Hossein Shirazi
Orcid: 0000-0002-2721-0628
According to our database1,
Hossein Shirazi
authored at least 45 papers
between 2008 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
Tiled Bit Networks: Sub-Bit Neural Network Compression Through Reuse of Learnable Binary Vectors.
Proceedings of the 33rd ACM International Conference on Information and Knowledge Management, 2024
2023
Seeing Should Probably Not Be Believing: The Role of Deceptive Support in COVID-19 Misinformation on Twitter.
ACM J. Data Inf. Qual., March, 2023
Adversarial Autoencoder Data Synthesis for Enhancing Machine Learning-Based Phishing Detection Algorithms.
IEEE Trans. Serv. Comput., 2023
J. Comput. Secur., 2023
Proceedings of the Companion Proceedings of the ACM Web Conference 2023, 2023
Machine Learning-Based Phishing Detection Using URL Features: A Comprehensive Review.
Proceedings of the Stabilization, Safety, and Security of Distributed Systems, 2023
Synthesizing and Analyzing Attribute-Based Access Control Model Generated from Natural Language Policy Statements.
Proceedings of the 28th ACM Symposium on Access Control Models and Technologies, 2023
Proceedings of the 29th ACM SIGKDD Conference on Knowledge Discovery and Data Mining, 2023
Poster: Towards a Dataset for the Discrimination between Warranted and Unwarranted Emails.
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, 2023
Cross-Silo Federated Learning Across Divergent Domains with Iterative Parameter Alignment.
Proceedings of the IEEE International Conference on Big Data, 2023
2022
Towards Performance of NLP Transformers on URL-Based Phishing Detection for Mobile Devices.
J. Ubiquitous Syst. Pervasive Networks, 2022
Corrigendum to 'A novel sophisticated hybrid method for intrusion detection using the artificial immune system': Journal of Information Security and Applications Volume 58, May 2021, 102721.
J. Inf. Secur. Appl., 2022
Proceedings of the SACMAT '22: The 27th ACM Symposium on Access Control Models and Technologies, New York, NY, USA, June 8, 2022
Proceedings of the Data and Applications Security and Privacy XXXVI, 2022
Proceedings of the CODASPY '22: Twelveth ACM Conference on Data and Application Security and Privacy, Baltimore, MD, USA, April 24, 2022
2021
J. Intell. Inf. Syst., 2021
A novel sophisticated hybrid method for intrusion detection using the artificial immune system.
J. Inf. Secur. Appl., 2021
Comput. J., 2021
A stochastic bi-objective simulation-optimization model for plasma supply chain in case of COVID-19 outbreak.
Appl. Soft Comput., 2021
On the Performance of Isolation Forest and Multi Layer Perceptron for Anomaly Detection in Industrial Control Systems Networks.
Proceedings of the 8th International Conference on Internet of Things: Systems, 2021
Lightweight URL-based phishing detection using natural language processing transformers for mobile devices.
Proceedings of the 18th International Conference on Mobile Systems and Pervasive Computing (MobiSPC 2021) / The 16th International Conference on Future Networks and Communications (FNC-2021) / The 11th International Conference on Sustainable Energy Information Technology, 2021
2020
Improved Phishing Detection Algorithms using Adversarial Autoencoder Synthesized Data.
Proceedings of the 45th IEEE Conference on Local Computer Networks, 2020
Proceedings of the 17th International Joint Conference on e-Business and Telecommunications, 2020
2019
Proceedings of the Foundations and Practice of Security - 12th International Symposium, 2019
Proceedings of the Data and Applications Security and Privacy XXXIII, 2019
2018
Int. J. Multim. Data Eng. Manag., 2018
Comput. Informatics, 2018
<i>"Kn0w Thy Doma1n Name"</i>: Unbiased Phishing Detection Using Domain Name Based Features.
Proceedings of the 23nd ACM on Symposium on Access Control Models and Technologies, 2018
Proceedings of the 2018 Workshop on Attacks and Solutions in Hardware Security, 2018
2017
A New Classification Framework to Evaluate the Entity Profiling on the Web: Past, Present and Future.
ACM Comput. Surv., 2017
Proceedings of the 2017 IEEE International Conference on Information Reuse and Integration, 2017
Proceedings of the 2nd ACM Workshop on Attribute-Based Access Control, 2017
2016
Int. J. Commun. Networks Inf. Secur., 2016
Proceedings of the Information Systems Security - 12th International Conference, 2016
2015
Int. J. Enterp. Inf. Syst., 2015
2011
A fuzzy VIKOR method for supplier selection based on entropy measure for objective weighting.
Expert Syst. Appl., 2011
2009
A semantics-driven, fuzzy logic-based approach to knowledge representation and inference.
Expert Syst. Appl., 2009
Using Genetic Algorithm for Prediction of Information for Cache Operation in ?Mobile Database.
Proceedings of the Second International Workshop on Knowledge Discovery and Data Mining, 2009
Increasing Overall Network Security by Integrating Signature-Based NIDS with Packet Filtering Firewall.
Proceedings of the First IITA International Joint Conference on Artificial Intelligence, 2009
2008
Proceedings of the The Third International Conference on Availability, 2008