Sattar Hashemi

Orcid: 0000-0001-6981-8810

According to our database1, Sattar Hashemi authored at least 99 papers between 2006 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
Using word embedding and convolution neural network for bug triaging by considering design flaws.
Sci. Comput. Program., June, 2023

Data-adaptive kernel clustering with half-quadratic-based neighborhood relationship preservation.
Knowl. Based Syst., April, 2023

An element-wise kernel learning framework.
Appl. Intell., April, 2023

2022
A bi-level formulation for multiple kernel learning via self-paced training.
Pattern Recognit., 2022

Correction to: Binary domain adaptation with independence maximization.
Int. J. Mach. Learn. Cybern., 2022

2021
An anonymity communication protocol for security and privacy of clients in IoT-based mobile health transactions.
Comput. Networks, 2021

Generative adversarial network to detect unseen Internet of Things malware.
Ad Hoc Networks, 2021

Unsupervised Domain Adaptation Based on Correlation Maximization.
IEEE Access, 2021

2020
A multiview learning method for malware threat hunting: windows, IoT and android as case studies.
World Wide Web, 2020

An Enhanced Stacked LSTM Method With No Random Initialization for Malware Threat Hunting in Safety and Time-Critical Systems.
IEEE Trans. Emerg. Top. Comput. Intell., 2020

Know Abnormal, Find Evil: Frequent Pattern Mining for Ransomware Threat Hunting and Intelligence.
IEEE Trans. Emerg. Top. Comput., 2020

Proposing a sparse representational based face verification system to run in a shortage of memory.
Multim. Tools Appl., 2020

Predicting the bug fixing time using word embedding and deep long short term memories.
IET Softw., 2020

Detecting Cryptomining Malware: a Deep Learning Approach for Static and Dynamic Analysis.
J. Grid Comput., 2020

An opcode-based technique for polymorphic Internet of Things malware detection.
Concurr. Comput. Pract. Exp., 2020

An improved two-hidden-layer extreme learning machine for malware hunting.
Comput. Secur., 2020

Security Framework of IoT-Based Smart Home.
Proceedings of the 10th International Symposium on Telecommunications, 2020

A Deep Learning-based Malware Hunting Technique to Handle Imbalanced Data.
Proceedings of the 17th International ISC Conference on Information Security and Cryptology, 2020

Active Spectral Botnet Detection Based on Eigenvalue Weighting.
Proceedings of the Handbook of Big Data Privacy., 2020

2019
DRTHIS: Deep ransomware threat hunting and intelligence system at the fog layer.
Future Gener. Comput. Syst., 2019

AdaWFPA: Adaptive Online Website Fingerprinting Attack for Tor Anonymous Network: A Stream-wise Paradigm.
Comput. Commun., 2019

Investigating the Streaming Algorithms Usage in Website Fingerprinting Attack Against Tor Privacy Enhancing Technology.
Proceedings of the 16th International ISC (Iranian Society of Cryptology) Conference on Information Security and Cryptology, 2019

2018
Domain invariant feature extraction against evasion attack.
Int. J. Mach. Learn. Cybern., 2018

An entropy-based distance measure for analyzing and detecting metamorphic malware.
Appl. Intell., 2018

2017
Graph embedding as a new approach for unknown malware detection.
J. Comput. Virol. Hacking Tech., 2017

Visual domain adaptation via transfer feature learning.
Knowl. Inf. Syst., 2017

Modelling information diffusion based on non-dominated friends in social networks.
J. Inf. Sci., 2017

Two-tier network anomaly detection model: a machine learning approach.
J. Intell. Inf. Syst., 2017

Multi-objective perception model for diffusion of information in social networks.
Int. J. Data Min. Model. Manag., 2017

Using domain adaptation in adversarial environment.
Int. J. Data Min. Model. Manag., 2017

Online Prediction via Continuous Artificial Prediction Markets.
IEEE Intell. Syst., 2017

Exploiting kernel-based feature weighting and instance clustering to transfer knowledge across domains.
Turkish J. Electr. Eng. Comput. Sci., 2017

Evaluation of random forest classifier in security domain.
Appl. Intell., 2017

Hybrid Intrusion Detection: Combining Decision Tree and Gaussian Mixture Model.
Proceedings of the 14th International ISC (Iranian Society of Cryptology) Conference on Information Security and Cryptology, 2017

2016
To Combat Multi-Class Imbalanced Problems by Means of Over-Sampling Techniques.
IEEE Trans. Knowl. Data Eng., 2016

An Efficient yet Effective Random Partitioning and Feature Weighting Approach for Transfer Learning.
Int. J. Pattern Recognit. Artif. Intell., 2016

Learning a Secure Classifier against Evasion Attack.
Proceedings of the IEEE International Conference on Data Mining Workshops, 2016

Artificial Prediction Markets for Clustering.
Proceedings of the AI 2016: Advances in Artificial Intelligence, 2016

2015
To combat multi-class imbalanced problems by means of over-sampling and boosting techniques.
Soft Comput., 2015

HC-MOEA: A hierarchical clustering approach for increasing the solution's diversity in multiobjective evolutionary algorithms.
Intell. Data Anal., 2015

Scaling up the hybrid Particle Swarm Optimization algorithm for nominal data-sets.
Intell. Data Anal., 2015

DFP-SEPSF: A dynamic frequent pattern tree to mine strong emerging patterns in streamwise features.
Eng. Appl. Artif. Intell., 2015

Knowledge Representation in Learning Classifier Systems: A Review.
CoRR, 2015

Artificial Prediction Markets for Online Prediction of Continuous Variables-A Preliminary Report.
CoRR, 2015

Effective team formation in collaboration networks using vertex and proficiency similarity measures.
AI Commun., 2015

An ensemble game theoretic approach for multi-objective optimization.
AI Commun., 2015

Adopting Community Features to Detect Social Spammers.
Proceedings of the 2015 European Intelligence and Security Informatics Conference, 2015

2014
Detecting intrusion transactions in database systems: a novel approach.
J. Intell. Inf. Syst., 2014

A statistical approach for clustering in streaming data.
Artif. Intell. Res., 2014

Multi-Document Summarization Using Graph-Based Iterative Ranking Algorithms and Information Theoretical Distortion Measures.
Proceedings of the Twenty-Seventh International Florida Artificial Intelligence Research Society Conference, 2014

2013
HDM-Analyser: a hybrid analysis approach based on data mining techniques for malware detection.
J. Comput. Virol. Hacking Tech., 2013

Using reinforcement learning to find an optimal set of features.
Comput. Math. Appl., 2013

An enriched game-theoretic framework for multi-objective clustering.
Appl. Soft Comput., 2013

Discovering overlapping communities in social networks: A novel game-theoretic approach.
AI Commun., 2013

An Ensemble Pruning Approach Based on Reinforcement Learning in Presence of Multi-class Imbalanced Data.
Proceedings of the Third International Conference on Soft Computing for Problem Solving, 2013

Mining Jumping Emerging Patterns by Streaming Feature Selection.
Proceedings of the Knowledge and Systems Engineering, 2013

To Boost Graph Clustering Based on Power Iteration by Removing Outliers.
Proceedings of the First International Conference on Advanced Data and Information Engineering, 2013

Road Traffic Prediction Using Context-Aware Random Forest Based on Volatility Nature of Traffic Flows.
Proceedings of the Intelligent Information and Database Systems - 5th Asian Conference, 2013

GAB-EPA: A GA Based Ensemble Pruning Approach to Tackle Multiclass Imbalanced Problems.
Proceedings of the Intelligent Information and Database Systems - 5th Asian Conference, 2013

2012
A graph mining approach for detecting unknown malwares.
J. Vis. Lang. Comput., 2012

ECFGM: enriched control flow graph miner for unknown vicious infected code detection.
J. Comput. Virol., 2012

SPCF: a stepwise partitioning for collaborative filtering to alleviate sparsity problems.
J. Inf. Sci., 2012

An Effective Framework for Fast Expert Mining in Collaboration Networks: A Group-Oriented and Cost-Based Method.
J. Comput. Sci. Technol., 2012

DBFS: An effective Density Based Feature Selection scheme for small sample size and high dimensional imbalanced data sets.
Data Knowl. Eng., 2012

A Novel Strategy Selection Method for Multi-Objective Clustering Algorithms Using Game Theory
CoRR, 2012

Dispelling Classes Gradually to Improve Quality of Feature Reduction Approaches
CoRR, 2012

Towards a variable size sliding window model for frequent itemset mining over data streams.
Comput. Ind. Eng., 2012

A levelwise spectral co-clustering algorithm for collaborative filtering.
Proceedings of the 6th International Conference on Ubiquitous Information Management and Communication, 2012

TeamFinder: A Co-clustering based Framework for Finding an Effective Team of Experts in Social Networks.
Proceedings of the 12th IEEE International Conference on Data Mining Workshops, 2012

A Game-Theoretic Framework to Identify Top-K Teams in Social Networks.
Proceedings of the KDIR 2012 - Proceedings of the International Conference on Knowledge Discovery and Information Retrieval, Barcelona, Spain, 4, 2012

A game theoretic framework for feature selection.
Proceedings of the 9th International Conference on Fuzzy Systems and Knowledge Discovery, 2012

A General Paradigm for Normalizing Metamorphic Malwares.
Proceedings of the 10th International Conference on Frontiers of Information Technology, 2012

To Incorporate Sequential Dynamic Features in Malware Detection Engines.
Proceedings of the 2012 European Intelligence and Security Informatics Conference, 2012

Community Detection in Social Networks Using Information Diffusion.
Proceedings of the International Conference on Advances in Social Networks Analysis and Mining, 2012

Link Prediction in Social Network Using Co-clustering Based Approach.
Proceedings of the 26th International Conference on Advanced Information Networking and Applications Workshops, 2012

Improving Nearest Neighbor Classification by Elimination of Noisy Irrelevant Features.
Proceedings of the Intelligent Information and Database Systems - 4th Asian Conference, 2012

Incorporating Hierarchical Information into the Matrix Factorization Model for Collaborative Filtering.
Proceedings of the Intelligent Information and Database Systems - 4th Asian Conference, 2012

2011
CBDL: Context-based distance learning for categorical attributes.
Int. J. Intell. Syst., 2011

A Precise Statistical approach for concept change detection in unlabeled data streams.
Comput. Math. Appl., 2011

An Effective Expert Team Formation in Social Networks Based on Skill Grading.
Proceedings of the Data Mining Workshops (ICDMW), 2011

Towards final rule set reduction in XCS: a fuzzy representation approach.
Proceedings of the 13th Annual Genetic and Evolutionary Computation Conference, 2011

Voting based learning classifier system for multi-label classification.
Proceedings of the 13th Annual Genetic and Evolutionary Computation Conference, 2011

Anomaly Detection in Categorical Datasets Using Bayesian Networks.
Proceedings of the Artificial Intelligence and Computational Intelligence, 2011

Detecting Overlapping Communities in Social Networks by Game Theory and Structural Equivalence Concept.
Proceedings of the Artificial Intelligence and Computational Intelligence, 2011

2010
To Handle Real Valued Input in XCS: Using Fuzzy Hyper-trapezoidal Membership in Classifier Condition.
Proceedings of the Simulated Evolution and Learning - 8th International Conference, 2010

Towards Efficient and Effective Negative Selection Algorithm: A Convex Hull Representation Scheme.
Proceedings of the Simulated Evolution and Learning - 8th International Conference, 2010

Malware detection based on mining API calls.
Proceedings of the 2010 ACM Symposium on Applied Computing (SAC), 2010

2009
Adapted One-versus-All Decision Trees for Data Stream Classification.
IEEE Trans. Knowl. Data Eng., 2009

Agent Based Decision Tree Learning: a Novel Approach.
Int. J. Softw. Eng. Knowl. Eng., 2009

A Recursive Classifier System for Partially Observable Environments.
Fundam. Informaticae, 2009

Flexible decision tree for data stream classification in the presence of concept change, noise and missing values.
Data Min. Knowl. Discov., 2009

Automatic Refinement of Platform Independent Models Using Graph Transformation System.
Proceedings of the Fourth International Conference on Frontier of Computer Science and Technology, 2009

2008
Class Specific Fuzzy Decision Trees for Mining High Speed Data Streams.
Fundam. Informaticae, 2008

Detecting intrusion transactions in databases using data item dependencies and anomaly analysis.
Expert Syst. J. Knowl. Eng., 2008

2007
Flexible Classifier Selection for Accuracy-Based Classifier Systems.
Proceedings of the International MultiConference of Engineers and Computer Scientists 2007, 2007

To Better Handle Concept Change and Noise: A Cellular Automata Approach to Data Stream Classification.
Proceedings of the AI 2007: Advances in Artificial Intelligence, 2007

2006
An Efficient Distributed Algorithm for Mining Association Rules.
Proceedings of the Parallel and Distributed Processing and Applications, 2006

A New Algorithm for Mining Fuzzy Association Rules in the Large Databases Based on Ontology.
Proceedings of the Workshops Proceedings of the 6th IEEE International Conference on Data Mining (ICDM 2006), 2006

Effect of Similar Behaving Attributes in Mining of Fuzzy Association Rules in the Large Databases.
Proceedings of the Computational Science and Its Applications, 2006


  Loading...