Sattar Hashemi
Sattar Hashemi
Professor of Artificial Intelligence, Shiraz University
Verified email at
Cited by
Cited by
To combat multi-class imbalanced problems by means of over-sampling techniques
L Abdi, S Hashemi
IEEE Transactions on Knowledge and Data Engineering 28 (1), 238-251, 2016
Malware detection based on mining API calls
A Sami, B Yadegari, H Rahimi, N Peiravian, S Hashemi, A Hamze
Proceedings of the 2010 ACM Symposium on Applied Computing, 1020-1025, 2010
Know abnormal, find evil: frequent pattern mining for ransomware threat hunting and intelligence
S Homayoun, A Dehghantanha, M Ahmadzadeh, S Hashemi, R Khayami
IEEE transactions on emerging topics in computing 8 (2), 341-351, 2017
Two-tier network anomaly detection model: a machine learning approach
HH Pajouh, GH Dastghaibyfard, S Hashemi
Journal of Intelligent Information Systems 48, 61-74, 2017
Visual domain adaptation via transfer feature learning
J Tahmoresnezhad, S Hashemi
Knowledge and information systems 50, 585-605, 2017
DRTHIS: Deep ransomware threat hunting and intelligence system at the fog layer
S Homayoun, A Dehghantanha, M Ahmadzadeh, S Hashemi, R Khayami, ...
Future Generation Computer Systems 90, 94-104, 2019
A Hybrid clustering and classification technique for forecasting short‐term energy consumption
M Torabi, S Hashemi, MR Saybani, S Shamshirband, A Mosavi
Environmental Progress & Sustainable Energy 38 (1), 66-76, 2019
Adapted one-versus-all decision trees for data stream classification
S Hashemi, Y Yang, Z Mirzamomen, M Kangavari
IEEE Transactions on Knowledge and Data Engineering 21 (5), 624-637, 2008
Detecting cryptomining malware: a deep learning approach for static and dynamic analysis
H Darabian, S Homayounoot, A Dehghantanha, S Hashemi, H Karimipour, ...
Journal of Grid Computing 18, 293-303, 2020
An improved two-hidden-layer extreme learning machine for malware hunting
AN Jahromi, S Hashemi, A Dehghantanha, KKR Choo, H Karimipour, ...
Computers & Security 89, 101655, 2020
An opcode‐based technique for polymorphic Internet of Things malware detection
H Darabian, A Dehghantanha, S Hashemi, S Homayoun, KKR Choo
Concurrency and Computation: Practice and Experience 32 (6), e5173, 2020
Graph embedding as a new approach for unknown malware detection
H Hashemi, A Azmoodeh, A Hamzeh, S Hashemi
Journal of Computer Virology and Hacking Techniques 13, 153-166, 2017
BoTShark: A deep learning approach for botnet traffic detection
S Homayoun, M Ahmadzadeh, S Hashemi, A Dehghantanha, R Khayami
Cyber Threat Intelligence, 137-153, 2018
A novel electrical net-load forecasting model based on deep neural networks and wavelet transform integration
M Alipour, J Aghaei, M Norouzi, T Niknam, S Hashemi, M Lehtonen
Energy 205, 118106, 2020
A graph mining approach for detecting unknown malwares
M Eskandari, S Hashemi
Journal of Visual Languages & Computing 23 (3), 154-162, 2012
DBFS: An effective Density Based Feature Selection scheme for small sample size and high dimensional imbalanced data sets
M Alibeigi, S Hashemi, A Hamzeh
Data & Knowledge Engineering 81, 67-103, 2012
Towards a variable size sliding window model for frequent itemset mining over data streams
M Deypir, MH Sadreddini, S Hashemi
Computers & Industrial Engineering 63 (1), 161-172, 2012
An enhanced stacked LSTM method with no random initialization for malware threat hunting in safety and time-critical systems
AN Jahromi, S Hashemi, A Dehghantanha, RM Parizi, KKR Choo
IEEE Transactions on Emerging Topics in Computational Intelligence, 2020
Flexible decision tree for data stream classification in the presence of concept change, noise and missing values
S Hashemi, Y Yang
Data Mining and Knowledge Discovery 19, 95-131, 2009
HDM-Analyser: a hybrid analysis approach based on data mining techniques for malware detection
M Eskandari, Z Khorshidpour, S Hashemi
Journal of Computer Virology and Hacking Techniques 9, 77-93, 2013
The system can't perform the operation now. Try again later.
Articles 1–20