Hossein Shirazi

Orcid: 0000-0002-2721-0628

According to our database1, Hossein Shirazi authored at least 45 papers between 2008 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Tiled Bit Networks: Sub-Bit Neural Network Compression Through Reuse of Learnable Binary Vectors.
Proceedings of the 33rd ACM International Conference on Information and Knowledge Management, 2024

2023
Seeing Should Probably Not Be Believing: The Role of Deceptive Support in COVID-19 Misinformation on Twitter.
ACM J. Data Inf. Qual., March, 2023

Adversarial Autoencoder Data Synthesis for Enhancing Machine Learning-Based Phishing Detection Algorithms.
IEEE Trans. Serv. Comput., 2023

The intrinsic dimensionality of network datasets and its applications.
J. Comput. Secur., 2023

Claim Extraction and Dynamic Stance Detection in COVID-19 Tweets.
Proceedings of the Companion Proceedings of the ACM Web Conference 2023, 2023

Machine Learning-Based Phishing Detection Using URL Features: A Comprehensive Review.
Proceedings of the Stabilization, Safety, and Security of Distributed Systems, 2023

Synthesizing and Analyzing Attribute-Based Access Control Model Generated from Natural Language Policy Statements.
Proceedings of the 28th ACM Symposium on Access Control Models and Technologies, 2023

Sparse Binary Transformers for Multivariate Time Series Modeling.
Proceedings of the 29th ACM SIGKDD Conference on Knowledge Discovery and Data Mining, 2023

Poster: Towards a Dataset for the Discrimination between Warranted and Unwarranted Emails.
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, 2023

Cross-Silo Federated Learning Across Divergent Domains with Iterative Parameter Alignment.
Proceedings of the IEEE International Conference on Big Data, 2023

2022
Towards Performance of NLP Transformers on URL-Based Phishing Detection for Mobile Devices.
J. Ubiquitous Syst. Pervasive Networks, 2022

Corrigendum to 'A novel sophisticated hybrid method for intrusion detection using the artificial immune system': Journal of Information Security and Applications Volume 58, May 2021, 102721.
J. Inf. Secur. Appl., 2022

WiP: The Intrinsic Dimensionality of IoT Networks.
Proceedings of the SACMAT '22: The 27th ACM Symposium on Access Control Models and Technologies, New York, NY, USA, June 8, 2022

Local Intrinsic Dimensionality of IoT Networks for Unsupervised Intrusion Detection.
Proceedings of the Data and Applications Security and Privacy XXXVI, 2022

Towards Resiliency of Heavy Vehicles through Compromised Sensor Data Reconstruction.
Proceedings of the CODASPY '22: Twelveth ACM Conference on Data and Application Security and Privacy, Baltimore, MD, USA, April 24, 2022

2021
Representing unstructured text semantics for reasoning purpose.
J. Intell. Inf. Syst., 2021

Directed adversarial sampling attacks on phishing detection.
J. Comput. Secur., 2021

A novel sophisticated hybrid method for intrusion detection using the artificial immune system.
J. Inf. Secur. Appl., 2021

A New Intrusion Detection System Using the Improved Dendritic Cell Algorithm.
Comput. J., 2021

A stochastic bi-objective simulation-optimization model for plasma supply chain in case of COVID-19 outbreak.
Appl. Soft Comput., 2021

On the Performance of Isolation Forest and Multi Layer Perceptron for Anomaly Detection in Industrial Control Systems Networks.
Proceedings of the 8th International Conference on Internet of Things: Systems, 2021

Lightweight URL-based phishing detection using natural language processing transformers for mobile devices.
Proceedings of the 18th International Conference on Mobile Systems and Pervasive Computing (MobiSPC 2021) / The 16th International Conference on Future Networks and Communications (FNC-2021) / The 11th International Conference on Sustainable Energy Information Technology, 2021

2020
Improved Phishing Detection Algorithms using Adversarial Autoencoder Synthesized Data.
Proceedings of the 45th IEEE Conference on Local Computer Networks, 2020

A Machine-learning based Unbiased Phishing Detection Approach.
Proceedings of the 17th International Joint Conference on e-Business and Telecommunications, 2020

2019
Using Machine Learning to Detect Anomalies in Embedded Networks in Heavy Vehicles.
Proceedings of the Foundations and Practice of Security - 12th International Symposium, 2019

Adversarial Sampling Attacks Against Phishing Detection.
Proceedings of the Data and Applications Security and Privacy XXXIII, 2019

2018
A novel multilayer AAA model for integrated applications.
Neural Comput. Appl., 2018

News events prediction using Markov logic networks.
J. Inf. Sci., 2018

Improving Auto-Detection of Phishing Websites using Fresh-Phish Framework.
Int. J. Multim. Data Eng. Manag., 2018

IoTSense: Behavioral Fingerprinting of IoT Devices.
CoRR, 2018

Web Person Name Disambiguation Using Social Links and Enriched Profile Information.
Comput. Informatics, 2018

<i>"Kn0w Thy Doma1n Name"</i>: Unbiased Phishing Detection Using Domain Name Based Features.
Proceedings of the 23nd ACM on Symposium on Access Control Models and Technologies, 2018

Behavioral Fingerprinting of IoT Devices.
Proceedings of the 2018 Workshop on Attacks and Solutions in Hardware Security, 2018

2017
A New Classification Framework to Evaluate the Entity Profiling on the Web: Past, Present and Future.
ACM Comput. Surv., 2017

A semantic approach to cross-document person profiling in Web.
AI Commun., 2017

Fresh-Phish: A Framework for Auto-Detection of Phishing Websites.
Proceedings of the 2017 IEEE International Conference on Information Reuse and Integration, 2017

Attribute Based Access Control for Healthcare Resources.
Proceedings of the 2nd ACM Workshop on Attribute-Based Access Control, 2017

2016
A Novel Access Control Model Based on the Structure of Applications.
Int. J. Commun. Networks Inf. Secur., 2016

Practical DoS Attacks on Embedded Networks in Commercial Vehicles.
Proceedings of the Information Systems Security - 12th International Conference, 2016

2015
An Effectiveness Model for Enterprise Architecture Methodologies.
Int. J. Enterp. Inf. Syst., 2015

2011
A fuzzy VIKOR method for supplier selection based on entropy measure for objective weighting.
Expert Syst. Appl., 2011

2009
A semantics-driven, fuzzy logic-based approach to knowledge representation and inference.
Expert Syst. Appl., 2009

Using Genetic Algorithm for Prediction of Information for Cache Operation in ?Mobile Database.
Proceedings of the Second International Workshop on Knowledge Discovery and Data Mining, 2009

Increasing Overall Network Security by Integrating Signature-Based NIDS with Packet Filtering Firewall.
Proceedings of the First IITA International Joint Conference on Artificial Intelligence, 2009

2008
Software Security; A Vulnerability Activity Revisit.
Proceedings of the The Third International Conference on Availability, 2008


  Loading...