default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 47 matches
- 2024
- Hamed Zamanian, Ahmad Shalbaf, M. R. Zali, A. R. Khalaj, P. Dehghan, M. Tabesh, B. Hatami, Roohallah Alizadehsani, Ru San Tan, U. Rajendra Acharya:
Application of artificial intelligence techniques for non-alcoholic fatty liver disease diagnosis: A systematic review (2005-2023). Comput. Methods Programs Biomed. 244: 107932 (2024) - 2023
- Hamed Mohebalizadeh, Hojatollah Adibi, Mehdi Dehghan:
Well-posedness of space fractional Ginzburg-Landau equations involving the fractional Laplacian arising in a Bose-Einstein condensation and its kernel based approximation. Commun. Nonlinear Sci. Numer. Simul. 126: 107469 (2023) - 2022
- Tahereh Dehghani Firouzabadi, Davoud Abootorabi Zarchi, Mohammadreza Mazid, Hadi Safdarkhani, Hamed Nafisi:
Overarching Preventive Sympathetic Tripping Approach in Active Distribution Networks Without Telecommunication Platforms and Additional Protective Devices. IEEE Access 10: 28411-28421 (2022) - Hamed Dehghan, Nasim Nahavandi, S. Kamal Chaharsooghi, Javad Zarei, Mohammad Reza Amin-Naseri:
A hybrid game theory and system dynamics model to determine optimal electricity generation mix. Comput. Chem. Eng. 166: 107990 (2022) - Moez Farokhnia Hamedani, Ali Dehghan:
Impact of Protection Level on Vertically-Differentiated Two-Sided Software Platforms. Int. J. Inf. Secur. Priv. 16(1): 1-16 (2022) - Hamed Zamani, Fernando Diaz, Mostafa Dehghani, Donald Metzler, Michael Bendersky:
Retrieval-Enhanced Machine Learning. SIGIR 2022: 2875-2886 - Hamed Zamani, Fernando Diaz, Mostafa Dehghani, Donald Metzler, Michael Bendersky:
Retrieval-Enhanced Machine Learning. CoRR abs/2205.01230 (2022) - 2021
- Amir H. Tavakoli, Seyyed Mohammad Mehdi Dehghan, Adel Abedian, Hamed Arefkhani:
Reaction wheels Designing and Evaluation for Air-bearing attitude control Simulator. Mechatron. Syst. Control. 49(1) (2021) - Hamed HaddadPajouh, Ali Dehghantanha, Reza M. Parizi, Mohammed Aledhari, Hadis Karimipour:
A survey on internet of things security: Requirements, challenges, and solutions. Internet Things 14: 100129 (2021) - Hamed HaddadPajouh, Alireza Mohtadi, Ali Dehghantanha, Hadis Karimipour, Xiaodong Lin, Kim-Kwang Raymond Choo:
A Multikernel and Metaheuristic Feature Selection Approach for IoT Malware Threat Hunting in the Edge Layer. IEEE Internet Things J. 8(6): 4540-4547 (2021) - Sina Dehghani, Hamed Saleh, Saeed Seddighin, Shang-Hua Teng:
Computational Analyses of the Electoral College: Campaigning Is Hard But Approximately Manageable. AAAI 2021: 5294-5302 - 2020
- Mohammad Behdad Jamshidi, Ali Lalbakhsh, Jakub Talla, Zdenek Peroutka, Farimah Hadjilooei, Pedram Lalbakhsh, Morteza Jamshidi, Luigi La Spada, Mirhamed Mirmozafari, Mojgan Dehghani, Asal Sabet, Saeed Roshani, Sobhan Roshani, Nima Bayat-Makou, Bahare Mohamadzade, Zahra Malek, Alireza Jamshidi, Sarah Kiani, Hamed Hashemi-Dezaki, Wahab Mohyuddin:
Artificial Intelligence and COVID-19: Deep Learning Approaches for Diagnosis and Treatment. IEEE Access 8: 109581-109595 (2020) - Hamed Haddad Pajouh, Amin Azmoodeh, Ali Dehghantanha, Reza M. Parizi:
MVFCC: A Multi-View Fuzzy Consensus Clustering Model for Malware Threat Attribution. IEEE Access 8: 139188-139198 (2020) - Abbas Yazdinejad, Hamed HaddadPajouh, Ali Dehghantanha, Reza M. Parizi, Gautam Srivastava, Mu-Yen Chen:
Cryptocurrency malware hunting: A deep Recurrent Neural Network approach. Appl. Soft Comput. 96: 106630 (2020) - Hamed HaddadPajouh, Raouf Khayami, Ali Dehghantanha, Kim-Kwang Raymond Choo, Reza M. Parizi:
AI4SAFE-IoT: an AI-powered secure architecture for edge layer of Internet of things. Neural Comput. Appl. 32(20): 16119-16133 (2020) - Abdulrahman Al-Abassi, Hadis Karimipour, Hamed Haddad Pajouh, Ali Dehghantanha, Reza M. Parizi:
Industrial Big Data Analytics: Challenges and Opportunities. Handbook of Big Data Privacy 2020: 37-61 - Mohammad Mehdi BehradFar, Hamed HaddadPajouh, Ali Dehghantanha, Amin Azmoodeh, Hadis Karimipour, Reza M. Parizi, Gautam Srivastava:
RAT Hunter: Building Robust Models for Detecting Remote Access Trojans Based on Optimum Hybrid Features. Handbook of Big Data Privacy 2020: 371-383 - Mohammad Nassiri, Hamed HaddadPajouh, Ali Dehghantanha, Hadis Karimipour, Reza M. Parizi, Gautam Srivastava:
Malware Elimination Impact on Dynamic Analysis: An Experimental Machine Learning Approach. Handbook of Big Data Privacy 2020: 359-370 - Mahdis Saharkhizan, Amin Azmoodeh, Hamed HaddadPajouh, Ali Dehghantanha, Reza M. Parizi, Gautam Srivastava:
A Hybrid Deep Generative Local Metric Learning Method for Intrusion Detection. Handbook of Big Data Privacy 2020: 343-357 - Suby Singh, Hadis Karimipour, Hamed HaddadPajouh, Ali Dehghantanha:
Artificial Intelligence and Security of Industrial Control Systems. Handbook of Big Data Privacy 2020: 121-164 - 2019
- Mehdi Dehghani, Hamed Kharrati, Hadi Seyedarabi, Mahdi Baradarannia:
The Correcting Approach of Gyroscope-Free Inertial Navigation Based on the Applicable Topological Map. J. Comput. Inf. Sci. Eng. 19(2) (2019) - Hamed Vahdat-Nejad, Mojtaba Dehghan Manshadi, Mahdi Kherad:
A fuzzy genetic approach for velocity estimation in wind-tunnel. Soft Comput. 23(10): 3519-3527 (2019) - Hamed Haddad Pajouh, Reza Javidan, Raouf Khayami, Ali Dehghantanha, Kim-Kwang Raymond Choo:
A Two-Layer Dimension Reduction and Two-Tier Classification Model for Anomaly-Based Intrusion Detection in IoT Backbone Networks. IEEE Trans. Emerg. Top. Comput. 7(2): 314-323 (2019) - Reyhaneh HosseiniNejad, Hamed Haddad Pajouh, Ali Dehghantanha, Reza M. Parizi:
A Cyber Kill Chain Based Analysis of Remote Access Trojans. Handbook of Big Data and IoT Security 2019: 273-299 - 2018
- Hamed Haddad Pajouh, Ali Dehghantanha, Raouf Khayami, Kim-Kwang Raymond Choo:
A deep Recurrent Neural Network based approach for Internet of Things malware threat hunting. Future Gener. Comput. Syst. 85: 88-96 (2018) - Mehdi Dehghani, Hamed Kharrati, Hadi Seyedarabi, Mahdi Baradarannia:
Improvement of angular velocity and position estimation in gyro-free inertial navigation based on vision aid equipment. IET Comput. Vis. 12(3): 261-275 (2018) - Hamed Ahmadzade, Rong Gao, Mohammad Hossein Dehghan, Reza Ahmadi:
Partial triangular entropy of uncertain random variables and its application. J. Ambient Intell. Humaniz. Comput. 9(5): 1455-1464 (2018) - Hamed Mirsaeedi, Alireza Fereidunian, Seyed Mohsen Mohammadi-Hosseininejad, Payman Dehghanian, Hamid Lesani:
Long-Term Maintenance Scheduling and Budgeting in Electricity Distribution Systems Equipped With Automatic Switches. IEEE Trans. Ind. Informatics 14(5): 1909-1919 (2018) - Hamed Haddad Pajouh, Ali Dehghantanha, Raouf Khayami, Kim-Kwang Raymond Choo:
Intelligent OS X malware threat detection with code inspection. J. Comput. Virol. Hacking Tech. 14(3): 213-223 (2018) - Hamed Zamani, Mostafa Dehghani, W. Bruce Croft, Erik G. Learned-Miller, Jaap Kamps:
From Neural Re-Ranking to Neural Ranking: Learning a Sparse Representation for Inverted Indexing. CIKM 2018: 497-506
skipping 17 more matches
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-11-01 12:25 CET from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint