YEAR |
TITLE |
2023 |
Deep Learning for Zero-Day Malware Detection and Classification: A Survey
F Deldar, M Abadi
ACM Computing Surveys
|
2022 |
Android malware detection using supervised deep graph representation
learning
F Deldar, M Abadi, M Ebrahimifard
2022 12th International Conference on Computer and Knowledge Engineering
?
|
2022 |
Android malware detection using one-class graph neural networks
F Deldar, M Abadi, M Ebrahimifard
The ISC International Journal of Information Security (ISeCure)
14 (3), 51?60
|
2021 |
A differentially private location generalization approach to guarantee
non-uniform privacy in moving objects databases
F Deldar, M Abadi
Knowledge-Based Systems 225, 107084
|
2021 |
Enhancing spatial and temporal utilities in differentially private moving
objects database release
F Deldar, M Abadi
International Journal of Information Security 20 (4), 511?533
|
2020 |
A fully spatial personalized differentially private mechanism to provide
non-uniform privacy guarantees for spatial databases
N Niknami, M Abadi, F Deldar
Information Systems 92, 101526
|
2020 |
Incremental collusive fraud detection in large-scale online auction
networks
M Dadfarnia, F Adibnia, M Abadi, A Dorri
The Journal of Supercomputing 76, 7416?7437
|
2020 |
HAL-RD: Cross-correlating heterogeneous alerts and logs using resource
dependencies
M Safarzadeh, M Abadi, A Nowroozi
35th Annual ACM Symposium on Applied Computing (SAC), 1726?1735
|
2019 |
HLMD: A signature-based approach to hardware-level behavioral malware
detection and classification
MB Bahador, M Abadi, A Tajoddin
The Journal of Supercomputing 75 (8), 5551?5582
|
2019 |
RAMD: Registry-based anomaly malware detection using one-class ensemble
classifiers
A Tajoddin, M Abadi
Applied Intelligence 49 (7), 2641?2658
|
2019 |
PDP-SAG: Personalized privacy protection in moving objects databases
by combining differential privacy and sensitive attribute generalization
F Deldar, M Abadi
IEEE Access 7, 85887?85902
|
2018 |
Differentially private count queries over personalized-location trajectory
databases
F Deldar, M Abadi
Data in Brief 20, 1510?1514
|
2018 |
PLDP-TD: Personalized-location differentially private data analysis
on trajectory databases
F Deldar, M Abadi
Pervasive and Mobile Computing 49, 1?22
|
2018 |
SMSBotHunter: A novel anomaly detection technique to detect SMS botnets
F Faghihi, M Abadi, A Tajoddin
2018 15th International ISC (Iranian Society of Cryptology) Conference
on ?
|
2018 |
SocialBotHunter: Botnet detection in Twitter-like social networking
services using semi-supervised collective classification
A Dorri, M Abadi, M Dadfarnia
2018 IEEE 16th International Conference on Dependable, Autonomic
and Secure ?
|
2018 |
Akoman: Hardware-level malware detection using discrete wavelet transform
NS Alizadeh, M Abadi
2018 IEEE 4th International Conference on Smart Computing (SMARTCOMP),
476?481
|
2017 |
DroidNMD: Network-based malware detection in Android using an ensemble
of one-class classifiers
F Ghaffari, M Abadi, A Tajoddin, M Lamiyan
The Modares Journal of Electrical Engineering 16 (3), 40?47
|
2017 |
CAFD: Detecting collusive frauds in online auction networks by combining
one-class classification and collective classification
N Habibollahi, M Abadi, M Dadfarnia
2017 14th International ISC (Iranian Society of Cryptology) Conference
on ?
|
2017 |
AMD-EC: Anomaly-based Android malware detection using ensemble classifiers
F Ghaffari, M Abadi, A Tajoddin
2017 25th Iranian Conference on Electrical Engineering (ICEE), 2247?2252
|
2016 |
PPTD: Preserving personalized privacy in trajectory data publishing
by sensitive attribute generalization and trajectory local suppression
E Ghasemi Komishani, M Abadi, F Deldar
Knowledge-Based Systems 94, 43?59
|
2015 |
DroidMalHunter: A novel entropy-based anomaly detection system to detect
malicious Android applications
F Ghaffari, M Abadi
2015 5th International Conference on Computer and Knowledge Engineering
?
|
2015 |
DbDHunter: An ensemble-based anomaly detection approach to detect drive-by
download attacks
M Jodavi, M Abadi, E Parhizkar
2015 5th International Conference on Computer and Knowledge Engineering
?
|
2015 |
BeeOWA: A novel approach based on ABC algorithm and induced OWA operators
for constructing one-class classifier ensembles
E Parhizkar, M Abadi
Neurocomputing 166, 367?381
|
2015 |
OC-WAD: A one-class classifier ensemble approach for anomaly detection
in web traffic
E Parhizkar, M Abadi
2015 23rd Iranian Conference on Electrical Engineering (ICEE), 631?636
|
2015 |
JSObfusDetector: A binary PSO-based one-class classifier ensemble to
detect obfuscated JavaScript code
M Jodavi, M Abadi, E Parhizkar
2015 International Symposium on Artificial Intelligence and Signal
?
|
2015 |
DFBotKiller: Domain-flux botnet detection based on the history of group
activities and failures in DNS traffic
R Sharifnya, M Abadi
Digital Investigation 12, 15?26
|
2015 |
BotGrab: A negative reputation system for botnet detection
M Yahyazadeh, M Abadi
Computers & Electrical Engineering 41, 68?85
|
2014 |
SpatialPDP: A personalized differentially private mechanism for range
counting queries over spatial databases
N Niknami, M Abadi, F Deldar
2014 4th International Conference on Computer and Knowledge Engineering
?
