To combat multi-class imbalanced problems by means of over-sampling techniques L Abdi, S Hashemi IEEE Transactions on Knowledge and Data Engineering 28 (1), 238-251, 2016 | 378 | 2016 |
Malware detection based on mining API calls A Sami, B Yadegari, H Rahimi, N Peiravian, S Hashemi, A Hamze Proceedings of the 2010 ACM Symposium on Applied Computing, 1020-1025, 2010 | 257 | 2010 |
Know abnormal, find evil: frequent pattern mining for ransomware threat hunting and intelligence S Homayoun, A Dehghantanha, M Ahmadzadeh, S Hashemi, R Khayami IEEE transactions on emerging topics in computing 8 (2), 341-351, 2017 | 213 | 2017 |
Two-tier network anomaly detection model: a machine learning approach HH Pajouh, GH Dastghaibyfard, S Hashemi Journal of Intelligent Information Systems 48, 61-74, 2017 | 181 | 2017 |
Visual domain adaptation via transfer feature learning J Tahmoresnezhad, S Hashemi Knowledge and information systems 50, 585-605, 2017 | 173 | 2017 |
DRTHIS: Deep ransomware threat hunting and intelligence system at the fog layer S Homayoun, A Dehghantanha, M Ahmadzadeh, S Hashemi, R Khayami, ... Future Generation Computer Systems 90, 94-104, 2019 | 157 | 2019 |
A Hybrid clustering and classification technique for forecasting short‐term energy consumption M Torabi, S Hashemi, MR Saybani, S Shamshirband, A Mosavi Environmental Progress & Sustainable Energy 38 (1), 66-76, 2019 | 140 | 2019 |
Adapted one-versus-all decision trees for data stream classification S Hashemi, Y Yang, Z Mirzamomen, M Kangavari IEEE Transactions on Knowledge and Data Engineering 21 (5), 624-637, 2008 | 132 | 2008 |
Detecting cryptomining malware: a deep learning approach for static and dynamic analysis H Darabian, S Homayounoot, A Dehghantanha, S Hashemi, H Karimipour, ... Journal of Grid Computing 18, 293-303, 2020 | 114 | 2020 |
An improved two-hidden-layer extreme learning machine for malware hunting AN Jahromi, S Hashemi, A Dehghantanha, KKR Choo, H Karimipour, ... Computers & Security 89, 101655, 2020 | 109 | 2020 |
An opcode‐based technique for polymorphic Internet of Things malware detection H Darabian, A Dehghantanha, S Hashemi, S Homayoun, KKR Choo Concurrency and Computation: Practice and Experience 32 (6), e5173, 2020 | 104 | 2020 |
Graph embedding as a new approach for unknown malware detection H Hashemi, A Azmoodeh, A Hamzeh, S Hashemi Journal of Computer Virology and Hacking Techniques 13, 153-166, 2017 | 104 | 2017 |
BoTShark: A deep learning approach for botnet traffic detection S Homayoun, M Ahmadzadeh, S Hashemi, A Dehghantanha, R Khayami Cyber Threat Intelligence, 137-153, 2018 | 98 | 2018 |
A graph mining approach for detecting unknown malwares M Eskandari, S Hashemi Journal of Visual Languages & Computing 23 (3), 154-162, 2012 | 95 | 2012 |
A novel electrical net-load forecasting model based on deep neural networks and wavelet transform integration M Alipour, J Aghaei, M Norouzi, T Niknam, S Hashemi, M Lehtonen Energy 205, 118106, 2020 | 90 | 2020 |
DBFS: An effective Density Based Feature Selection scheme for small sample size and high dimensional imbalanced data sets M Alibeigi, S Hashemi, A Hamzeh Data & Knowledge Engineering 81, 67-103, 2012 | 89 | 2012 |
Towards a variable size sliding window model for frequent itemset mining over data streams M Deypir, MH Sadreddini, S Hashemi Computers & Industrial Engineering 63 (1), 161-172, 2012 | 88 | 2012 |
An enhanced stacked LSTM method with no random initialization for malware threat hunting in safety and time-critical systems AN Jahromi, S Hashemi, A Dehghantanha, RM Parizi, KKR Choo IEEE Transactions on Emerging Topics in Computational Intelligence, 2020 | 85 | 2020 |
Flexible decision tree for data stream classification in the presence of concept change, noise and missing values S Hashemi, Y Yang Data Mining and Knowledge Discovery 19, 95-131, 2009 | 83 | 2009 |
HDM-Analyser: a hybrid analysis approach based on data mining techniques for malware detection M Eskandari, Z Khorshidpour, S Hashemi Journal of Computer Virology and Hacking Techniques 9, 77-93, 2013 | 80 | 2013 |