default search action
Hossein Shirazi
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [i5]Matt Gorbett, Hossein Shirazi, Indrakshi Ray:
Tiled Bit Networks: Sub-Bit Neural Network Compression Through Reuse of Learnable Binary Vectors. CoRR abs/2407.12075 (2024) - 2023
- [j20]Matt Gorbett, Caspian Siebert, Hossein Shirazi, Indrakshi Ray:
The intrinsic dimensionality of network datasets and its applications. J. Comput. Secur. 31(6): 679-704 (2023) - [j19]Chaoyuan Zuo, Ritwik Banerjee, Fateme Hashemi Chaleshtori, Hossein Shirazi, Indrakshi Ray:
Seeing Should Probably Not Be Believing: The Role of Deceptive Support in COVID-19 Misinformation on Twitter. ACM J. Data Inf. Qual. 15(1): 9:1-9:26 (2023) - [j18]Hossein Shirazi, Shashika Ranga Muramudalige, Indrakshi Ray, Anura P. Jayasumana, Haonan Wang:
Adversarial Autoencoder Data Synthesis for Enhancing Machine Learning-Based Phishing Detection Algorithms. IEEE Trans. Serv. Comput. 16(4): 2411-2422 (2023) - [c23]Matt Gorbett, Hossein Shirazi, Indrakshi Ray:
Cross-Silo Federated Learning Across Divergent Domains with Iterative Parameter Alignment. IEEE Big Data 2023: 5233-5242 - [c22]Eric Burton Samuel Martin, Hossein Shirazi, Indrakshi Ray:
Poster: Towards a Dataset for the Discrimination between Warranted and Unwarranted Emails. CCS 2023: 3603-3605 - [c21]Matt Gorbett, Hossein Shirazi, Indrakshi Ray:
Sparse Binary Transformers for Multivariate Time Series Modeling. KDD 2023: 544-556 - [c20]Mahmoud Abdelgawad, Indrakshi Ray, Saja Alqurashi, Videep Venkatesha, Hossein Shirazi:
Synthesizing and Analyzing Attribute-Based Access Control Model Generated from Natural Language Policy Statements. SACMAT 2023: 91-98 - [c19]Asif Uz Zaman Asif, Hossein Shirazi, Indrakshi Ray:
Machine Learning-Based Phishing Detection Using URL Features: A Comprehensive Review. SSS 2023: 481-497 - [c18]Noushin Salek Faramarzi, Fateme Hashemi Chaleshtori, Hossein Shirazi, Indrakshi Ray, Ritwik Banerjee:
Claim Extraction and Dynamic Stance Detection in COVID-19 Tweets. WWW (Companion Volume) 2023: 1059-1068 - [i4]Matt Gorbett, Hossein Shirazi, Indrakshi Ray:
Sparse Binary Transformers for Multivariate Time Series Modeling. CoRR abs/2308.04637 (2023) - [i3]Matt Gorbett, Hossein Shirazi, Indrakshi Ray:
Cross-Silo Federated Learning Across Divergent Domains with Iterative Parameter Alignment. CoRR abs/2311.04818 (2023) - 2022
- [j17]Ehsan Farzadnia, Hossein Shirazi, Alireza Nowroozi:
Corrigendum to 'A novel sophisticated hybrid method for intrusion detection using the artificial immune system': Journal of Information Security and Applications Volume 58, May 2021, 102721. J. Inf. Secur. Appl. 70: 103349 (2022) - [j16]Hossein Shirazi, Katherine Haynes, Indrakshi Ray:
Towards Performance of NLP Transformers on URL-Based Phishing Detection for Mobile Devices. J. Ubiquitous Syst. Pervasive Networks 17(1): 35-42 (2022) - [c17]Hossein Shirazi, William Pickard, Indrakshi Ray, Haonan Wang:
Towards Resiliency of Heavy Vehicles through Compromised Sensor Data Reconstruction. CODASPY 2022: 276-287 - [c16]Matt Gorbett, Hossein Shirazi, Indrakshi Ray:
Local Intrinsic Dimensionality of IoT Networks for Unsupervised Intrusion Detection. DBSec 2022: 143-161 - [c15]Matt Gorbett, Hossein Shirazi, Indrakshi Ray:
WiP: The Intrinsic Dimensionality of IoT Networks. SACMAT 2022: 245-250 - 2021
- [j15]Hossein Shirazi, Reza Kia, Peiman Ghasemi:
A stochastic bi-objective simulation-optimization model for plasma supply chain in case of COVID-19 outbreak. Appl. Soft Comput. 112: 107725 (2021) - [j14]Ehsan Farzadnia, Hossein Shirazi, Alireza Nowroozi:
A New Intrusion Detection System Using the Improved Dendritic Cell Algorithm. Comput. J. 64(8): 1193-1214 (2021) - [j13]Ehsan Farzadnia, Hossein Shirazi, Alireza Nowroozi:
A novel sophisticated hybrid method for intrusion detection using the artificial immune system. J. Inf. Secur. Appl. 58: 102721 (2021) - [j12]Hossein Shirazi, Bruhadeshwar Bezawada, Indrakshi Ray, Chuck Anderson:
Directed adversarial sampling attacks on phishing detection. J. Comput. Secur. 29(1): 1-23 (2021) - [j11]Zohre Moteshakker Arani, Ahmad Abdollahzadeh Barforoush, Hossein Shirazi:
Representing unstructured text semantics for reasoning purpose. J. Intell. Inf. Syst. 56(2): 303-325 (2021) - [c14]Katherine Haynes, Hossein Shirazi, Indrakshi Ray:
Lightweight URL-based phishing detection using natural language processing transformers for mobile devices. FNC/MobiSPC 2021: 127-134 - [c13]Saja Alqurashi, Hossein Shirazi, Indrakshi Ray:
On the Performance of Isolation Forest and Multi Layer Perceptron for Anomaly Detection in Industrial Control Systems Networks. IOTSMS 2021: 1-6 - 2020
- [c12]Hossein Shirazi, Landon Zweigle, Indrakshi Ray:
A Machine-learning based Unbiased Phishing Detection Approach. ICETE (2) 2020: 423-430 - [c11]Hossein Shirazi, Shashika Ranga Muramudalige, Indrakshi Ray, Anura P. Jayasumana:
Improved Phishing Detection Algorithms using Adversarial Autoencoder Synthesized Data. LCN 2020: 24-32 - [i2]Ehsan Farzadnia, Hossein Shirazi, Alireza Nowroozi:
A New Intrusion Detection System using the Improved Dendritic Cell Algorithm. CoRR abs/2004.09274 (2020)
2010 – 2019
- 2019
- [c10]Hossein Shirazi, Bruhadeshwar Bezawada, Indrakshi Ray, Charles Anderson:
Adversarial Sampling Attacks Against Phishing Detection. DBSec 2019: 83-101 - [c9]Hossein Shirazi, Indrakshi Ray, Charles Anderson:
Using Machine Learning to Detect Anomalies in Embedded Networks in Heavy Vehicles. FPS 2019: 39-55 - 2018
- [j10]Hojjat Emami, Hossein Shirazi, Ahmad Abdollahzadeh Barforoush:
Web Person Name Disambiguation Using Social Links and Enriched Profile Information. Comput. Informatics 37(6): 1485-1515 (2018) - [j9]Hossein Shirazi, Kyle Haefner, Indrakshi Ray:
Improving Auto-Detection of Phishing Websites using Fresh-Phish Framework. Int. J. Multim. Data Eng. Manag. 9(1): 51-64 (2018) - [j8]Sina Dami, Ahmad Abdollahzadeh Barforoush, Hossein Shirazi:
News events prediction using Markov logic networks. J. Inf. Sci. 44(1): 91-109 (2018) - [j7]Afshin Rezakhani, Hossein Shirazi, Nasser Modiri:
