Samaneh Mahdavifar

Orcid: 0000-0001-7040-659X

According to our database1, Samaneh Mahdavifar authored at least 13 papers between 2012 and 2024.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
A Comprehensive Analysis of Explainable AI for Malware Hunting.
ACM Comput. Surv., December, 2024

CapsRule: Explainable Deep Learning for Classifying Network Attacks.
IEEE Trans. Neural Networks Learn. Syst., September, 2024

VulEXplaineR: XAI for Vulnerability Detection on Assembly Code.
Proceedings of the Machine Learning and Knowledge Discovery in Databases. Applied Data Science Track, 2024

2022
Personalized Privacy-Preserving Publication of Trajectory Data by Generalization and Distortion of Moving Points.
J. Netw. Syst. Manag., 2022

Effective and Efficient Hybrid Android Malware Classification Using Pseudo-Label Stacked Auto-Encoder.
J. Netw. Syst. Manag., 2022

An entity matching-based image topic verification framework for online fact-checking.
Int. J. Multim. Intell. Secur., 2022

2021
Lightweight Hybrid Detection of Data Exfiltration using DNS based on Machine Learning.
Proceedings of the ICCNS 2021: The 11th International Conference on Communication and Network Security, Weihai, China, December 3, 2021

Classifying Malicious Domains using DNS Traffic Analysis.
Proceedings of the IEEE Intl Conf on Dependable, 2021

2020
DeNNeS: deep embedded neural network expert system for detecting cyber attacks.
Neural Comput. Appl., 2020

Dynamic Android Malware Category Classification using Semi-Supervised Deep Learning.
Proceedings of the IEEE Intl Conf on Dependable, 2020

2019
Application of deep learning to cybersecurity: A survey.
Neurocomputing, 2019

Achieving Privacy-Preserving Subset Aggregation in Fog-Enhanced IoT.
IEEE Access, 2019

2012
A Clustering-Based Approach for Personalized Privacy Preserving Publication of Moving Object Trajectory Data.
Proceedings of the Network and System Security - 6th International Conference, 2012


  Loading...