default search action
Hamid Bagheri
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c52]Sasan Azizian, Elham Rastegari, Hamid Bagheri:
Leveraging Machine Learning for Optimal Object-Relational Database Mapping in Software Systems. AIware 2024 - [c51]Hamid Bagheri, Mehdi Mirakhorli, Mohamad Fazelnia, Ibrahim Mujhid, Md Rashedul Hasan:
Neuro-Symbolic Approach to Certified Scientific Software Synthesis. AIware 2024 - [c50]Clay Stevens, Hamid Bagheri:
Scalable Relational Analysis via Relational Bound Propagation. ICSE 2024: 177:1-177:12 - [i7]Mohannad Alhanahnah, Md Rashedul Hasan, Hamid Bagheri:
An Empirical Evaluation of Pre-trained Large Language Models for Repairing Declarative Formal Specifications. CoRR abs/2404.11050 (2024) - 2023
- [j13]Mohannad Alhanahnah, Clay Stevens, Bocheng Chen, Qiben Yan, Hamid Bagheri:
IoTCom: Dissecting Interaction Threats in IoT Systems. IEEE Trans. Software Eng. 49(4): 1523-1539 (2023) - [c49]Niloofar Mansoor, Hamid Bagheri, Eunsuk Kang, Bonita Sharif:
An Empirical Study Assessing Software Modeling in Alloy. FormaliSE 2023: 44-54 - [c48]Mohsen Moradi-Moghadam, Mehdi Bagherzadeh, Raffi Khatchadourian, Hamid Bagheri:
µAkka: Mutation Testing for Actor Concurrency in Akka using Real-World Bugs. ESEC/SIGSOFT FSE 2023: 262-274 - [i6]Shibbir Ahmed, Mohammad Wardat, Hamid Bagheri, Breno Dantas Cruz, Hridesh Rajan:
Characterizing Bugs in Python and R Data Analytics Programs. CoRR abs/2306.08632 (2023) - [i5]Md Rashedul Hasan, Jiawei Li, Iftekhar Ahmed, Hamid Bagheri:
Automated Repair of Declarative Software Specifications in the Era of Large Language Models. CoRR abs/2310.12425 (2023) - 2022
- [c47]Bruno Vieira Resende e Silva, Clay Stevens, Niloofar Mansoor, Witawas Srisa-an, Tingting Yu, Hamid Bagheri:
SAINTDroid: Scalable, Automated Incompatibility Detection for Android. DSN 2022: 567-579 - [c46]Clay Stevens, Hamid Bagheri:
Combining solution reuse and bound tightening for efficient analysis of evolving systems. ISSTA 2022: 89-100 - [c45]Guolong Zheng, ThanhVu Nguyen, Simón Gutiérrez Brida, Germán Regis, Nazareno Aguirre, Marcelo F. Frias, Hamid Bagheri:
ATR: template-based repair for Alloy specifications. ISSTA 2022: 666-677 - [c44]Simón Gutiérrez Brida, Germán Regis, Guolong Zheng, Hamid Bagheri, ThanhVu Nguyen, Nazareno Aguirre, Marcelo F. Frias:
ICEBAR: Feedback-Driven Iterative Repair of Alloy Specifications. ASE 2022: 55:1-55:13 - [c43]Clay Stevens, Hamid Bagheri:
Parasol: efficient parallel synthesis of large model spaces. ESEC/SIGSOFT FSE 2022: 620-632 - 2021
- [j12]Hamid Bagheri, Jianghao Wang, Jarod Aerts, Negar Ghorbani, Sam Malek:
Flair: efficient analysis of Android inter-component vulnerabilities in response to incremental changes. Empir. Softw. Eng. 26(3): 54 (2021) - [c42]Guolong Zheng, ThanhVu Nguyen, Simón Gutiérrez Brida, Germán Regis, Marcelo F. Frias, Nazareno Aguirre, Hamid Bagheri:
Artifact of 'FLACK: Counterexample-Guided Fault Localization for Alloy Models'. ICSE (Companion Volume) 2021: 179-180 - [c41]Simón Gutiérrez Brida, Germán Regis, Guolong Zheng, Hamid Bagheri, ThanhVu Nguyen, Nazareno Aguirre, Marcelo F. Frias:
Artifact of Bounded Exhaustive Search of Alloy Specification Repairs. ICSE (Companion Volume) 2021: 209-210 - [c40]Guolong Zheng, ThanhVu Nguyen, Simón Gutiérrez Brida, Germán Regis, Marcelo F. Frias, Nazareno Aguirre, Hamid Bagheri:
FLACK: Counterexample-Guided Fault Localization for Alloy Models. ICSE 2021: 637-648 - [c39]Simón Gutiérrez Brida, Germán Regis, Guolong Zheng, Hamid Bagheri, ThanhVu Nguyen, Nazareno Aguirre, Marcelo F. Frias:
Bounded Exhaustive Search of Alloy Specification Repairs. ICSE 2021: 1135-1147 - [c38]Simón Gutiérrez Brida, Germán Regis, Guolong Zheng, Hamid Bagheri, ThanhVu Nguyen, Nazareno Aguirre, Marcelo F. Frias:
BeAFix: An Automated Repair Tool for Faulty Alloy Models. ASE 2021: 1213-1217 - [c37]Guolong Zheng, ThanhVu Nguyen, Simón Gutiérrez Brida, Germán Regis, Marcelo F. Frias, Nazareno Aguirre, Hamid Bagheri:
FLACK: Localizing Faults in Alloy Models. ASE 2021: 1218-1222 - [c36]Zhen Hu, Bruno Vieira Resende e Silva, Hamid Bagheri, Witawas Srisa-an, Gregg Rothermel, Jackson Dinh:
SEMEO: A Semantic Equivalence Analysis Framework for Obfuscated Android Applications. MobiQuitous 2021: 322-346 - [i4]Guolong Zheng, ThanhVu Nguyen, Simón Gutiérrez Brida, Germán Regis, Marcelo F. Frias, Nazareno Aguirre, Hamid Bagheri:
FLACK: Counterexample-Guided Fault Localization for Alloy Models. CoRR abs/2102.10152 (2021) - [i3]Simón Gutiérrez Brida, Germán Regis, Guolong Zheng, Hamid Bagheri, ThanhVu Nguyen, Nazareno Aguirre, Marcelo F. Frias:
Bounded Exhaustive Search of Alloy Specification Repairs. CoRR abs/2103.00327 (2021) - 2020
- [j11]Hamid Bagheri, Andrew J. Severin, Hridesh Rajan:
Detecting and correcting misclassified sequences in the large-scale public databases. Bioinform. 36(18): 4699-4705 (2020) - [j10]Mohannad Alhanahnah, Qiben Yan, Hamid Bagheri, Hao Zhou, Yutaka Tsutano, Witawas Srisa-an, Xiapu Luo:
DINA: Detecting Hidden Android Inter-App Communication in Dynamic Loaded Code. IEEE Trans. Inf. Forensics Secur. 15: 2782-2797 (2020) - [c35]Guolong Zheng, Hamid Bagheri, Gregg Rothermel, Jianghao Wang:
Platinum: Reusing Constraint Solutions in Bounded Analysis of Relational Logic. FASE 2020: 29-52 - [c34]Balaji Balasubramaniam, Hamid Bagheri, Sebastian G. Elbaum, Justin M. Bradley:
Investigating Controller Evolution and Divergence through Mining and Mutation*. ICCPS 2020: 151-161 - [c33]Hamid Bagheri, Eunsuk Kang, Niloofar Mansoor:
Synthesis of assurance cases for software certification. ICSE (NIER) 2020: 61-64 - [c32]Clay Stevens, Hamid Bagheri:
Reducing run-time adaptation space via analysis of possible utility bounds. ICSE 2020: 1522-1534 - [c31]Guolong Zheng, Hamid Bagheri, ThanhVu Nguyen:
Debugging Declarative Models in Alloy. ICSME 2020: 844-848 - [c30]Mohannad Alhanahnah, Clay Stevens, Hamid Bagheri:
Scalable analysis of interaction threats in IoT systems. ISSTA 2020: 272-285
2010 – 2019
- 2019
- [j9]Hamid Bagheri, Usha Muppirala, Rick E. Masonbrink, Andrew J. Severin, Hridesh Rajan:
Shared data science infrastructure for genomics data. BMC Bioinform. 20(1): 436:1-436:13 (2019) - [j8]Mahmoud Hammad, Hamid Bagheri, Sam Malek:
DelDroid: An automated approach for determination and enforcement of least-privilege architecture in android. J. Syst. Softw. 149: 83-100 (2019) - [c29]Mohannad Alhanahnah, Qiben Yan, Hamid Bagheri, Hao Zhou, Yutaka Tsutano, Witawas Srisa-an, Xiapu Luo:
Detecting Vulnerable Android Inter-App Communication in Dynamically Loaded Code. INFOCOM 2019: 550-558 - [p1]Sam Malek, Hamid Bagheri, Joshua Garcia, Alireza Sadeghi:
Security and Software Engineering. Handbook of Software Engineering 2019: 445-489 - 2018
- [j7]Hamid Bagheri, Eunsuk Kang, Sam Malek, Daniel Jackson:
A formal approach for detection of security flaws in the android permission system. Formal Aspects Comput. 30(5): 525-544 (2018) - [c28]Alireza Sadeghi, Reyhaneh Jabbarvand, Negar Ghorbani, Hamid Bagheri, Sam Malek:
A temporal permission analysis and enforcement framework for Android. ICSE 2018: 846-857 - [c27]Hamid Bagheri, Jianghao Wang, Jarod Aerts, Sam Malek:
Efficient, Evolutionary Security Analysis of Interacting Android Apps. ICSME 2018: 357-368 - [c26]Jianghao Wang, Hamid Bagheri, Myra B. Cohen:
An evolutionary approach for analyzing Alloy specifications. ASE 2018: 820-825 - [c25]Niloofar Mansoor, Jonathan A. Saddler, Bruno Vieira Resende e Silva, Hamid Bagheri, Myra B. Cohen, Shane Farritor:
Modeling and testing a family of surgical robots: an experience report. ESEC/SIGSOFT FSE 2018: 785-790 - 2017
- [j6]Hamid Bagheri, Chong Tang, Kevin J. Sullivan:
Automated Synthesis and Dynamic Analysis of Tradeoff Spaces for Object-Relational Mapping. IEEE Trans. Software Eng. 43(2): 145-163 (2017) - [j5]Alireza Sadeghi, Hamid Bagheri, Joshua Garcia, Sam Malek:
A Taxonomy and Qualitative Comparison of Program Analysis Techniques for Security Assessment of Android Software. IEEE Trans. Software Eng. 43(6): 492-530 (2017) - [c24]Mahmoud Hammad, Hamid Bagheri, Sam Malek:
Determination and Enforcement of Least-Privilege Architecture in Android. ICSA 2017: 59-68 - [c23]Chong Tang, Hamid Bagheri, Sarun Paisarnsrisomsuk, Kevin J. Sullivan:
Towards designing effective data persistence through tradeoff space analysis. ICSE (Companion Volume) 2017: 353-355 - [i2]Hamid Bagheri, Md Johirul Islam:
Sentiment analysis of twitter data. CoRR abs/1711.10377 (2017) - 2016
- [j4]Hamid Bagheri, Kevin J. Sullivan:
Model-driven synthesis of formally precise, stylized software architectures. Formal Aspects Comput. 28(3): 441-467 (2016) - [j3]Hamid Bagheri, Joshua Garcia, Alireza Sadeghi, Sam Malek, Nenad Medvidovic:
Software architectural principles in contemporary mobile software: from conception to practice. J. Syst. Softw. 119: 31-44 (2016) - [c22]Hamid Bagheri, Alireza Sadeghi, Reyhaneh Jabbarvand Behrouz, Sam Malek:
Practical, Formal Synthesis and Automatic Enforcement of Security Policies for Android. DSN 2016: 514-525 - [c21]Bradley R. Schmerl, Jeff Gennari, Alireza Sadeghi, Hamid Bagheri, Sam Malek, Javier Cámara, David Garlan:
Architecture Modeling and Analysis of Security in Android Systems. ECSA 2016: 274-290 - [c20]Nariman Mirzaei, Joshua Garcia, Hamid Bagheri, Alireza Sadeghi, Sam Malek:
Reducing combinatorics in GUI testing of android applications. ICSE 2016: 559-570 - [c19]Reyhaneh Jabbarvand Behrouz, Alireza Sadeghi, Hamid Bagheri, Sam Malek:
Energy-aware test-suite minimization for Android apps. ISSTA 2016: 425-436 - [c18]Hamid Bagheri, Sam Malek:
Titanium: efficient analysis of evolving alloy specifications. SIGSOFT FSE 2016: 27-38 - 2015
- [j2]Hamid Bagheri, Alireza Sadeghi, Joshua Garcia, Sam Malek:
COVERT: Compositional Analysis of Android Inter-App Permission Leakage. IEEE Trans. Software Eng. 41(9): 866-886 (2015) - [c17]Hamid Bagheri, Eunsuk Kang, Sam Malek, Daniel Jackson:
Detection of Design Flaws in the Android Permission Protocol Through Bounded Verification. FM 2015: 73-89 - [c16]Alireza Sadeghi, Hamid Bagheri, Sam Malek:
Analysis of Android Inter-App Security Vulnerabilities Using COVERT. ICSE (2) 2015: 725-728 - [c15]Nariman Mirzaei, Hamid Bagheri, Riyadh Mahmood, Sam Malek:
SIG-Droid: Automated system input generation for Android applications. ISSRE 2015: 461-471 - [c14]Ehsan Kouroshfar, Mehdi Mirakhorli, Hamid Bagheri, Lu Xiao, Sam Malek, Yuanfang Cai:
A Study on the Role of Software Architecture in the Evolution and Quality of Software. MSR 2015: 246-257 - 2014
- [c13]Hamid Bagheri, Chong Tang, Kevin J. Sullivan:
TradeMaker: automated dynamic analysis of synthesized tradespaces. ICSE 2014: 106-116 - [c12]Sam Malek, Hamid Bagheri, Alireza Sadeghi:
Automated detection and mitigation of inter-application security vulnerabilities in Android (invited talk). DeMobile@SIGSOFT FSE 2014: 17-18 - [i1]Hamid Bagheri:
Synthesis from Formal Partial Abstractions. CoRR abs/1411.0481 (2014) - 2013
- [c11]Hamid Bagheri, Kevin J. Sullivan:
Bottom-up model-driven development. ICSE 2013: 1221-1224 - 2012
- [c10]Hamid Bagheri, Kevin J. Sullivan:
Pol: specification-driven synthesis of architectural code frameworks for platform-based applications. GPCE 2012: 93-102 - [c9]Hamid Bagheri, Kevin J. Sullivan, Sang H. Son:
Spacemaker: Practical Formal Synthesis of Tradeoff Spaces for Object-Relational Mapping. SEKE 2012: 688-693 - 2011
- [c8]Hamid Bagheri:
A formal approach to software synthesis for architectural platforms. ICSE 2011: 1143-1145 - [c7]Hamid Bagheri, Kevin J. Sullivan:
A Formal Approach for Incorporating Architectural Tactics into the Software Architecture. SEKE 2011: 770-775 - 2010
- [c6]Hamid Bagheri, Kevin J. Sullivan:
Architecture as an Independent Variable for Aspect-Oriented Application Descriptions. ASM 2010: 395 - [c5]Hamid Bagheri, Yuanyuan Song, Kevin J. Sullivan:
Architectural style as an independent variable. ASE 2010: 159-162 - [c4]Hamid Bagheri, Kevin J. Sullivan:
Monarch: Model-Based Development of Software Architectures. MoDELS (2) 2010: 376-390
2000 – 2009
- 2008
- [c3]Hamid Bagheri, Vajih Montaghami, Gholamreza Safi, Seyed-Hassan Mirian-Hosseinabadi:
An evaluation method for aspectual modeling of distributed software architectures. AICCSA 2008: 903-908 - 2007
- [c2]Hamid Bagheri:
Injecting security as aspectable NFR into Software Architecture. APSEC 2007: 310-317 - [c1]Hamid Bagheri, Seyed-Hassan Mirian-Hosseinabadi, Hesam Chiniforooshan Esfahani:
An Aspect Enhanced Method of NFR Modeling in Software Architecture. ICIT 2007: 240-242 - 2003
- [j1]John Trezza, Harald Hamster, Joseph Iamartino, Hamid Bagheri, Casimer M. DeCusatis:
Parallel optical interconnects for enterprise class server clusters: needs and technology solutions. IEEE Commun. Mag. 41(2) (2003)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-16 20:32 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint