Abdolhossein Sarrafzadeh

ORCID: 0000-0003-0816-589X
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Natural Language Processing Techniques
  • Video Surveillance and Tracking Methods
  • Topic Modeling
  • Network Security and Intrusion Detection
  • Social Robot Interaction and HRI
  • Energy Efficient Wireless Sensor Networks
  • Advanced Malware Detection Techniques
  • Gaze Tracking and Assistive Technology
  • Spam and Phishing Detection
  • Data Stream Mining Techniques
  • Hand Gesture Recognition Systems
  • Machine Learning and ELM
  • Intelligent Tutoring Systems and Adaptive Learning
  • Biomedical Text Mining and Ontologies
  • Air Quality Monitoring and Forecasting
  • Cloud Computing and Resource Management
  • Complex Network Analysis Techniques
  • Peer-to-Peer Network Technologies
  • Anomaly Detection Techniques and Applications
  • Internet Traffic Analysis and Secure E-voting
  • Maritime Navigation and Safety
  • Face and Expression Recognition
  • Human Pose and Action Recognition
  • IoT and Edge/Fog Computing
  • Speech and dialogue systems

North Carolina Agricultural and Technical State University
2021-2025

St. Bonaventure University
2019

Unitec Institute of Technology
2009-2018

Center Technological University
2012-2015

Corporación Universitaria Unitec
2012-2015

Central American Technological University
2012-2015

Technological University of Mexico
2012-2015

Universidad de Tecnología y Comercio
2012-2015

Auckland University of Technology
2015

National Institute of Information and Communications Technology
2013

There has been an exponential increase in the usage of internet, particularly among students since introduction e-learning and Bring Your Own Device (BYO) initiatives into education system. In New Zealand percentage population using internet is now 93.8% this increased risk cybersecurity attacks. This makes it necessary to provide awareness on who are potential targets for exploitation. However, understand what their current knowledge which forms basis paper. paper presents results a survey...

10.1109/pst.2016.7906931 article EN 2016-12-01

Abstract Phishing websites are fraudulent that appear legitimate and trick unsuspecting users into interacting with them, stealing their valuable information. Because phishing attacks a leading cause of data breach, different anti‐phishing solutions have been explored for cybersecurity management including machine learning‐based technical approaches. However, there is gap in understanding how robust deep models together hyperparameter optimization website detection. In this vein, study...

10.1002/spy2.256 article EN Security and Privacy 2022-08-14

In real world situations every model has some weaknesses and will make errors on training data. Given the fact that each certain limitations, aim of ensemble learning is to supervise their strengths weaknesses, leading best possible decision in general. Ensemble based machine a solution minimizing risk making. Bagging, boosting, stacked generalization mixture expert methods are most popular techniques construct systems. For purpose combining outputs class labels, weighted majority voting,...

10.1109/icmlc.2015.7340924 article EN 2015-07-01

Machine learning requires sufficient and reliable data to enhance the prediction performance. However, environmental sometimes is short and/or contains missing data. Often existing models built on machine fail predict problems accurately. We argue that spatial domain can be used facilitate training of temporal model. This paper formulates mathematically a aided incremental support vector regression (SalncSVR) for spatio-temporal PM <sub xmlns:mml="http://www.w3.org/1998/Math/MathML"...

10.1109/ijcnn.2014.6889521 article EN 2022 International Joint Conference on Neural Networks (IJCNN) 2014-07-01

Max-flow has been adopted for semi-supervised data modelling, yet existing algorithms were derived only the learning from static data. This paper proposes an online max-flow algorithm streams. Consider a graph learned labelled and unlabelled data, being updated dynamically accommodating adding retiring. In resulting non stationary graph, we augment de-augment paths to update with theoretical guarantee that equals batch retraining. For classification, compute min-cut over current max-flow, so...

10.1109/tkde.2016.2550042 article EN IEEE Transactions on Knowledge and Data Engineering 2016-04-15

The use of computer games as common vehicles for education, opposed to pure entertainment, has gained popularity in recent years. Traditional method diabetes education relies heavily on written materials and there is only a limited amount resources targeted at educating diabetic children. In this paper, we present novel approach designing aimed children with diabetes. Our game design was applied an existing open source (Mario Brothers). results pilot study showed that participants enjoyed...

10.1145/2071536.2071546 article EN 2011-11-28

This study is concerned with computation methods for environmental data analysis in order to enable facilitate effective decision making when addressing air pollution problems. A number of studies often simplify the problem but fail consider fact that a spatio-temporal problem. research addresses as by proposing new decentralized computational technique named Online Scalable SVM Ensemble Learning Method (OSSELM). Special consideration given distributed ensemble resolve collection i.e.,...

10.1109/inmic.2014.7097346 article EN 2014-12-01

Many software systems would significantly improve performance if they could adapt to the emotional state of user, for example intelligent tutoring systems, ATM's and ticketing machines recognise when users were confused, frustrated or angry provide remedial help so improving service. This paper presents research leading development Easy with Eve, an affective (ATS) mathematics. The system detects student emotion, adapts students displays emotion via a lifelike agent called Eve. Eve's is...

10.1109/innovations.2006.301981 article EN 2006-11-01

Importance of cyber security cannot be denied in the current environment With continuous growth internet, has become a necessity for both big and reputed organizations as well small businesses individuals. Intrusion detection systems (IDS) are considered to an efficient way detecting preventing threats. However, there been not enough attention awareness on intrusion prevention systems, especially among Due this, selection deployment IDS is significance regard this subject being highly...

10.1109/icmlc.2015.7340923 article EN 2015-07-01

Virtualization supplies a straightforward approach to high availability through iterative replications of virtual machine (VM) checkpoints that encapsulate the protected services. Unfortunately, traditional VM replication solutions suffer from deficiencies in either response latency or state recovery consistency, which constrains adoption production.

10.1145/2996890.2996894 article EN 2016-12-06

Malware is an international software disease. Research shows that the effect of malware becoming chronic. To protect against detectors are fundamental to industry. The effectiveness such depends on technology used. Therefore, it paramount advantages and disadvantages each type scrutinized analytically. This study's aim scrutinize existing publications this subject follow trend has taken place in advancement development with reference amount information sources literature. Many programs huge...

10.1109/pst.2016.7906998 article EN 2016-12-01

In view of the growth Wireless LAN and cyber security threats, status changes in this area becomes essential. Earliest known WarDriving study Auckland Central Business District was carried out 2003. Similar trials were undertaken 2015 to changes, WLAN adoption awareness. According studies, numbers wireless access points have increased significantly from 236 4077. Currently only 0.32% use Ad-hoc mode a less secure mode, while 2003 it 10.17%. 100% encryption enabled compared 40% earlier,...

10.1109/iccic.2015.7435676 article EN 2015-12-01
Coming Soon ...