BibTeX records: Zeinab Khorshidpour

download as .bib file

@article{DBLP:journals/mlc/KhorshidpourTHH18,
  author       = {Zeinab Khorshidpour and
                  Jafar Tahmoresnezhad and
                  Sattar Hashemi and
                  Ali Hamzeh},
  title        = {Domain invariant feature extraction against evasion attack},
  journal      = {Int. J. Mach. Learn. Cybern.},
  volume       = {9},
  number       = {12},
  pages        = {2093--2104},
  year         = {2018},
  url          = {https://doi.org/10.1007/s13042-017-0692-6},
  doi          = {10.1007/S13042-017-0692-6},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/mlc/KhorshidpourTHH18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/apin/KhorshidpourHH17,
  author       = {Zeinab Khorshidpour and
                  Sattar Hashemi and
                  Ali Hamzeh},
  title        = {Evaluation of random forest classifier in security domain},
  journal      = {Appl. Intell.},
  volume       = {47},
  number       = {2},
  pages        = {558--569},
  year         = {2017},
  url          = {https://doi.org/10.1007/s10489-017-0907-2},
  doi          = {10.1007/S10489-017-0907-2},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/apin/KhorshidpourHH17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdmmm/KhorshidpourTHH17,
  author       = {Zeinab Khorshidpour and
                  Jafar Tahmoresnezhad and
                  Sattar Hashemi and
                  Ali Hamzeh},
  title        = {Using domain adaptation in adversarial environment},
  journal      = {Int. J. Data Min. Model. Manag.},
  volume       = {9},
  number       = {3},
  pages        = {201--219},
  year         = {2017},
  url          = {https://doi.org/10.1504/IJDMMM.2017.10007685},
  doi          = {10.1504/IJDMMM.2017.10007685},
  timestamp    = {Thu, 30 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijdmmm/KhorshidpourTHH17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icdm/KhorshidpourHH16,
  author       = {Zeinab Khorshidpour and
                  Sattar Hashemi and
                  Ali Hamzeh},
  editor       = {Carlotta Domeniconi and
                  Francesco Gullo and
                  Francesco Bonchi and
                  Josep Domingo{-}Ferrer and
                  Ricardo Baeza{-}Yates and
                  Zhi{-}Hua Zhou and
                  Xindong Wu},
  title        = {Learning a Secure Classifier against Evasion Attack},
  booktitle    = {{IEEE} International Conference on Data Mining Workshops, {ICDM} Workshops
                  2016, December 12-15, 2016, Barcelona, Spain},
  pages        = {295--302},
  publisher    = {{IEEE} Computer Society},
  year         = {2016},
  url          = {https://doi.org/10.1109/ICDMW.2016.0049},
  doi          = {10.1109/ICDMW.2016.0049},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icdm/KhorshidpourHH16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/virology/EskandariKH13,
  author       = {Mojtaba Eskandari and
                  Zeinab Khorshidpour and
                  Sattar Hashemi},
  title        = {HDM-Analyser: a hybrid analysis approach based on data mining techniques
                  for malware detection},
  journal      = {J. Comput. Virol. Hacking Tech.},
  volume       = {9},
  number       = {2},
  pages        = {77--93},
  year         = {2013},
  url          = {https://doi.org/10.1007/s11416-013-0181-8},
  doi          = {10.1007/S11416-013-0181-8},
  timestamp    = {Fri, 13 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/virology/EskandariKH13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eisic/EskandariKH12,
  author       = {Mojtaba Eskandari and
                  Zeinab Khorshidpour and
                  Sattar Hashemi},
  editor       = {Nasrullah Memon and
                  Daniel Zeng},
  title        = {To Incorporate Sequential Dynamic Features in Malware Detection Engines},
  booktitle    = {2012 European Intelligence and Security Informatics Conference, {EISIC}
                  2012, Odense, Denmark, August 22-24, 2012},
  pages        = {46--52},
  publisher    = {{IEEE} Computer Society},
  year         = {2012},
  url          = {https://doi.org/10.1109/EISIC.2012.57},
  doi          = {10.1109/EISIC.2012.57},
  timestamp    = {Tue, 16 May 2023 16:54:39 +0200},
  biburl       = {https://dblp.org/rec/conf/eisic/EskandariKH12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijis/KhorshidpourHH11,
  author       = {Zeinab Khorshidpour and
                  Sattar Hashemi and
                  Ali Hamzeh},
  title        = {{CBDL:} Context-based distance learning for categorical attributes},
  journal      = {Int. J. Intell. Syst.},
  volume       = {26},
  number       = {11},
  pages        = {1076--1100},
  year         = {2011},
  url          = {https://doi.org/10.1002/int.20499},
  doi          = {10.1002/INT.20499},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijis/KhorshidpourHH11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics