Ali Hamzeh

Ali Hamzeh
Verified
Ali verified their affiliation via an institutional email.
Verified
Ali verified their affiliation via an institutional email.
Shiraz University · School of Electrical and Computer Engineering

Doctor of Philosophy

About

161
Publications
50,136
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
2,031
Citations
Additional affiliations
January 2015 - present
Shiraz University
Position
  • Professor (Associate)
January 2005 - January 2006
Iran University of Science and Technology
Position
  • Lecturer
January 2009 - January 2015
Shiraz University
Position
  • Professor (Assistant)

Publications

Publications (161)
Article
Influence maximization plays an important role in social network analysis and has been extensively explored due to its emergence in a great deal of applications. However, a vast majority of researchers have only considered the influence of one factor on the spread of information among individuals. In addition, this factor which is mainly the influe...
Preprint
Full-text available
Ransomware is one of the most challenging types of malware that uses cryptology to attack victims' computers. The attackers then demand ransom payments to recover encrypted resources. Ransomware is currently one of the most serious threats to individuals and organizations. Therefore, it is essential to detect them before they cause serious problems...
Preprint
Full-text available
Competitive influence maximization has been studied for several years, and various frameworks have been proposed to model different aspects of information diffusion under the competitive environment. This work presents a new gameboard for two competing parties with some new features representing loyalty in social networks and reflecting the attitud...
Article
Full-text available
Social network analysis (SNA) has opened up different research areas to researchers, such as Community Detection and Influence Maximization. By modeling social networks as graphs, one can detect one’s communities or find the most Influential nodes for different applications. Despite extensive research in this area, existing methods have not yet ful...
Article
A challenging issue in complex network analysis is overlapping community detection, which has attracted many studies. Label Propagation Algorithm (LPA) is one of the famous studies to detect communities. But it has some weaknesses such as using local information and randomly choosing the sequences of processing nodes. We introduce Evolutionary Labe...
Article
Full-text available
Overlapping community detection with low computation is one of the fundamental issues and challenges in large-scale complex network analysis. Detecting a community in a network means discovering a cluster of network nodes so that the density of edges between them is high. The existing methods use entire structure information or subgraphs with a fix...
Article
Full-text available
Significant advances in malware production methods in recent years and their use of advanced concealment mechanisms have made identifying such malware a major challenge in the field of computer system security. Recently generated malware has a high degree of self-protection mechanism, which makes it difficult to detect malware using traditional met...
Article
Full-text available
The rapid outbreak of coronavirus threatens humans’ life all around the world. Due to the insufficient diagnostic infrastructures, developing an accurate, efficient, inexpensive, and quick diagnostic tool is of great importance. To date, researchers have proposed several detection models based on chest imaging analysis, primarily based on deep neur...
Article
Full-text available
The development of cryptocurrency has led to an increase in a type of malware called ransomware. Ransomware is a family of malware that uses malicious techniques to prevent users from accessing their systems or data. Ransomware threatens all industries, from health and hospitals to banks, training centers, and manufacturers of goods. Therefore, ear...
Article
Full-text available
With the increasing number of items in electronic retailers, news websites, etc., finding interesting items concerning the taste of users is becoming more challenging. Recommender Systems (RS) are a well-known solution to this issue. Collaborative filtering (CF) is a widely accepted and popular technique to implement an RS. However, cold-start and...
Article
Full-text available
With the increasing availability of internet access, the number of malware is growing dramatically. So, defence against malware is an important issue in the security of computers and networks. Hence, malware detection systems are important. The most common method for malware detection is a signature-based technique. Nowadays, malware attempt to dec...
Article
Influence Maximization (IM) is the problem of finding k influential nodes in a network to increase the spread or influence of a specific matter. It has been an amazing topic through recent years. Later studies proposed algorithms and heuristics to either accelerate seed selection process or introduce new diffusion models. Two of important aspects i...
