default search action
Morteza Amini
This is just a disambiguation page, and is not intended to be the bibliography of an actual person. Any publication listed on this page has not been assigned to an actual author yet. If you know the true author of one of the publications listed below, you are welcome to contact us.
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j32]Morteza Amini:
Genomic data analysis using a two stage expectation propagation algorithm for analysis of sparse Bayesian high-dimensional instrumental variables regression. Commun. Stat. Simul. Comput. 53(5): 2351-2365 (2024) - [j31]Maryam Masoudian, Heqing Huang, Morteza Amini, Charles Zhang:
Mole: Efficient Crash Reproduction in Android Applications With Enforcing Necessary UI Events. IEEE Trans. Software Eng. 50(8): 2200-2218 (2024) - [c24]Mahmoud Aghvamipanah, Morteza Amini, Cyrille Artho, Musard Balliu:
Activity Recognition Protection for IoT Trigger-Action Platforms. EuroS&P 2024: 600-616 - 2023
- [j30]Morteza Amini, Afarin Bayat, Reza Salehian:
hhsmm: an R package for hidden hybrid Markov/semi-Markov models. Comput. Stat. 38(3): 1283-1335 (2023) - 2021
- [j29]Somayeh Dolatnezhad Samarin, Morteza Amini:
Integrity Checking for Aggregate Queries. IEEE Access 9: 74068-74084 (2021) - [j28]Morteza Amini, Mir Mohsen Pedram, Alireza Moradi, Mahdieh Jamshidi, Mahshad Ouchani:
Single and Combined Neuroimaging Techniques for Alzheimer's Disease Detection. Comput. Intell. Neurosci. 2021: 9523039:1-9523039:22 (2021) - [j27]Morteza Amini, Mir Mohsen Pedram, Alireza Moradi, Mahshad Ouchani:
Diagnosis of Alzheimer's Disease by Time-Dependent Power Spectrum Descriptors and Convolutional Neural Network Using EEG Signal. Comput. Math. Methods Medicine 2021: 5511922:1-5511922:17 (2021) - [j26]Morteza Amini, Mir Mohsen Pedram, Alireza Moradi, Mahshad Ouchani:
Diagnosis of Alzheimer's Disease Severity with fMRI Images Using Robust Multitask Feature Extraction Method and Convolutional Neural Network (CNN). Comput. Math. Methods Medicine 2021: 5514839:1-5514839:15 (2021) - [j25]Morteza Amini:
Selection of the best minimal repair systems for Weibull lifetime distribution: A Bayesian approach. Commun. Stat. Simul. Comput. 50(3): 832-853 (2021) - [j24]Amir Mohammadzade Lajevardi, Morteza Amini:
Big knowledge-based semantic correlation for detecting slow and low-level advanced persistent threats. J. Big Data 8(1): 148 (2021) - [j23]Somayeh Dolatnezhad Samarin, Dario Fiore, Daniele Venturi, Morteza Amini:
A compiler for multi-key homomorphic signatures for Turing machines. Theor. Comput. Sci. 889: 145-170 (2021) - [i2]Somayeh Dolatnezhad Samarin, Dario Fiore, Daniele Venturi, Morteza Amini:
A compiler for multi-key homomorphic signatures for Turing machines. IACR Cryptol. ePrint Arch. 2021: 1651 (2021) - 2020
- [j22]Ramtin Bagheri, Morteza Amini, Somayeh Dolatnezhad Samarin:
Efficient verification of parallel matrix multiplication in public cloud: the MapReduce case. J. Big Data 7(1): 86 (2020)
2010 – 2019
- 2019
- [j21]Morteza Amini, Mahdi Roozbeh:
Improving the prediction performance of the LASSO by subtracting the additive structural noises. Comput. Stat. 34(1): 415-432 (2019) - [j20]Amir Noury, Morteza Amini:
An access and inference control model for time series databases. Future Gener. Comput. Syst. 92: 93-108 (2019) - [j19]Amir Mohammadzade Lajevardi, Morteza Amini:
A semantic-based correlation approach for detecting hybrid and low-level APTs. Future Gener. Comput. Syst. 96: 64-88 (2019) - [j18]H. Rangani Jahromi, Morteza Amini, M. Ghanaatian:
Multiparameter estimation, lower bound on quantum Fisher information, and non-Markovianity witnesses of noisy two-qubit systems. Quantum Inf. Process. 18(11): 338 (2019) - [j17]Morteza Amini, Farnaz Osanloo:
Purpose-Based Privacy Preserving Access Control for Secure Service Provision and Composition. IEEE Trans. Serv. Comput. 12(4): 604-620 (2019) - [c23]Majid Salehi, Morteza Amini, Bruno Crispo:
Detecting malicious applications using system services request behavior. MobiQuitous 2019: 200-209 - 2018
- [j16]Mahmoud Jafarinejad, Morteza Amini:
Multi-join query optimization in bucket-based encrypted databases using an enhanced ant colony optimization algorithm. Distributed Parallel Databases 36(2): 399-441 (2018) - 2017
- [j15]Morteza Amini, Mahdi Mahdizadeh:
Nonparametric estimation of the entropy using a ranked set sample. Commun. Stat. Simul. Comput. 46(9): 6719-6737 (2017) - [c22]Shahrooz Pooryousef, Morteza Amini:
Enhancing Accuracy of Android Malware Detection using Intent Instrumentation. ICISSP 2017: 380-388 - [i1]Majid Salehi, Morteza Amini:
Android Malware Detection using Markov Chain Model of Application Behaviors in Requesting System Services. CoRR abs/1711.05731 (2017) - 2016
- [j14]Soudabeh Shemehsavar, Morteza Amini:
Failure Inference and Optimization for Step Stress Model Based on Bivariate Wiener Model. Commun. Stat. Simul. Comput. 45(1): 130-151 (2016) - [j13]Sepideh Naghdi, Morteza Amini:
Preventing database schema extraction by error message handling. Inf. Syst. 56: 135-156 (2016) - [j12]Morteza Amini, Soudabeh Shemehsavar, Zhengqiang Pan:
Optimal Design for Step-Stress Accelerated Test with Random Discrete Stress Elevating Times Based on Gamma Degradation Process. Qual. Reliab. Eng. Int. 32(7): 2391-2402 (2016) - [c21]Shahrooz Pooryousef, Morteza Amini:
Fine-grained access control for hybrid mobile applications in Android using restricted paths. ISCISC 2016: 85-90 - 2015
- [j11]Ali Ahmadian Ramaki, Morteza Amini, Reza Ebrahimi Atani:
RTECA: Real time episode correlation algorithm for multi-step attack scenarios detection. Comput. Secur. 49: 206-219 (2015) - [j10]Morteza Amini, Narayanaswamy Balakrishnan:
Pooled parametric inference for minimal repair systems. Comput. Stat. 30(2): 605-623 (2015) - [j9]Morteza Amini, Majid Arasteh:
A combination of semantic and attribute-based access control model for virtual organizations. ISC Int. J. Inf. Secur. 7(1): 27-45 (2015) - [j8]Morteza Amini, Mahdi Roozbeh:
Optimal partial ridge estimation in restricted semiparametric regression models. J. Multivar. Anal. 136: 26-40 (2015) - 2013
- [j7]Morteza Amini, N. Balakrishnan:
Nonparametric meta-analysis of independent samples of records. Comput. Stat. Data Anal. 66: 70-81 (2013) - [j6]Seyyed Ahmad Javadi, Morteza Amini:
A semantic-aware role-based access control model for pervasive computing environments. ISC Int. J. Inf. Secur. 5(2): 119-140 (2013) - 2012
- [j5]Morteza Amini, Rasool Jalili, Moussa Amir Ehsan, Fathiyeh Faghih:
Cooperative security administration in multi-security-domain environments using a variant of deontic logic. Sci. Iran. 19(3): 635-653 (2012) - 2010
- [j4]Morteza Amini, Rasool Jalili:
Multi-level authorisation model and framework for distributed semantic-aware environments. IET Inf. Secur. 4(4): 301-321 (2010) - [j3]Ali Noorollahi Ravari, Jafar Haadi Jafarian, Morteza Amini, Rasool Jalili:
GTHBAC: A Generalized Temporal History Based Access Control Model. Telecommun. Syst. 45(2-3): 111-125 (2010) - [c20]Fathieh Faghih, Morteza Amini, Rasool Jalili:
Specification of History Based Constraints for Access Control in Conceptual Level. ICISS 2010: 186-200
2000 – 2009
- 2009
- [j2]Jafar Haadi Jafarian, Morteza Amini:
CAMAC: a context-aware mandatory access control model. ISC Int. J. Inf. Secur. 1(1): 35-54 (2009) - [c19]Moussa Amir Ehsan, Morteza Amini, Rasool Jalili:
Handling Context in a Semantic-Based Access Control Framework. AINA Workshops 2009: 103-108 - [c18]Fathieh Faghih, Morteza Amini, Rasool Jalili:
A Temporal Description Logic Based Access Control Model for Expressing History Constrained Policies in Semantic Web. POLICY 2009: 142-149 - [c17]Moussa Amir Ehsan, Morteza Amini, Rasool Jalili:
A semantic-based access control mechanism using semantic technologies. SIN 2009: 258-267 - 2008
- [c16]Mohsen Taherian, Rasool Jalili, Morteza Amini:
PTO: A Trust Ontology for Pervasive Environments. AINA Workshops 2008: 301-306 - [c15]Mohsen Taherian, Rasool Jalili, Morteza Amini:
A Semantic-Aware Ontology-Based Trust Model for Pervasive Computing Environments. ATC 2008: 47-59 - [c14]Ali Noorollahi Ravari, Morteza Amini, Rasool Jalili:
A Temporal Semantic-Based Access Control Model. CSICC 2008: 559-568 - [c13]Jafar Haadi Jafarian, Morteza Amini, Rasool Jalili:
A Dynamic Mandatory Access Control Model. CSICC 2008: 862-866 - [c12]Jafar Haadi Jafarian, Ali Noorollahi Ravari, Morteza Amini, Rasool Jalili:
Protecting Location Privacy through a Graph-Based Location Representation and a Robust Obfuscation Technique. ICISC 2008: 116-133 - [c11]Mohsen Taherian, Morteza Amini, Rasool Jalili:
Trust Inference in Web-Based Social Networks Using Resistive Networks. ICIW 2008: 233-238 - [c10]Ali Noorollahi Ravari, Morteza Amini, Rasool Jalili:
A Semantic aware Access Control model with real time constraints on history of accesses. IMCSIT 2008: 827-836 - [c9]Zeinab Iranmanesh, Morteza Amini, Rasool Jalili:
A Logic for Multi-domain Authorization Considering Administrators. POLICY 2008: 189-196 - [c8]Jafar Haadi Jafarian, Morteza Amini, Rasool Jalili:
A Context-Aware Mandatory Access Control Model for Multilevel Security Environments. SAFECOMP 2008: 401-414 - 2007
- [c7]Hassan Takabi, Morteza Amini, Rasool Jalili:
Separation of Duty in Role-Based Access Control Model through Fuzzy Relations. IAS 2007: 125-130 - [c6]Hassan Takabi, Morteza Amini, Rasool Jalili:
Enhancing Role-Based Access Control Model through Fuzzy Relations. IAS 2007: 131-136 - [c5]Hassan Takabi, Morteza Amini, Rasool Jalili:
Trust-Based User-Role Assignment in Role-Based Access Control. AICCSA 2007: 807-814 - [c4]Amirreza Masoumzadeh, Morteza Amini, Rasool Jalili:
Conflict Detection and Resolution in Context-Aware Authorization. AINA Workshops (1) 2007: 505-511 - [c3]Sareh Sadat Emami, Morteza Amini, Saadan Zokaei:
A Context-Aware Access Control Model for Pervasive Computing Environments. IPC 2007: 51-56 - 2006
- [j1]Morteza Amini, Rasool Jalili, Hamid Reza Shahriari:
RT-UNNID: A practical solution to real-time network-based intrusion detection using unsupervised neural networks. Comput. Secur. 25(6): 459-468 (2006) - [c2]Amirreza Masoumzadeh, Morteza Amini, Rasool Jalili:
Context-Aware Provisional Access Control. ICISS 2006: 132-146 - 2005
- [c1]Rasool Jalili, Fatemeh Imani-Mehr, Morteza Amini, Hamid Reza Shahriari:
Detection of Distributed Denial of Service Attacks Using Statistical Pre-processor and Unsupervised Neural Networks. ISPEC 2005: 192-203
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-09-10 01:17 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint