Zobrazeno 1 - 10
of 129
pro vyhledávání: '"Sattar Hashemi"'
Autor:
Lida Abdi, Sattar Hashemi
Publikováno v:
IEEE Access, Vol 9, Pp 127054-127067 (2021)
This research proposes a novel unsupervised domain adaptation algorithm for cross-domain visual recognition. Distance Correlation-based Domain Adaptation or DCDA algorithm is developed by a correlation measure, called distance correlation. DCDA explo
Externí odkaz:
https://doaj.org/article/a71082cc2015477087c0105ced0f13d9
Publikováno v:
International Journal of Information Science and Management, Vol 18, Iss 2, Pp 215-228 (2020)
Vast majority of data mining algorithms have been designed to work on centralized data, unfortunately however, almost all of nowadays data sets are distributed both geographically and conceptually. Due to privacy and computation cost, centralizing di
Externí odkaz:
https://doaj.org/article/1bbb52520e6049418671e3b8dfe07bf6
Publikováno v:
International Journal of Information and Communication Technology Research, Vol 12, Iss 1, Pp 11-19 (2020)
Internet of Things (IoT) security and privacy remain a major challenge, mainly due to the massive scale and distributed nature of IoT networks. Smart home is considered one of the rather prominent applications of the Internet of Things (IoT), integra
Externí odkaz:
https://doaj.org/article/887705b64ed544808cecb2920aff47b7
Autor:
Fatemeh Alavi, Sattar Hashemi
Publikováno v:
Applied Intelligence. 53:9531-9547
Autor:
Reza M. Parizi, Sattar Hashemi, Kim-Kwang Raymond Choo, Amir Namavar Jahromi, Ali Dehghantanha
Publikováno v:
IEEE Transactions on Emerging Topics in Computational Intelligence. 4:630-640
Malware detection is an increasingly important operational focus in cyber security, particularly, given the fast pace of such threats (e.g., new malware variants introduced every day). In recent years, there has been increased interest in exploring t
Publikováno v:
IET Software. 14:203-212
In bug fixing process, estimating the ‘Time to Fix Bug’ is one of the factors that helps the triager to allocate jobs in a better way. Due to the limitation of resources for bug fixing, the bugs with long fixing time must be identified, as soon a
Publikováno v:
Iranian Journal of Science and Technology, Transactions of Electrical Engineering. 45:29-45
It is important to forecast the wind speed range for managing the operation of wind turbines (WTs). Since the electrical power generated by WTs is highly dependent on the uncertain inherent of atmosphere meteorology, improving the accuracy of wind sp
Autor:
Ali Dehghantanha, Sajad Homayounoot, Sattar Hashemi, Hamid Darabian, Hadis Karimipour, Kim-Kwang Raymond Choo, Reza M. Parizi
Publikováno v:
Journal of Grid Computing. 18:293-303
Cryptomining malware (also referred to as cryptojacking) has changed the cyber threat landscape. Such malware exploits the victim’s CPU or GPU resources with the aim of generating cryptocurrency. In this paper, we study the potential of using deep
Autor:
Amin Azmoodeh, Sattar Hashemi, Ali Dehghantanha, Mohammad Taheri, Hamid Darabian, Reza M. Parizi, Kim-Kwang Raymond Choo, Sajad Homayoun
Publikováno v:
World Wide Web. 23:1241-1260
Malware remains a threat to our cyberspace and increasingly digitalized society. Current malware hunting techniques employ a variety of features, such as OpCodes, ByteCodes, and API calls, to distinguish malware from goodware. However, existing malwa
Resolving bugs in the maintenance phase of software is a complicated task. Bug assignment is one of the main tasks for resolving bugs. Some Bugs cannot be fixed properly without making design decisions and have to be assigned to designers, rather tha
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::204f3d5c70008686b271e50449269728