Saeed Jalili

Orcid: 0000-0002-4333-3097

According to our database1, Saeed Jalili authored at least 74 papers between 2005 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
FrMi: Fault-revealing Mutant Identification using killability severity.
Inf. Softw. Technol., December, 2023

Decentralized control architecture for multi-authoring microgrids.
Computing, December, 2023

Secured location-aware mobility-enabled RPL.
J. Netw. Comput. Appl., 2023

2021
Efficient Distributed k-Clique Mining for Large Networks Using MapReduce.
IEEE Trans. Knowl. Data Eng., 2021

File Fragment Type Classification by Bag-Of-Visual-Words.
ISC Int. J. Inf. Secur., 2021

Aspects Extraction for Aspect Level Opinion Analysis Based on Deep CNN.
Proceedings of the 26th International Computer Conference, Computer Society of Iran, 2021

2020
Effective defense against fingerprinting attack based on autocorrelation property minimization approach.
J. Intell. Inf. Syst., 2020

2019
On the computational power of the light: A plan for breaking data encryption standard.
Theor. Comput. Sci., 2019

Adaptive three-phase support vector data description.
Pattern Anal. Appl., 2019

Online Tor Privacy Breach Through Website Fingerprinting Attack.
J. Netw. Syst. Manag., 2019

Voxel selection framework based on meta-heuristic search and mutual information for brain decoding.
Int. J. Imaging Syst. Technol., 2019

2018
Disease genes prediction by HMM based PU-learning using gene expression profiles.
J. Biomed. Informatics, 2018

C-PUGP: A cluster-based positive unlabeled learning method for disease gene prediction and prioritization.
Comput. Biol. Chem., 2018

Multi-kernel one class link prediction in heterogeneous complex networks.
Appl. Intell., 2018

2017
Fine granular proximity breach prevention during numerical data anonymization.
Trans. Data Priv., 2017

PbMMD: A novel policy based multi-process malware detection.
Eng. Appl. Artif. Intell., 2017

TBM, a transformation based method for microaggregation of large volume mixed data.
Data Min. Knowl. Discov., 2017

2016
A multilayered approach for link prediction in heterogeneous complex networks.
J. Comput. Sci., 2016

Single-pass and linear-time k-means clustering based on MapReduce.
Inf. Syst., 2016

Towards modeling and runtime verification of self-organizing systems.
Expert Syst. Appl., 2016

Enhancing aggregation phase of microaggregation methods for interval disclosure risk minimization.
Data Min. Knowl. Discov., 2016

A novel passive website fingerprinting attack on tor using fast fourier transform.
Comput. Commun., 2016

2015
High-performance parallel frequent subgraph discovery.
J. Supercomput., 2015

Fast Parallel All-Subgraph Enumeration Using Multicore Machines.
Sci. Program., 2015

Least squares twin multi-class classification support vector machine.
Pattern Recognit., 2015

Computation with optical sensitive sheets.
Nat. Comput., 2015

Automated software design using ant colony optimization with semantic network support.
J. Syst. Softw., 2015

A novel local search method for microaggregation.
ISC Int. J. Inf. Secur., 2015

CCIC: Clustering analysis classes to identify software components.
Inf. Softw. Technol., 2015

Preference-based anonymization of numerical datasets by multi-objective microaggregation.
Inf. Fusion, 2015

Routing anomaly detection in OLSR-based MANETs.
Int. J. Mob. Commun., 2015

Distributed discovery of frequent subgraphs of a network using MapReduce.
Computing, 2015

Image preprocessing with a parallel optoelectronic processor.
Comput. Electr. Eng., 2015

CAMWI: Detecting protein complexes using weighted clustering coefficient and weighted density.
Comput. Biol. Chem., 2015

Source code and design conformance, design pattern detection from source code by classification approach.
Appl. Soft Comput., 2015

2014
Fast data-oriented microaggregation algorithm for large numerical datasets.
Knowl. Based Syst., 2014

A clustering-based model for class responsibility assignment problem in object-oriented analysis.
J. Syst. Softw., 2014

An evolutionary approach to identify logical components.
J. Syst. Softw., 2014

Iterative constraint satisfaction method for microaggregation problem.
Proceedings of the 11th International ISC Conference on Information Security and Cryptology, 2014

2013
RANGI: A Fast List-Colored Graph Motif Finding Algorithm.
IEEE ACM Trans. Comput. Biol. Bioinform., 2013

SCI-GA: Software Component Identification using Genetic Algorithm.
J. Object Technol., 2013

An OpticalWavelength-Based Computational Machine.
Int. J. Unconv. Comput., 2013

Protein fold recognition with a two-layer method based on SVM-SA, WP-NN and C4.5 (TLM-SNC).
Int. J. Data Min. Bioinform., 2013

Fusion of one-class classifiers for protocol-based anomaly detection in AODV-based mobile ad hoc networks.
Int. J. Ad Hoc Ubiquitous Comput., 2013

A new light-based solution to the Hamiltonian path problem.
Future Gener. Comput. Syst., 2013

Multivariate microaggregation by iterative optimization.
Appl. Intell., 2013

Dynamic clustering using combinatorial particle swarm optimization.
Appl. Intell., 2013

2012
An optical solution to the 3-SAT problem using wavelength based selectors.
J. Supercomput., 2012

WSCMon: runtime monitoring of web service orchestration based on refinement checking.
Serv. Oriented Comput. Appl., 2012

Formal modeling of evolving self-adaptive systems.
Sci. Comput. Program., 2012

PSSP with dynamic weighted kernel fusion based on SVM-PHGS.
Knowl. Based Syst., 2012

HPobSAM for modeling and analyzing IT Ecosystems - Through a case study.
J. Syst. Softw., 2012

Design patterns selection: An automatic two-phase method.
J. Syst. Softw., 2012

Protein secondary structure prediction using DWKF based on SVR-NSGAII.
Neurocomputing, 2012

An Optical Polynomial Time Solution for the Satisfiability Problem.
Proceedings of the Optical Supercomputing - 4th International Workshop, 2012

VoIP anomaly detection by combining OCSVM and PSO algorithm.
Proceedings of the 6th International Symposium on Telecommunications, 2012

Anomaly detection based on an enhanced projection distance.
Proceedings of the 6th International Symposium on Telecommunications, 2012

2011
A hybrid model for correlating alerts of known and unknown attack scenarios and updating attack graphs.
Comput. Networks, 2011

2010
Identification of System Software Components Using Clustering Approach.
J. Object Technol., 2010

A particle swarm optimization algorithm for minimization analysis of cost-sensitive attack graphs.
ISC Int. J. Inf. Secur., 2010

Formal analysis of policy-based self-adaptive systems.
Proceedings of the 2010 ACM Symposium on Applied Computing (SAC), 2010

Optical Graph 3-Colorability.
Proceedings of the Optical Supercomputing - Third International Workshop, 2010

2009
PobSAM: Policy-based Managing of Actors in Self-Adaptive Systems.
Proceedings of the 6th International Workshop on Formal Aspects of Component Software, 2009

Verification of Distributed Firewalls Configuration vs. Security Policies Using <i>A</i><i>L</i><i>C</i><i>Q</i><i>I</i>(<i>d</i>).
Appl. Artif. Intell., 2009

An Optical Wavelength-Based Solution to the 3-SAT Problem.
Proceedings of the Optical SuperComputing, Second International Workshop, 2009

A novel quantum-inspired evolutionary algorithm for solving combinatorial optimization problems.
Proceedings of the Genetic and Evolutionary Computation Conference, 2009

Formal Analysis of Smart Home Policies using Compositional Verification.
Proceedings of the Feature Interactions in Software and Communication Systems X, 2009

Correlating Alerts into Compressed Graphs Using an Attribute-Based Method and Time Windows.
Proceedings of the Security Technology, 2009

Monitoring safety properties of composite web services at runtime using CSP.
Proceedings of the Workshops Proceedings of the 12th IEEE International Enterprise Distributed Object Computing Conference, 2009

2008
Minimization Analysis of Network Attack Graphs Using Genetic Algorithms.
Int. J. Comput. Their Appl., 2008

A multi-start quantum-inspired evolutionary algorithm for solving combinatorial optimization problems.
Proceedings of the Genetic and Evolutionary Computation Conference, 2008

2007
RVRTL: Run-Time Verification of Real-Time and Reactive Programs with Real-Time Logic Approach.
Proceedings of the 2007 International Conference on Software Engineering Research & Practice, 2007

RVERL: Run-time Verification of Real-time and Reactive Programs using Event-based Real-Time Logic Approach.
Proceedings of the 5th ACIS International Conference on Software Engineering Research, 2007

2005
AECM: an Aspect Enabled Component Model.
Proceedings of the 12th Asia-Pacific Software Engineering Conference (APSEC 2005), 2005


  Loading...