A novel multilayer AAA model for integrated applications. Neural Comput. Appl. 29(10): 887-901 (2018) - [c8]Bruhadeshwar Bezawada, Maalvika Bachani, Jordan Peterson, Hossein Shirazi, Indrakshi Ray, Indrajit Ray:
Behavioral Fingerprinting of IoT Devices. ASHES@CCS 2018: 41-50 - [c7]Hossein Shirazi, Bruhadeshwar Bezawada, Indrakshi Ray:
"Kn0w Thy Doma1n Name": Unbiased Phishing Detection Using Domain Name Based Features. SACMAT 2018: 69-75 - [i1]Bruhadeshwar Bezawada, Maalvika Bachani, Jordan Peterson, Hossein Shirazi, Indrakshi Ray, Indrajit Ray:
IoTSense: Behavioral Fingerprinting of IoT Devices. CoRR abs/1804.03852 (2018) - 2017
- [j6]Hojjat Emami, Hossein Shirazi, Ahmad Abdollahzadeh Barforoush:
A semantic approach to cross-document person profiling in Web. AI Commun. 30(6): 363-391 (2017) - [j5]Ahmad Abdollahzadeh Barforoush, Hossein Shirazi, Hojjat Emami:
A New Classification Framework to Evaluate the Entity Profiling on the Web: Past, Present and Future. ACM Comput. Surv. 50(3): 39:1-39:39 (2017) - [c6]Subhojeet Mukherjee, Indrakshi Ray, Indrajit Ray, Hossein Shirazi, Toan Ong, Michael G. Kahn:
Attribute Based Access Control for Healthcare Resources. ABAC@CODASPY 2017: 29-40 - [c5]Hossein Shirazi, Kyle Haefner, Indrakshi Ray:
Fresh-Phish: A Framework for Auto-Detection of Phishing Websites. IRI 2017: 137-143 - 2016
- [j4]Afshin Rezakhani, Hossein Shirazi, Nasser Modiri:
A Novel Access Control Model Based on the Structure of Applications. Int. J. Commun. Networks Inf. Secur. 8(2) (2016) - [c4]Subhojeet Mukherjee, Hossein Shirazi, Indrakshi Ray, Jeremy Daily, Rose F. Gamble:
Practical DoS Attacks on Embedded Networks in Commercial Vehicles. ICISS 2016: 23-42 - 2015
- [j3]Babak Darvish Rouhani, Mohd Naz'ri Mahrin, Hossein Shirazi, Fatemeh Nikpay, Bita Darvish Rouhani:
An Effectiveness Model for Enterprise Architecture Methodologies. Int. J. Enterp. Inf. Syst. 11(2): 50-64 (2015) - 2011
- [j2]Ali Shemshadi, Hossein Shirazi, Mehran Toreihi, Mohammad J. Tarokh:
A fuzzy VIKOR method for supplier selection based on entropy measure for objective weighting. Expert Syst. Appl. 38(10): 12160-12167 (2011)
2000 – 2009
- 2009
- [j1]Rodrigo Martínez-Béjar, José Manuel Cadenas, Hossein Shirazi, Paul Compton:
A semantics-driven, fuzzy logic-based approach to knowledge representation and inference. Expert Syst. Appl. 36(2): 1940-1960 (2009) - [c3]Hamed Salehi, Hossein Shirazi, Reza Askari Moghadam:
Increasing Overall Network Security by Integrating Signature-Based NIDS with Packet Filtering Firewall. JCAI 2009: 357-362 - [c2]H. B. Harchegani, A. Farahi, Hossein Shirazi, A. Golabpour, Peyman Almasinejad:
Using Genetic Algorithm for Prediction of Information for Cache Operation in ?Mobile Database. WKDD 2009: 148-151 - 2008
- [c1]Mohammad Ali Hadavi, Hossein Shirazi, Hasan Mokhtari Sangchi, Vahid Saber Hamishagi:
Software Security; A Vulnerability Activity Revisit. ARES 2008: 866-872
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-08-25 19:08 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint