default search action
Saeed Jalili
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [j57]Seyed Hossein Alavi Soltani, Saeed Jalili, Mohammad Kazem Sheikh-El-Eslami:
Decentralized control architecture for multi-authoring microgrids. Computing 105(12): 2621-2646 (2023) - [j56]Taha Rostami, Saeed Jalili:
FrMi: Fault-revealing Mutant Identification using killability severity. Inf. Softw. Technol. 164: 107307 (2023) - [j55]Erfan Arvan, Mahshad Koohi Habibi Dehkordi, Saeed Jalili:
Secured location-aware mobility-enabled RPL. J. Netw. Comput. Appl. 209: 103516 (2023) - 2021
- [j54]Mina Erfan, Saeed Jalili:
File Fragment Type Classification by Bag-Of-Visual-Words. ISC Int. J. Inf. Secur. 13(2): 101-116 (2021) - [j53]Saeed Shahrivari, Saeed Jalili:
Efficient Distributed k-Clique Mining for Large Networks Using MapReduce. IEEE Trans. Knowl. Data Eng. 33(3): 964-974 (2021) - [c17]Ali Alemi Matin Pour, Saeed Jalili:
Aspects Extraction for Aspect Level Opinion Analysis Based on Deep CNN. CSICC 2021: 1-6 - 2020
- [j52]Hojjat Jahani, Saeed Jalili:
Effective defense against fingerprinting attack based on autocorrelation property minimization approach. J. Intell. Inf. Syst. 54(2): 341-362 (2020)
2010 – 2019
- 2019
- [j51]Osama Hourani, Nasrollah Moghadam Charkari, Saeed Jalili:
Voxel selection framework based on meta-heuristic search and mutual information for brain decoding. Int. J. Imaging Syst. Technol. 29(4): 663-676 (2019) - [j50]Hojjat Jahani, Saeed Jalili:
Online Tor Privacy Breach Through Website Fingerprinting Attack. J. Netw. Syst. Manag. 27(2): 289-326 (2019) - [j49]Mohammad Rahmanimanesh, Jalal A. Nasiri, Saeed Jalili, Nasrollah Moghaddam Charkari:
Adaptive three-phase support vector data description. Pattern Anal. Appl. 22(2): 491-504 (2019) - [j48]Javad Salimi Sartakhti, Saeed Jalili:
On the computational power of the light: A plan for breaking data encryption standard. Theor. Comput. Sci. 773: 71-78 (2019) - 2018
- [j47]Hadi Shakibian, Nasrollah Moghadam Charkari, Saeed Jalili:
Multi-kernel one class link prediction in heterogeneous complex networks. Appl. Intell. 48(10): 3411-3428 (2018) - [j46]Akram Vasighizaker, Saeed Jalili:
C-PUGP: A cluster-based positive unlabeled learning method for disease gene prediction and prioritization. Comput. Biol. Chem. 76: 23-31 (2018) - [j45]Ozra Nikdelfaz, Saeed Jalili:
Disease genes prediction by HMM based PU-learning using gene expression profiles. J. Biomed. Informatics 81: 102-111 (2018) - 2017
- [j44]Mostafa Salari, Saeed Jalili, Reza Mortazavi:
TBM, a transformation based method for microaggregation of large volume mixed data. Data Min. Knowl. Discov. 31(1): 65-91 (2017) - [j43]Seyyed Mojtaba Bidoki, Saeed Jalili, Asghar Tajoddin:
PbMMD: A novel policy based multi-process malware detection. Eng. Appl. Artif. Intell. 60: 57-70 (2017) - [j42]Reza Mortazavi, Saeed Jalili:
Fine granular proximity breach prevention during numerical data anonymization. Trans. Data Priv. 10(2): 117-144 (2017) - 2016
- [j41]Hojjat Jahani, Saeed Jalili:
A novel passive website fingerprinting attack on tor using fast fourier transform. Comput. Commun. 96: 43-51 (2016) - [j40]Reza Mortazavi, Saeed Jalili:
Enhancing aggregation phase of microaggregation methods for interval disclosure risk minimization. Data Min. Knowl. Discov. 30(3): 605-639 (2016) - [j39]Bahareh Abolhasanzadeh, Saeed Jalili:
Towards modeling and runtime verification of self-organizing systems. Expert Syst. Appl. 44: 230-244 (2016) - [j38]Saeed Shahrivari, Saeed Jalili:
Single-pass and linear-time k-means clustering based on MapReduce. Inf. Syst. 60: 1-12 (2016) - [j37]Hadi Shakibian, Nasrollah Moghadam Charkari, Saeed Jalili:
A multilayered approach for link prediction in heterogeneous complex networks. J. Comput. Sci. 17: 73-82 (2016) - 2015
- [j36]Abdullah Chihada, Saeed Jalili, Seyed Mohammad Hossein Hasheminejad, Mohammad Hossein Zangooei:
Source code and design conformance, design pattern detection from source code by classification approach. Appl. Soft Comput. 26: 357-367 (2015) - [j35]Amir lakizadeh, Saeed Jalili, Sayed-Amir Marashi:
CAMWI: Detecting protein complexes using weighted clustering coefficient and weighted density. Comput. Biol. Chem. 58: 231-240 (2015) - [j34]Ali Gholami Rudi, Saeed Jalili:
Image preprocessing with a parallel optoelectronic processor. Comput. Electr. Eng. 46: 554-565 (2015) - [j33]Saeed Shahrivari, Saeed Jalili:
Distributed discovery of frequent subgraphs of a network using MapReduce. Computing 97(11): 1101-1120 (2015) - [j32]Hojjat Gohargazi, Saeed Jalili, Mohammad Rahmanimanesh:
Routing anomaly detection in OLSR-based MANETs. Int. J. Mob. Commun. 13(3): 276-298 (2015) - [j31]Reza Mortazavi, Saeed Jalili:
Preference-based anonymization of numerical datasets by multi-objective microaggregation. Inf. Fusion 25: 85-104 (2015) - [j30]Seyed Mohammad Hossein Hasheminejad, Saeed Jalili:
CCIC: Clustering analysis classes to identify software components. Inf. Softw. Technol. 57: 329-351 (2015) - [j29]Reza Mortazavi, Saeed Jalili:
A novel local search method for microaggregation. ISC Int. J. Inf. Secur. 7(1): 15-26 (2015) - [j28]Vali Tawosi, Saeed Jalili, Seyed Mohammad Hossein Hasheminejad:
Automated software design using ant colony optimization with semantic network support. J. Syst. Softw. 109: 1-17 (2015) - [j27]Sama Goliaei, Saeed Jalili:
Computation with optical sensitive sheets. Nat. Comput. 14(3): 437-450 (2015) - [j26]Jalal A. Nasiri, Nasrollah Moghadam Charkari, Saeed Jalili:
Least squares twin multi-class classification support vector machine. Pattern Recognit. 48(3): 984-992 (2015) - [j25]Saeed Shahrivari, Saeed Jalili:
Fast Parallel All-Subgraph Enumeration Using Multicore Machines. Sci. Program. 2015: 901321:1-901321:11 (2015) - [j24]Saeed Shahrivari, Saeed Jalili:
High-performance parallel frequent subgraph discovery. J. Supercomput. 71(7): 2412-2432 (2015) - 2014
- [j23]Hamid Masoud, Saeed Jalili:
A clustering-based model for class responsibility assignment problem in object-oriented analysis. J. Syst. Softw. 93: 110-131 (2014) - [j22]Seyed Mohammad Hossein Hasheminejad, Saeed Jalili:
An evolutionary approach to identify logical components. J. Syst. Softw. 96: 24-50 (2014) - [j21]Reza Mortazavi, Saeed Jalili:
Fast data-oriented microaggregation algorithm for large numerical datasets. Knowl. Based Syst. 67: 195-205 (2014) - [c16]Reza Mortazavi, Saeed Jalili:
Iterative constraint satisfaction method for microaggregation problem. ISCISC 2014: 204-209 - 2013
- [j20]Hamid Masoud, Saeed Jalili, Seyed Mohammad Hossein Hasheminejad:
Dynamic clustering using combinatorial particle swarm optimization. Appl. Intell. 38(3): 289-314 (2013) - [j19]Reza Mortazavi, Saeed Jalili, Hojjat Gohargazi:
Multivariate microaggregation by iterative optimization. Appl. Intell. 39(3): 529-544 (2013) - [j18]Javad Salimi Sartakhti, Saeed Jalili, Ali Gholami Rudi:
A new light-based solution to the Hamiltonian path problem. Future Gener. Comput. Syst. 29(2): 520-527 (2013) - [j17]Mohammad Rahmanimanesh, Saeed Jalili, Ahmad R. Sharafat:
Fusion of one-class classifiers for protocol-based anomaly detection in AODV-based mobile ad hoc networks. Int. J. Ad Hoc Ubiquitous Comput. 14(3): 158-171 (2013) - [j16]Mohammad Hossein Zangooei, Saeed Jalili:
Protein fold recognition with a two-layer method based on SVM-SA, WP-NN and C4.5 (TLM-SNC). Int. J. Data Min. Bioinform. 8(2): 203-223 (2013) - [j15]Sama Goliaei, Saeed Jalili:
An OpticalWavelength-Based Computational Machine. Int. J. Unconv. Comput. 9(1-2): 97-123 (2013) - [j14]Seyed Mohammad Hossein Hasheminejad, Saeed Jalili:
SCI-GA: Software Component Identification using Genetic Algorithm. J. Object Technol. 12(2): 3: 1-34 (2013) - [j13]Ali Gholami Rudi, Saeed Shahrivari, Saeed Jalili, Zahra Razaghi Moghadam Kashani:
RANGI: A Fast List-Colored Graph Motif Finding Algorithm. IEEE ACM Trans. Comput. Biol. Bioinform. 10(2): 504-513 (2013) - 2012
- [j12]Mohammad Hossein Zangooei, Saeed Jalili:
Protein secondary structure prediction using DWKF based on SVR-NSGAII. Neurocomputing 94: 87-101 (2012) - [j11]Seyed Mohammad Hossein Hasheminejad, Saeed Jalili:
Design patterns selection: An automatic two-phase method. J. Syst. Softw. 85(2): 408-424 (2012) - [j10]Narges Khakpour, Saeed Jalili, Marjan Sirjani, Ursula Goltz, Bahareh Abolhasanzadeh:
HPobSAM for modeling and analyzing IT Ecosystems - Through a case study. J. Syst. Softw. 85(12): 2770-2784 (2012) - [j9]Mohammad Hossein Zangooei, Saeed Jalili:
PSSP with dynamic weighted kernel fusion based on SVM-PHGS. Knowl. Based Syst. 27: 424-442 (2012) - [j8]Narges Khakpour, Saeed Jalili, Carolyn L. Talcott, Marjan Sirjani, Mohammad Reza Mousavi:
Formal modeling of evolving self-adaptive systems. Sci. Comput. Program. 78(1): 3-26 (2012) - [j7]Mohsen Khaxar, Saeed Jalili:
WSCMon: runtime monitoring of web service orchestration based on refinement checking. Serv. Oriented Comput. Appl. 6(1): 33-49 (2012) - [j6]Sama Goliaei, Saeed Jalili:
An optical solution to the 3-SAT problem using wavelength based selectors. J. Supercomput. 62(2): 663-672 (2012) - [c15]Shima Asgharian Jouibari, Saeed Jalili, Mohammad Rahmanimanesh:
Anomaly detection based on an enhanced projection distance. IST 2012: 965-970 - [c14]Mahboobeh Shakeri Miandare, Saeed Jalili:
VoIP anomaly detection by combining OCSVM and PSO algorithm. IST 2012: 1038-1043 - [c13]Sama Goliaei, Saeed Jalili:
An Optical Polynomial Time Solution for the Satisfiability Problem. OSC 2012: 15-24 - 2011
- [j5]Seyed Hossein Ahmadinejad, Saeed Jalili, Mahdi Abadi:
A hybrid model for correlating alerts of known and unknown attack scenarios and updating attack graphs. Comput. Networks 55(9): 2221-2240 (2011) - 2010
- [j4]Mahdi Abadi, Saeed Jalili:
A particle swarm optimization algorithm for minimization analysis of cost-sensitive attack graphs. ISC Int. J. Inf. Secur. 2(1): 13-32 (2010) - [j3]Gholamreza Shahmohammadi, Saeed Jalili, Seyed Mohammad Hossein Hasheminejad:
Identification of System Software Components Using Clustering Approach. J. Object Technol. 9(6): 77-98 (2010) - [c12]Sama Goliaei, Saeed Jalili:
Optical Graph 3-Colorability. OSC 2010: 16-22 - [c11]Narges Khakpour, Ramtin Khosravi, Marjan Sirjani, Saeed Jalili:
Formal analysis of policy-based self-adaptive systems. SAC 2010: 2536-2543
2000 – 2009
- 2009
- [j2]Narges Khakpour, Saeed Jalili:
Verification of Distributed Firewalls Configuration vs. Security Policies Using ALCQI(d). Appl. Artif. Intell. 23(10): 945-975 (2009) - [c10]Mohsen Khaxar, Saeed Jalili, Narges Khakpour, M. Shaban Jokhio:
Monitoring safety properties of composite web services at runtime using CSP. EDOCW 2009: 107-113 - [c9]Seyed Hossein Ahmadinejad, Saeed Jalili:
Correlating Alerts into Compressed Graphs Using an Attribute-Based Method and Time Windows. FGIT-SecTech 2009: 18-25 - [c8]Narges Khakpour, Marjan Sirjani, Saeed Jalili:
Formal Analysis of Smart Home Policies using Compositional Verification. ICFI 2009: 220-233 - [c7]Parvaz Mahdabi, Mahdi Abadi, Saeed Jalili:
A novel quantum-inspired evolutionary algorithm for solving combinatorial optimization problems. GECCO 2009: 1807-1808 - [c6]Sama Goliaei, Saeed Jalili:
An Optical Wavelength-Based Solution to the 3-SAT Problem. OSC 2009: 77-85 - [c5]Narges Khakpour, Saeed Jalili, Carolyn L. Talcott, Marjan Sirjani, Mohammad Reza Mousavi:
PobSAM: Policy-based Managing of Actors in Self-Adaptive Systems. FACS@FMWeek 2009: 129-143 - 2008
- [j1]Mahdi Abadi, Saeed Jalili:
Minimization Analysis of Network Attack Graphs Using Genetic Algorithms. Int. J. Comput. Their Appl. 15(4): 263-273 (2008) - [c4]Parvaz Mahdabi, Saeed Jalili, Mahdi Abadi:
A multi-start quantum-inspired evolutionary algorithm for solving combinatorial optimization problems. GECCO 2008: 613-614 - 2007
- [c3]Saeed Jalili, Mehdi MirzaAghaei:
RVERL: Run-time Verification of Real-time and Reactive Programs using Event-based Real-Time Logic Approach. SERA 2007: 550-557 - [c2]Saeed Jalili, Mehdi MirzaAghaei:
RVRTL: Run-Time Verification of Real-Time and Reactive Programs with Real-Time Logic Approach. Software Engineering Research and Practice 2007: 371-377 - 2005
- [c1]Saeed Jalili, Somayeh Malakuti, Khah Olun Abadi:
AECM: an Aspect Enabled Component Model. APSEC 2005: 738-743
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-25 05:51 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint