default search action
Ashkan Sami
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j27]Chafika Benzaïd, Tarik Taleb, Ashkan Sami, Othmane Hireche:
FortisEDoS: A Deep Transfer Learning-Empowered Economical Denial of Sustainability Detection Framework for Cloud-Native Network Slicing. IEEE Trans. Dependable Secur. Comput. 21(4): 2818-2835 (2024) - [c20]Jasmin Jahic, Ashkan Sami:
State of Practice: LLMs in Software Engineering and Software Architecture. ICSA-C 2024: 311-318 - [c19]Peter J. Barclay, Ashkan Sami:
Investigating Markers and Drivers of Gender Bias in Machine Translations. SANER 2024: 455-464 - [i8]Peter J. Barclay, Ashkan Sami:
Investigating Markers and Drivers of Gender Bias in Machine Translations. CoRR abs/2403.11896 (2024) - [i7]Shima Esfandiari, Ashkan Sami:
An Exploratory Study of the Relationship between SATD and Other Software Development Activities. CoRR abs/2404.01950 (2024) - [i6]Ali Jamali, Azadeh Nazemi, Ashkan Sami, Rosemina Bahrololoom, Shahram Paydar, Alireza Shakibafar:
Decision Support System to triage of liver trauma. CoRR abs/2408.02012 (2024) - 2023
- [j26]Seyed Ali Reza Moezzi, Abdolrahman Ghaedi, Mojdeh Rahmanian, Seyedeh Zahra Mousavi, Ashkan Sami:
Application of Deep Learning in Generating Structured Radiology Reports: A Transformer-Based Technique. J. Digit. Imaging 36(1): 80-90 (2023) - [j25]Elham Feizpour, Hooman Tahayori, Ashkan Sami:
CoBRA without experts: New paradigm for software development effort estimation using COCOMO metrics. J. Softw. Evol. Process. 35(12) (2023) - [c18]Chafika Benzaïd, Tarik Taleb, Ashkan Sami, Othmane Hireche:
A Deep Transfer Learning-Powered EDoS Detection Mechanism for 5G and Beyond Network Slicing. GLOBECOM 2023: 4747-4753 - [c17]Mansour Sami, Ashkan Sami, Peter J. Barclay:
A case study of fairness in generated images of Large Language Models for Software Engineering tasks. ICSME 2023: 391-396 - 2022
- [j24]Neda Azouji, Ashkan Sami, Mohammad Taheri:
EfficientMask-Net for face authentication in the era of COVID-19 pandemic. Signal Image Video Process. 16(7): 1991-1999 (2022) - [j23]Zahra Sadat Khalafi, Maryam Dehghani, Abdullah Khalili, Ashkan Sami, Navid Vafamand, Tomislav Dragicevic:
Intrusion Detection, Measurement Correction, and Attack Localization of PMU Networks. IEEE Trans. Ind. Electron. 69(5): 4697-4706 (2022) - [j22]Morteza Verdi, Ashkan Sami, Jafar Akhondali, Foutse Khomh, Gias Uddin, Alireza Karami Motlagh:
An Empirical Study of C++ Vulnerabilities in Crowd-Sourced Code Examples. IEEE Trans. Software Eng. 48(5): 1497-1514 (2022) - [c16]Fatemeh Khoshnoud, Ali Rezaei Nasab, Zahra Toudeji, Ashkan Sami:
Which bugs are missed in code reviews: An empirical study on SmartSHARK dataset. MSR 2022: 1-5 - [i5]Fatemeh Khoshnoud, Ali Rezaei Nasab, Zahra Toudeji, Ashkan Sami:
Which bugs are missed in code reviews: An empirical study on SmartSHARK dataset. CoRR abs/2205.09428 (2022) - [i4]Seyed Ali Reza Moezzi, Abdolrahman Ghaedi, Mojdeh Rahmanian, Seyedeh Zahra Mousavi, Ashkan Sami:
Application of Deep Learning in Generating Structured Radiology Reports: A Transformer-Based Technique. CoRR abs/2209.12177 (2022) - 2021
- [j21]Neda Azouji, Ashkan Sami, Mohammad Taheri, Henning Müller:
A large margin piecewise linear classifier with fusion of deep features in the diagnosis of COVID-19. Comput. Biol. Medicine 139: 104927 (2021) - [j20]Amir Hossein Arshia, Shayan Shadravan, Aida Solhjoo, Amirhossein Sakhteman, Ashkan Sami:
De novo design of novel protease inhibitor candidates in the treatment of SARS-CoV-2 using deep learning, docking, and molecular dynamic simulations. Comput. Biol. Medicine 139: 104967 (2021) - [j19]Ali Reza Honarvar, Ashkan Sami:
Particular matter prediction using synergy of multiple source urban big data in smart cities. Intell. Decis. Technol. 15(3): 371-385 (2021) - [j18]Mohammad Sadegh Bashkari, Ashkan Sami, Mohammad Rastegar:
Outage Cause Detection in Power Distribution Systems Based on Data Mining. IEEE Trans. Ind. Informatics 17(1): 640-649 (2021) - [c15]Mohamad Yazdaninia, David Lo, Ashkan Sami:
Characterization and Prediction of Questions without Accepted Answers on Stack Overflow. ICPC 2021: 59-70 - [c14]Mahshid Naghashzadeh, Amir Haghshenas, Ashkan Sami, David Lo:
How Do Users Answer MATLAB Questions on Q&A Sites? A Case Study on Stack Overflow and MathWorks. SANER 2021: 526-530 - [i3]Mohamad Yazdaninia, David Lo, Ashkan Sami:
Characterization and Prediction of Questions without Accepted Answers on Stack Overflow. CoRR abs/2103.11386 (2021) - [i2]Iren Mazloomzadeh, Gias Udin, Foutse Khomh, Ashkan Sami:
Reputation Gaming in Stack Overflow. CoRR abs/2111.07101 (2021) - 2020
- [c13]Ehsan Firouzi, Ashkan Sami, Foutse Khomh, Gias Uddin:
On the use of C# Unsafe Code Context: An Empirical Study of Stack Overflow. ESEM 2020: 39:1-39:6
2010 – 2019
- 2019
- [j17]Ali Reza Honarvar, Ashkan Sami:
Towards Sustainable Smart City by Particulate Matter Prediction Using Urban Big Data, Excluding Expensive Air Pollution Infrastructures. Big Data Res. 17: 56-65 (2019) - [i1]Morteza Verdi, Ashkan Sami, Jafar Akhondali, Foutse Khomh, Gias Uddin, Alireza Karami Motlagh:
An Empirical Study of C++ Vulnerabilities in Crowd-Sourced Code Examples. CoRR abs/1910.01321 (2019) - 2018
- [j16]Abdullah Khalili, Ashkan Sami, Amin Khozaei, Saber Pouresmaeeli:
SIDS: State-based intrusion detection for stage-based cyber physical systems. Int. J. Crit. Infrastructure Prot. 22: 113-124 (2018) - [c12]Alireza Joonbakhsh, Ashkan Sami:
Mining and extraction of personal software process measures through IDE interaction logs. MSR 2018: 78-81 - 2017
- [j15]Zahra Salehi, Ashkan Sami, Mahboobe Ghiasi:
MAAR: Robust features to detect malicious activity based on API calls, their arguments and return values. Eng. Appl. Artif. Intell. 59: 93-102 (2017) - [j14]Mostafa Mohammadpourfard, Ashkan Sami, Ali Reza Seifi:
A statistical unsupervised method against false data injection attacks: A visualization-based approach. Expert Syst. Appl. 84: 242-261 (2017) - 2016
- [j13]Abdullah Khalili, Ashkan Sami, Mahdi Azimi, Sara Moshtari, Zahra Salehi, Mahboobe Ghiasi, Ali Akbar Safavi:
Employing secure coding practices into industrial applications: a case study. Empir. Softw. Eng. 21(1): 4-16 (2016) - [j12]Ali Reza Honarvar, Ashkan Sami:
Extracting Usage Patterns from Power Usage Data of Homes' Appliances in Smart Home using Big Data Platform. Int. J. Inf. Technol. Web Eng. 11(2): 39-50 (2016) - [j11]Hosein Rahmani, Ashkan Sami, Abdullah Khalili:
CIP-UQIM: A unified model for quality improvement in software SME's based on CMMI level 2 and 3. Inf. Softw. Technol. 71: 27-57 (2016) - [c11]Ali Reza Honarvar, Ashkan Sami:
Extracting Usage Patterns from Power Usage Data of Homes' Appliances in Smart Home using Big Data Platform. IoTBD 2016: 172-178 - [c10]Sara Moshtari, Ashkan Sami:
Evaluating and comparing complexity, coupling and a new proposed set of coupling metrics in cross-project vulnerability prediction. SAC 2016: 1415-1421 - 2015
- [j10]Mahboobe Ghiasi, Ashkan Sami, Zahra Salehi:
Dynamic VSA: a framework for malware detection based on register contents. Eng. Appl. Artif. Intell. 44: 111-122 (2015) - [j9]Hedayatollah Dallaki, Kimia Bazargan Lari, Ali Hamzeh, Sattar Hashemi, Ashkan Sami:
Scaling up the hybrid Particle Swarm Optimization algorithm for nominal data-sets. Intell. Data Anal. 19(4): 825-844 (2015) - [j8]Armin Daneshpazhouh, Ashkan Sami:
Semi-Supervised Outlier Detection with Only Positive and Unlabeled Data Based on Fuzzy Clustering. Int. J. Artif. Intell. Tools 24(3): 1550003:1-1550003:16 (2015) - [j7]Fatemeh Kargarfard, Ashkan Sami, Esmaeil Ebrahimie:
Knowledge discovery and sequence-based prediction of pandemic influenza using an integrated classification and association rule mining (CBA) algorithm. J. Biomed. Informatics 57: 181-188 (2015) - [j6]Masoud Narouei, Mansour Ahmadi, Ashkan Sami:
SePaS: Word sense disambiguation by sequential patterns in sentences. Nat. Lang. Eng. 21(2): 251-269 (2015) - [j5]Masoud Narouei, Mansour Ahmadi, Giorgio Giacinto, Hassan Takabi, Ashkan Sami:
DLLMiner: structural mining for malware detection. Secur. Commun. Networks 8(18): 3311-3322 (2015) - 2014
- [j4]Armin Daneshpazhouh, Ashkan Sami:
Entropy-based outlier detection using semi-supervised approach with few positive examples. Pattern Recognit. Lett. 49: 77-84 (2014) - [c9]Abdullah Khalili, Ashkan Sami, Mahboobeh Ghiasi, Sara Moshtari, Zahra Salehi, Mahdi Azimi:
Software engineering issues regarding securing ICS: an industrial case study. MoSEMInA 2014: 1-6 - [c8]Mahdi Azimi, Ashkan Sami, Abdullah Khalili:
A security test-bed for industrial control systems. MoSEMInA 2014: 26-31 - [c7]Ali Reza Honarvar, Ashkan Sami:
CBR Clone Based Software Flaw Detection Issues. SIN 2014: 487 - 2013
- [j3]Mahboobe Ghiasi, Ashkan Sami, Zahra Salehi:
DyVSoR: dynamic malware detection based on extracting patterns from value sets of registers. ISC Int. J. Inf. Secur. 5(1): 71-82 (2013) - 2010
- [c6]Ashkan Sami, Babak Yadegari, Hossein Rahimi, Naser Peiravian, Sattar Hashemi, Ali Hamzeh:
Malware detection based on mining API calls. SAC 2010: 1020-1025 - [c5]Ashkan Sami, Seyed Mostafa Fakhrahmad:
Design-level metrics estimation based on code metrics. SAC 2010: 2531-2535
2000 – 2009
- 2009
- [j2]Ali Hamzeh, Sattar Hashemi, Ashkan Sami, Adel Rahmani:
A Recursive Classifier System for Partially Observable Environments. Fundam. Informaticae 97(1-2): 15-40 (2009) - [j1]Mohsen Rahmani, Sattar Hashemi, Ali Hamzeh, Ashkan Sami:
Agent Based Decision Tree Learning: a Novel Approach. Int. J. Softw. Eng. Knowl. Eng. 19(7): 1015-1022 (2009) - 2008
- [c4]Ashkan Sami, Ryoichi Nagatomi, Masahiro Terabe, Kazuo Hashimoto:
Design of Physical Activity Recommendation System. IADIS European Conf. Data Mining 2008: 148-152 - 2006
- [c3]Ashkan Sami:
Obstacles and Misunderstandings Facing Medical Data Mining. ADMA 2006: 856-863 - [c2]Ashkan Sami, Ryoichi Nagatomi, Makoto Takahashi, Takeshi Tokuyama:
OSDM: Optimized Shape Distribution Method. ADMA 2006: 1057-1064 - [c1]Ashkan Sami, Ryoichi Nagatomi, Makoto Takahashi, Takeshi Tokuyama:
SDI: Shape Distribution Indicator and Its Application to Find Interrelationships Between Physical Activity Tests and Other Medical Measures. Australian Conference on Artificial Intelligence 2006: 383-392
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 21:22 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint