default search action
Amin Azmoodeh
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j9]Bardia Esmaeili
, Amin Azmoodeh, Ali Dehghantanha
, Gautam Srivastava
, Hadis Karimipour
, Jerry Chun-Wei Lin
:
A GNN-Based Adversarial Internet of Things Malware Detection Framework for Critical Infrastructure: Studying Gafgyt, Mirai, and Tsunami Campaigns. IEEE Internet Things J. 11(16): 26826-26836 (2024) - 2022
- [j8]Bardia Esmaeili
, Amin Azmoodeh, Ali Dehghantanha
, Hadis Karimipour
, Behrouz Zolfaghari
, Mohammad Hammoudeh
:
IIoT Deep Malware Threat Hunting: From Adversarial Example Detection to Adversarial Scenario Detection. IEEE Trans. Ind. Informatics 18(12): 8477-8486 (2022) - [c2]Mohammad Maghsoudimehrabani
, Amin Azmoodeh, Ali Dehghantanha, Behrouz Zolfaghari, Gautam Srivastava:
Proactive Detection of Query-based Adversarial Scenarios in NLP Systems. AISec@CCS 2022: 103-113 - [i2]Amin Azmoodeh, Ali Dehghantanha:
Deep Fake Detection, Deterrence and Response: Challenges and Opportunities. CoRR abs/2211.14667 (2022) - 2021
- [i1]Ali Dehghantanha, Hadis Karimipour, Amin Azmoodeh:
Cybersecurity in Smart Farming: Canada Market Research. CoRR abs/2104.05183 (2021) - 2020
- [j7]Hamed Haddad Pajouh
, Amin Azmoodeh, Ali Dehghantanha
, Reza M. Parizi
:
MVFCC: A Multi-View Fuzzy Consensus Clustering Model for Malware Threat Attribution. IEEE Access 8: 139188-139198 (2020) - [j6]Mahdis Saharkhizan, Amin Azmoodeh, Ali Dehghantanha
, Kim-Kwang Raymond Choo
, Reza M. Parizi
:
An Ensemble of Deep Recurrent Neural Networks for Detecting IoT Cyber Attacks Using Network Traffic. IEEE Internet Things J. 7(9): 8852-8859 (2020) - [j5]Hamid Darabian, Ali Dehghantanha, Sattar Hashemi, Mohammad Taheri
, Amin Azmoodeh, Sajad Homayoun
, Kim-Kwang Raymond Choo
, Reza M. Parizi:
A multiview learning method for malware threat hunting: windows, IoT and android as case studies. World Wide Web 23(2): 1241-1260 (2020) - [p8]Amin Azmoodeh, Ali Dehghantanha
:
Big Data and Privacy: Challenges and Opportunities. Handbook of Big Data Privacy 2020: 1-5 - [p7]Wenyu Han, Amin Azmoodeh, Hadis Karimipour, Simon Yang:
Privacy Preserving Abnormality Detection: A Deep Learning Approach. Handbook of Big Data Privacy 2020: 285-303 - [p6]Mahdis Saharkhizan, Amin Azmoodeh, Hamed HaddadPajouh, Ali Dehghantanha
, Reza M. Parizi, Gautam Srivastava:
A Hybrid Deep Generative Local Metric Learning Method for Intrusion Detection. Handbook of Big Data Privacy 2020: 343-357 - [p5]Mohammad Mehdi BehradFar, Hamed HaddadPajouh, Ali Dehghantanha
, Amin Azmoodeh, Hadis Karimipour, Reza M. Parizi, Gautam Srivastava:
RAT Hunter: Building Robust Models for Detecting Remote Access Trojans Based on Optimum Hybrid Features. Handbook of Big Data Privacy 2020: 371-383 - [p4]Amin Azmoodeh, Ali Dehghantanha
, Reza M. Parizi, Sattar Hashemi, Bahram Gharabaghi
, Gautam Srivastava:
Active Spectral Botnet Detection Based on Eigenvalue Weighting. Handbook of Big Data Privacy 2020: 385-397 - [p3]Reza M. Parizi
, Ali Dehghantanha, Amin Azmoodeh, Kim-Kwang Raymond Choo
:
Blockchain in Cybersecurity Realm: An Overview. Blockchain Cybersecurity, Trust and Privacy 2020: 1-5
2010 – 2019
- 2019
- [j4]Ensieh Modiri Dovom, Amin Azmoodeh
, Ali Dehghantanha
, David Ellis Newton, Reza M. Parizi, Hadis Karimipour
:
Fuzzy pattern tree for edge malware detection and categorization in IoT. J. Syst. Archit. 97: 1-7 (2019) - [j3]Amin Azmoodeh, Ali Dehghantanha
, Kim-Kwang Raymond Choo
:
Robust Malware Detection for Internet of (Battlefield) Things Devices Using Deep Eigenspace Learning. IEEE Trans. Sustain. Comput. 4(1): 88-95 (2019) - [p2]Amin Azmoodeh, Ali Dehghantanha, Kim-Kwang Raymond Choo:
Big Data and Internet of Things Security and Forensics: Challenges and Opportunities. Handbook of Big Data and IoT Security 2019: 1-4 - [p1]Kimia Bolouri, Amin Azmoodeh, Ali Dehghantanha, Mohammad Firouzmand:
Internet of Things Camera Identification Algorithm Based on Sensor Pattern Noise Using Color Filter Array and Wavelet Transform. Handbook of Big Data and IoT Security 2019: 211-223 - 2018
- [j2]Amin Azmoodeh, Ali Dehghantanha
, Mauro Conti, Kim-Kwang Raymond Choo
:
Detecting crypto-ransomware in IoT networks based on energy consumption footprint. J. Ambient Intell. Humaniz. Comput. 9(4): 1141-1152 (2018) - 2017
- [j1]Hashem Hashemi, Amin Azmoodeh, Ali Hamzeh
, Sattar Hashemi
:
Graph embedding as a new approach for unknown malware detection. J. Comput. Virol. Hacking Tech. 13(3): 153-166 (2017) - 2013
- [c1]Amin Azmoodeh, Sattar Hashemi
:
To Boost Graph Clustering Based on Power Iteration by Removing Outliers. DaEng 2013: 249-258
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-03-04 21:09 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint