi:
Community Detection in Social Networks Using Information Diffusion. ASONAM 2012: 702-703 - [c20]Mojtaba Eskandari, Zeinab Khorshidpour, Sattar Hashemi:
To Incorporate Sequential Dynamic Features in Malware Detection Engines. EISIC 2012: 46-52 - [c18]Seyed Mehdi Hazrati Fard, Ali Hamzeh, Sattar Hashemi:
A game theoretic framework for feature selection. FSKD 2012: 845-850 - [c17]Maryam Sorkhi, Hamidreza Alvari, Sattar Hashemi, Ali Hamzeh:
A Game-Theoretic Framework to Identify Top-K Teams in Social Networks. KDIR 2012: 252-257 - [c16]Farnoush Farhadi, Elham Hoseini, Sattar Hashemi, Ali Hamzeh:
TeamFinder: A Co-clustering based Framework for Finding an Effective Team of Experts in Social Networks. ICDM Workshops 2012: 107-114 - [c15]Elham Hoseini, Sattar Hashemi, Ali Hamzeh:
A levelwise spectral co-clustering algorithm for collaborative filtering. ICUIMC 2012: 6:1-6:6 - [i1]Mahsa Badami, Ali Hamzeh, Sattar Hashemi:
A Novel Strategy Selection Method for Multi-Objective Clustering Algorithms Using Game Theory. CoRR abs/1208.3432 (2012) - 2011
- [j8]Niloofar Mozafari, Sattar Hashemi, Ali Hamzeh:
A Precise Statistical approach for concept change detection in unlabeled data streams. Comput. Math. Appl. 62(4): 1655-1669 (2011) - [j7]Zeinab Khorshidpour, Sattar Hashemi, Ali Hamzeh:
CBDL: Context-based distance learning for categorical attributes. Int. J. Intell. Syst. 26(11): 1076-1100 (2011) - [c14]Lida Rashidi, Sattar Hashemi, Ali Hamzeh:
Anomaly Detection in Categorical Datasets Using Bayesian Networks. AICI (2) 2011: 610-619 - [c13]Hamidreza Alvari, Sattar Hashemi, Ali Hamzeh:
Detecting Overlapping Communities in Social Networks by Game Theory and Structural Equivalence Concept. AICI (2) 2011: 620-630 - [c12]Kaveh Ahmadi Abhari, Ali Hamzeh, Sattar Hashemi:
Voting based learning classifier system for multi-label classification. GECCO (Companion) 2011: 355-360 - [c11]Farzaneh Shoeleh, Ali Hamzeh, Sattar Hashemi:
Towards final rule set reduction in XCS: a fuzzy representation approach. GECCO 2011: 1211-1218 - [c10]Farnoush Farhadi, Maryam Sorkhi, Sattar Hashemi, Ali Hamzeh:
An Effective Expert Team Formation in Social Networks Based on Skill Grading. ICDM Workshops 2011: 366-372 - 2010
- [c9]Ashkan Sami, Babak Yadegari, Hossein Rahimi, Naser Peiravian, Sattar Hashemi, Ali Hamzeh:
Malware detection based on mining API calls. SAC 2010: 1020-1025 - [c8]Mahshid Majd, Farzaneh Shoeleh, Ali Hamzeh, Sattar Hashemi:
Towards Efficient and Effective Negative Selection Algorithm: A Convex Hull Representation Scheme. SEAL 2010: 45-54 - [c7]Farzaneh Shoeleh, Ali Hamzeh, Sattar Hashemi:
To Handle Real Valued Input in XCS: Using Fuzzy Hyper-trapezoidal Membership in Classifier Condition. SEAL 2010: 55-64 - 2009
- [j5]Ali Hamzeh, Sattar Hashemi, Ashkan Sami, Adel Rahmani:
A Recursive Classifier System for Partially Observable Environments. Fundam. Informaticae 97(1-2): 15-40 (2009) - [j4]Mohsen Rahmani, Sattar Hashemi, Ali Hamzeh, Ashkan Sami:
Agent Based Decision Tree Learning: a Novel Approach. Int. J. Softw. Eng. Knowl. Eng. 19(7): 1015-1022 (2009)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-02-06 23:52 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint