Sattar Hashemi
Orcid: 0000-0001-6981-8810
According to our database1,
Sattar Hashemi
authored at least 99 papers
between 2006 and 2023.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2023
Using word embedding and convolution neural network for bug triaging by considering design flaws.
Sci. Comput. Program., June, 2023
Data-adaptive kernel clustering with half-quadratic-based neighborhood relationship preservation.
Knowl. Based Syst., April, 2023
2022
Pattern Recognit., 2022
Int. J. Mach. Learn. Cybern., 2022
2021
An anonymity communication protocol for security and privacy of clients in IoT-based mobile health transactions.
Comput. Networks, 2021
Ad Hoc Networks, 2021
2020
A multiview learning method for malware threat hunting: windows, IoT and android as case studies.
World Wide Web, 2020
An Enhanced Stacked LSTM Method With No Random Initialization for Malware Threat Hunting in Safety and Time-Critical Systems.
IEEE Trans. Emerg. Top. Comput. Intell., 2020
Know Abnormal, Find Evil: Frequent Pattern Mining for Ransomware Threat Hunting and Intelligence.
IEEE Trans. Emerg. Top. Comput., 2020
Proposing a sparse representational based face verification system to run in a shortage of memory.
Multim. Tools Appl., 2020
Predicting the bug fixing time using word embedding and deep long short term memories.
IET Softw., 2020
Detecting Cryptomining Malware: a Deep Learning Approach for Static and Dynamic Analysis.
J. Grid Comput., 2020
Concurr. Comput. Pract. Exp., 2020
Comput. Secur., 2020
Proceedings of the 10th International Symposium on Telecommunications, 2020
Proceedings of the 17th International ISC Conference on Information Security and Cryptology, 2020
Proceedings of the Handbook of Big Data Privacy., 2020
2019
Future Gener. Comput. Syst., 2019
AdaWFPA: Adaptive Online Website Fingerprinting Attack for Tor Anonymous Network: A Stream-wise Paradigm.
Comput. Commun., 2019
Investigating the Streaming Algorithms Usage in Website Fingerprinting Attack Against Tor Privacy Enhancing Technology.
Proceedings of the 16th International ISC (Iranian Society of Cryptology) Conference on Information Security and Cryptology, 2019
2018
Int. J. Mach. Learn. Cybern., 2018
Appl. Intell., 2018
2017
J. Comput. Virol. Hacking Tech., 2017
J. Inf. Sci., 2017
J. Intell. Inf. Syst., 2017
Int. J. Data Min. Model. Manag., 2017
Int. J. Data Min. Model. Manag., 2017
IEEE Intell. Syst., 2017
Exploiting kernel-based feature weighting and instance clustering to transfer knowledge across domains.
Turkish J. Electr. Eng. Comput. Sci., 2017
Proceedings of the 14th International ISC (Iranian Society of Cryptology) Conference on Information Security and Cryptology, 2017
2016
IEEE Trans. Knowl. Data Eng., 2016
An Efficient yet Effective Random Partitioning and Feature Weighting Approach for Transfer Learning.
Int. J. Pattern Recognit. Artif. Intell., 2016
Proceedings of the IEEE International Conference on Data Mining Workshops, 2016
Proceedings of the AI 2016: Advances in Artificial Intelligence, 2016
2015
To combat multi-class imbalanced problems by means of over-sampling and boosting techniques.
Soft Comput., 2015
HC-MOEA: A hierarchical clustering approach for increasing the solution's diversity in multiobjective evolutionary algorithms.
Intell. Data Anal., 2015
Intell. Data Anal., 2015
DFP-SEPSF: A dynamic frequent pattern tree to mine strong emerging patterns in streamwise features.
Eng. Appl. Artif. Intell., 2015
Artificial Prediction Markets for Online Prediction of Continuous Variables-A Preliminary Report.
CoRR, 2015
Effective team formation in collaboration networks using vertex and proficiency similarity measures.
AI Commun., 2015
AI Commun., 2015
Proceedings of the 2015 European Intelligence and Security Informatics Conference, 2015
2014
J. Intell. Inf. Syst., 2014
Multi-Document Summarization Using Graph-Based Iterative Ranking Algorithms and Information Theoretical Distortion Measures.
Proceedings of the Twenty-Seventh International Florida Artificial Intelligence Research Society Conference, 2014
2013
HDM-Analyser: a hybrid analysis approach based on data mining techniques for malware detection.
J. Comput. Virol. Hacking Tech., 2013
Comput. Math. Appl., 2013
Appl. Soft Comput., 2013
Discovering overlapping communities in social networks: A novel game-theoretic approach.
AI Commun., 2013
An Ensemble Pruning Approach Based on Reinforcement Learning in Presence of Multi-class Imbalanced Data.
Proceedings of the Third International Conference on Soft Computing for Problem Solving, 2013
Proceedings of the Knowledge and Systems Engineering, 2013
Proceedings of the First International Conference on Advanced Data and Information Engineering, 2013
Road Traffic Prediction Using Context-Aware Random Forest Based on Volatility Nature of Traffic Flows.
Proceedings of the Intelligent Information and Database Systems - 5th Asian Conference, 2013
GAB-EPA: A GA Based Ensemble Pruning Approach to Tackle Multiclass Imbalanced Problems.
Proceedings of the Intelligent Information and Database Systems - 5th Asian Conference, 2013
2012
ECFGM: enriched control flow graph miner for unknown vicious infected code detection.
J. Comput. Virol., 2012
SPCF: a stepwise partitioning for collaborative filtering to alleviate sparsity problems.
J. Inf. Sci., 2012
An Effective Framework for Fast Expert Mining in Collaboration Networks: A Group-Oriented and Cost-Based Method.
J. Comput. Sci. Technol., 2012
DBFS: An effective Density Based Feature Selection scheme for small sample size and high dimensional imbalanced data sets.
Data Knowl. Eng., 2012
A Novel Strategy Selection Method for Multi-Objective Clustering Algorithms Using Game Theory
CoRR, 2012
CoRR, 2012
Towards a variable size sliding window model for frequent itemset mining over data streams.
Comput. Ind. Eng., 2012
Proceedings of the 6th International Conference on Ubiquitous Information Management and Communication, 2012
TeamFinder: A Co-clustering based Framework for Finding an Effective Team of Experts in Social Networks.
Proceedings of the 12th IEEE International Conference on Data Mining Workshops, 2012
A Game-Theoretic Framework to Identify Top-K Teams in Social Networks.
Proceedings of the KDIR 2012 - Proceedings of the International Conference on Knowledge Discovery and Information Retrieval, Barcelona, Spain, 4, 2012
Proceedings of the 9th International Conference on Fuzzy Systems and Knowledge Discovery, 2012
Proceedings of the 10th International Conference on Frontiers of Information Technology, 2012
Proceedings of the 2012 European Intelligence and Security Informatics Conference, 2012
Proceedings of the International Conference on Advances in Social Networks Analysis and Mining, 2012
Proceedings of the 26th International Conference on Advanced Information Networking and Applications Workshops, 2012
Improving Nearest Neighbor Classification by Elimination of Noisy Irrelevant Features.
Proceedings of the Intelligent Information and Database Systems - 4th Asian Conference, 2012
Incorporating Hierarchical Information into the Matrix Factorization Model for Collaborative Filtering.
Proceedings of the Intelligent Information and Database Systems - 4th Asian Conference, 2012
2011
Int. J. Intell. Syst., 2011
A Precise Statistical approach for concept change detection in unlabeled data streams.
Comput. Math. Appl., 2011
Proceedings of the Data Mining Workshops (ICDMW), 2011
Proceedings of the 13th Annual Genetic and Evolutionary Computation Conference, 2011
Proceedings of the 13th Annual Genetic and Evolutionary Computation Conference, 2011
Proceedings of the Artificial Intelligence and Computational Intelligence, 2011
Detecting Overlapping Communities in Social Networks by Game Theory and Structural Equivalence Concept.
Proceedings of the Artificial Intelligence and Computational Intelligence, 2011
2010
To Handle Real Valued Input in XCS: Using Fuzzy Hyper-trapezoidal Membership in Classifier Condition.
Proceedings of the Simulated Evolution and Learning - 8th International Conference, 2010
Towards Efficient and Effective Negative Selection Algorithm: A Convex Hull Representation Scheme.
Proceedings of the Simulated Evolution and Learning - 8th International Conference, 2010
Proceedings of the 2010 ACM Symposium on Applied Computing (SAC), 2010
2009
IEEE Trans. Knowl. Data Eng., 2009
Int. J. Softw. Eng. Knowl. Eng., 2009
Fundam. Informaticae, 2009
Flexible decision tree for data stream classification in the presence of concept change, noise and missing values.
Data Min. Knowl. Discov., 2009
Automatic Refinement of Platform Independent Models Using Graph Transformation System.
Proceedings of the Fourth International Conference on Frontier of Computer Science and Technology, 2009
2008
Fundam. Informaticae, 2008
Detecting intrusion transactions in databases using data item dependencies and anomaly analysis.
Expert Syst. J. Knowl. Eng., 2008
2007
Flexible Classifier Selection for Accuracy-Based Classifier Systems.
Proceedings of the International MultiConference of Engineers and Computer Scientists 2007, 2007
To Better Handle Concept Change and Noise: A Cellular Automata Approach to Data Stream Classification.
Proceedings of the AI 2007: Advances in Artificial Intelligence, 2007
2006
Proceedings of the Parallel and Distributed Processing and Applications, 2006
A New Algorithm for Mining Fuzzy Association Rules in the Large Databases Based on Ontology.
Proceedings of the Workshops Proceedings of the 6th IEEE International Conference on Data Mining (ICDM 2006), 2006
Effect of Similar Behaving Attributes in Mining of Fuzzy Association Rules in the Large Databases.
Proceedings of the Computational Science and Its Applications, 2006