|
2014 |
HPCMalHunter: Behavioral malware detection using hardware performance
counters and singular value decomposition
MB Bahador, M Abadi, A Tajoddin
2014 4th International Conference on Computer and Knowledge Engineering
?
|
2014 |
SocialClymene: A negative reputation system for covert botnet detection
in social networks
M Ghanadi, M Abadi
2014 7th International Symposium on Telecommunications (IST), 954?960
|
2014 |
BotCatch: Botnet detection based on coordinated group activities of
compromised hosts
M Yahyazadeh, M Abadi
2014 7th International Symposium on Telecommunications (IST), 941?945
|
2014 |
TrPLS: Preserving privacy in trajectory data publishing by personalized
local suppression
E Ghasemi Komishani, M Abadi
International Journal of Information & Communication Technology
Research ?
|
2014 |
Detecting obfuscated JavaScript malware using sequences of internal
function calls
A Gorji, M Abadi
2014 ACM Southeast Regional Conference (ACMSE), 1?6
|
2014 |
BeeMiner: A novel artificial bee colony algorithm for classification
rule discovery
M Talebi, M Abadi
2014 Iranian Conference on Intelligent Systems (ICIS), 1?5
|
2013 |
MalHunter: Automatic generation of multiple behavioral signatures for
polymorphic malware detection
H Razeghi Borojerdi, M Abadi
2013 3th International Conference on Computer and Knowledge Engineering
?
|
2013 |
A novel reputation system to detect DGA-based botnets
R Sharifnya, M Abadi
2013 3th International Conference on Computer and Knowledge Engineering
?
|
2013 |
On the trade-off between stealth and propagation speed of Internet worms
A Azarian, M Abadi
2013 10th International ISC (Iranian Society of Cryptology) Conference
on ?
|
2013 |
Outlier detection in wireless sensor networks using distributed principal
component analysis
M Ahmadi Livani, M Abadi, M Alikhany
Journal of AI and Data Mining 1 (1), 1?11
|
2012 |
A Clustering-Based Approach for Personalized Privacy Preserving Publication
of Moving Object Trajectory Data
S Mahdavifar, M Abadi, M Kahani, H Mahdikhani
Network and System Security 7645, 149?165
|
2012 |
A generalization-based approach for personalized privacy preservation
in trajectory data publishing
E Ghasemi Komishani, M Abadi
2012 6th International Symposium on Telecommunications (IST), 1129?1135
|
2012 |
BotOnus: An online unsupervised method for botnet detection
M Yahyazadeh, M Abadi
The ISC International Journal of Information Security (ISeCure)
4 (1), 51?62
|
2012 |
BeeID: Intrusion detection in AODV-based MANETs using artificial bee
colony and negative selection algorithms
F Barani, M Abadi
The ISC International Journal of Information Security (ISeCure)
4 (1), 25?39
|
2011 |
An ABC-AIS hybrid approach to dynamic anomaly detection in AODV-based
MANETs
F Barani, M Abadi
2011 IEEE 10th International Conference on Trust, Security and Privacy
in ?
|
2011 |
A hybrid model for correlating alerts of known and unknown attack scenarios
and updating attack graphs
SH Ahmadinejad, S Jalili, M Abadi
Computer Networks 55 (9), 2221?2240
|
2011 |
A PCA-based distributed approach for intrusion detection in wireless
sensor networks
M Ahmadi Livani, M Abadi
2011 International Symposium on Computer Networks and Distributed
Systems ?
|
2011 |
A dynamic clustering-based approach for anomaly detection in AODV-based
MANETs
M Alikhany, M Abadi
2011 International Symposium on Computer Networks and Distributed
Systems ?
|
2011 |
A Memetic Particle Swarm Optimization Algorithm for Network Vulnerability
Analysis
M Abadi, S Jalili
Evolutionary Algorithms, 85?108
|
2010 |
An energy-efficient anomaly detection approach for wireless sensor networks
M Ahmadi Livani, M Abadi
2010 5th International Symposium on Telecommunications (IST), 243?248
|
2010 |
Distributed PCA-based anomaly detection in wireless sensor networks
M Ahmadi Livani, M Abadi
2010 International Conference on Internet Technology and Secured
?
|
2010 |
A PSO-based weighting method for linear combination of neural networks
SH Nabavi-Kerizi, M Abadi, E Kabir
Computers & Electrical Engineering 36 (5), 886?894
|
2010 |
A particle swarm optimization algorithm for minimization analysis of
cost-sensitive attack graphs
M Abadi, S Jalili
The ISC International Journal of Information Security (ISeCure)
2 (1), 13?32
|
2009 |
A novel quantum-inspired evolutionary algorithm for solving combinatorial
optimization problems
P Mahdabi, M Abadi, S Jalili
11th Annual Conference on Genetic and Evolutionary Computation (GECCO),
1807 ?
|
2008 |
Using binary particle swarm optimization for minimization analysis of
large-scale network attack graphs
M Abadi, S Jalili
Scientia Iranica 15 (6), 605?619
|
2008 |
A multi-start quantum-inspired evolutionary algorithm for solving combinatorial
optimization problems
P Mahdabi, S Jalili, M Abadi
10th Annual Conference on Genetic and Evolutionary Computation (GECCO),
613?614
|
2006 |
An ant colony optimization algorithm for network vulnerability analysis
M Abadi, S Jalili
Iranian Journal of Electrical and Electronic Engineering 2 (3),
106?120
|