Article
Recent years have witnessed the dramatic growth of malware programs in a wide range of malicious intentions following the expansion of computer systems. Hence, highly effective systems to detect malware are extremely demanded. Most of the recent approaches use machine learning techniques along with the features extracted from files such as byte seq...
Article
Finding a number of nodes that are able to maximize the spread of influence through the social network and are called influence maximization has numerous applications in marketing. One such application is to find influential members for promoting a product across a large network. Even though numerous algorithms have been proposed, challenges such a...
Article
This paper proposes a dynamic feature weighting approach for multi-label classification problems. The choice of dynamic weights plays a vital role in such problems because the assigned weight to each feature might be dependent on the query. To take this dependency into account, we optimize our previously proposed dynamic weighting function through...
Preprint
Full-text available
The rapid outbreak of COVID-19 threatens humans life all around the world. Due to insufficient diagnostic infrastructures, developing an accurate, efficient, inexpensive, and quick diagnostic tool is of great importance. As chest radiography, such as chest X-ray (CXR) and CT computed tomography (CT), is a possible way for screening COVID-19, develo...
Preprint
Full-text available
Regularization plays a vital role in the context of deep learning by preventing deep neural networks from the danger of overfitting. This paper proposes a novel deep learning regularization method named as DL-Reg, which carefully reduces the nonlinearity of deep networks to a certain extent by explicitly enforcing the network to behave as much line...
Article
Full-text available
Nowadays, computers and the Internet have become an inseparable part of our life. We accomplish a wide range of our daily tasks through the Internet. A massive number of malwares have been designed annually to infiltrate computers and other electronic devices that endanger their security strikingly. Hence, developing a method that is capable of pro...
Chapter
Nowadays, digital devices and the internet make our life remarkably easy since a massive number of daily activities can be carried out simply through the internet. Internet of Things (IoT) devices are increasingly employed in diverse industries with a wide range of purposes such as sensing or collecting environmental data. The development of IoT br...
Preprint
Full-text available
Today, many companies take advantage of viral marketing to promote their new products, and since there are several competing companies in many markets, Competitive Influence Maximization has attracted much attention. Two categories of studies exist in the literature. First, studies that focus on which nodes from the network to select considering th...
Article
Full-text available
This paper studies the team formation problem, which includes a social collaboration network and a project, comprised of a number of tasks, each requiring a particular skill. The goal is to select the most appropriate members for the team, who not only cover the required project skills, but also have the highest degree of expertise according to the...
Article
Search application has been one of the many domains wherein multi-robot systems (MRS) have been applied over the past few years. Such applications include, but are not limited to, environmental monitoring, battlefield surveillance, search and rescue, oil and gas exploration, etc. A particular case of MRS which benefits from a large number of agents...
Conference Paper
Malware is a malicious code which intends to harm computers and networks. Each year, a huge number of malicious programs are released. Therefore, detecting malware has become one of the most important challenges for the security of computer systems. Various methods have been defined for detecting and classifying malware, such as signature-based and...
Article
Full-text available
Each year, a huge number of malicious programs are released which causes malware detection to become a critical task in computer security. Antiviruses use various methods for detecting malware, such as signature-based and heuristic-based techniques. Polymorphic and metamorphic malwares employ obfuscation techniques to bypass traditional detection m...
Article
Full-text available
In recent years, malware authors have had significant developments in offering new generations of malware and have tried to use different methods to make malware detection hard, so detecting malware has become one of the most important challenges for the security of computer systems. These developments have made detection of malware using conventio...
Article
Full-text available
In the security application, an attacker might violate the data stationary assumption that is a common assumption in the most machine learning techniques. This problem named as the domain shift problem arises when training (source) and test (target) data follow different distributions. The inherent adversarial nature of the security applications co...
Article
Full-text available
Human relationships have led to complex communication networks among different individuals in a society. As the nature of relationship is change, these networks will change over the time too which makes them dynamic networks including several consecutive snapshots. Nowadays, the pervasiveness of electronic communication networks, so called Social N...
Article
Purpose Recently, many-objective optimization evolutionary algorithms have been the main issue for researchers in the multi-objective optimization community. To deal with many-objective problems (typically for four or more objectives) some modern frameworks are proposed which have the potential of achieving the finest non-dominated solutions in man...
Article
Influence maximization algorithms try to select a set of individuals in social networks that are more influential. The Influence maximization problem is important in marketing and many researchers has researched on it and proposed new algorithms. All proposed algorithms are not scalable and are very time consuming for very large social networks gen...
Article
Full-text available
In this paper, a new group of optimization algorithms named Human Strategy Algorithm (HS) is proposed which is inspired by human strategies to problem solving. The main idea of HS is based on human actions to find the problem’s optima by means of accessible instruments. As the environment of an unknown problem assumed to be a black box, it is suppo...
Article
Full-text available
Community mining is one of the most popular issues in social network analysis. Although various changes may occur in a dynamic social network, they can be classified into two categories, gradual changes and abrupt changes. Many researchers have attempted to propose a method to discover communities in dynamic social networks with various changes mor...
Article
Full-text available
There is an intrinsic adversarial nature in the security domain such as spam filtering and malware detection systems that attempt to mislead the detection system. This adversarial nature makes security applications different from the classical machine learning problems; for instance, an adversary (attacker) might change the distribution of test dat...
Article
Full-text available
Malware is any type of computer program which is developed to harm computers, networks, and information. Noticeable growth of malware development has made computer and network security a significant and challenging area in recent years. There is an intensive competition between malwares and antiviruses. Malware authors make every effort to develop...
Article
Contagions such as information, rumors, infectious diseases, actions, and influence diffuse as cascades in large networks. Each contagion appears in some node and spreads through the nodes over the underlying network. In most cases, the network structure is hidden and we can only observe the times at which nodes are infected by contagions. So, infe...
Article
Influence maximization is the problem of finding a small set of nodes that maximizes the aggregated influence in social networks. The problem of influence maximization in social networks has been explored in many previous researches. All the existing methods have mainly relied on the constraint of binary state for each node which is either inactive...
Article
Full-text available
The advances in social networks has led to the concentration of research on analyzing people’s behaviors in these networks. Accordingly, detecting communities and the interactions between their members is one of the most important issues addressed by these studies. After the proposition of new community detection methods in recent years, due to the...
Article
Social networks have recently become important tools for sharing and exchanging data. They facilitate the rapid propagation and dissemination of information. Therefore, it is essential to provide means for analysing the phenomenon of diffusion in such networks. One of the most important components of a diffusion model is information perception whic...
Article
Social networks have recently become important tools for sharing and exchanging data. They facilitate the rapid propagation and dissemination of information. Therefore, it is essential to provide means for analysing the phenomenon of diffusion in such networks. One of the most important components of a diffusion model is information perception whic...
Article
There is an inherent adversarial nature in security applications like malware detection systems that intends to mislead the detection system. This adversarial nature makes security applications different from the classical machine-learning problem. For instance, an adversary (attacker) might violate the data stationary assumption that is a common a...
Article
Full-text available
Multi-objective evolutionary optimization algorithms are among the best optimizers for solving problems in control systems, engineering and industrial planning. The performance of these algorithms degrades severely due to the loss of selection pressure exerted by the Pareto dominance relation which will cause the algorithm to act randomly. Various...
Article
In recent years, social networks have played a strong role in diffusing information among people all around the globe. Therefore, the ability to analyse the diffusion pattern is essential. A diffusion model can identify the information dissemination pattern in a social network. One of the most important components of a diffusion model is informatio...
Conference Paper
The study of embedded structure of communities in social and information networks is an extensive studies in this domain and vast variety of community detection methods have been proposed. In this paper we proposed a distributed approach for local and overlapping community detection based on the game theory. In our method, each node is a player and...
Article
Communities in social networks are groups of individuals who are connected with specific goals. Discovering information on the structure, members and types of changes of communities have always been of great interest. Despite the extensive global researches conducted on these, discovery has not been confirmed yet and researchers try to find methods...
Conference Paper
Malware is any kind of program that is designed to perform malicious activity in computers and networks. To evade traditional signature-based malware detection techniques, malware developers employ obfuscation techniques. Two main type of obfuscation techniques are polymorphism and metamorphism. New approaches for detecting obfuscated malwares are...
Article
Ranking solutions of the population in an evolutionary algorithm that solves a many objective optimization problem is a challenging task which has been vastly studied in recent years. Loss in the hypervolume of the population when a solution is omitted could be a good measure for ranking solutions but calculating this value for high dimensional pro...
Article
Full-text available
Trust network in social networks can be considered as graph which trustors and trustees are graph vertices and edges present trust between them with measured values. To evaluate trust between trustors and trustees there is some similarity measures to measure similarity between trustors together or trustees together and then by using evaluated value...
Article
Full-text available
Along with the increasing popularity of social web sites, users rely more on the trustworthiness information for many online activities among users. However, such social network data often suffers from two problems, (1)severe data sparsity and are not able to provide users with enough information, (2)dataset’s is very large. Therefore, trust predic...
Article
In this paper, we study the problem of multi-robot target searching in unknown environments. For target searching, robots need an efficient method with respect to their limitations and characteristics of the workspace. Every robotic search algorithm has several constraints. Our goal is to propose a distributed algorithm based on Particle Swarm Opti...
Article
Full-text available
Evolutionary Algorithm provides a framework that is largely applicable to particular problems including multiobjective optimization problems, basically for the ease of their implementation and their capability to perform efficient parallel search. Indeed, in some cases, expensive multiobjective optimization evaluations might be a challenge to restr...
Article
Full-text available
Recently, the hybrid Particle Swarm Optimisation/Ant Colony Optimisation (PSO/ACO) has been proposed for discovery of classification rules. An improved version of this hybrid scheme, PSO/ACO2 algorithm, can directly cope with nominal attributes without converting them into numerical ones. Although PSO/ACO2 can handle nominal values, it suffers from...
Article
Full-text available
Knowledge representation is a key component to the success of all rule based systems including learning classifier systems (LCSs). This component brings insight into how to partition the problem space what in turn seeks prominent role in generalization capacity of the system as a whole. Recently, knowledge representation component has received grea...
Article
Online social networks have recently become an innovative and effective method for spreading information among people around the world. Information diffusion, rumour spreading and diseases infection are all instances of stochastic processes that occur over the edges of social networks. Many prior works have carried out empirical studies and diffusi...
Article
Influence maximization is the problem of finding a small set of nodes that maximizes the aggregated influence in social networks. The problem of influence maximization in social networks has been explored in many previous researches. They have mainly relied on similar temporal chances for every node to influence another; whereas in reality, time pl...
Conference Paper
Malware is a malicious code which intends to harm computers and networks. As malware attacks become pervasive, the security policy of computers is more critical and it is so important to have a well-defined process to detect malware. However to avoid detection of the malware, various concealment strategies are invented regularly. Metamorphism is a...
Conference Paper
In this paper we proposed an evolutionary algorithm to maximize precision of group recommender systems and reducing the online calculations. In this method we try to build a transition matrix that's made by an evolutionary algorithm and then we multiply this transition matrix with user-item rate matrix. By this action we go to a reduced dimension s...
Conference Paper
In recent years, the growth and popularity of social networks have created a new world of collaboration and communication. Team formation is a new research topic in the area of social network analysis. Consider there is a social network of experts and the goal is to form the best possible team out of them for a given project. The best solution is a...
Article
Full-text available
Recently multi-objective clustering has been extensively explored due to its appearance of new applications in many domains. However, in many applications, there is more than a single objective which is needed to be optimized in the context of the application, such as facility location, ad hoc networks and sensor networks. These domains must optimi...
Article
Full-text available
Ant meeting problem is a distributed problem that its purpose is to find an efficient path for ants to meet each other. Actually, ant robots suffer from the low memory and their restricted computational power. They communicate with their environment by leaving some symptoms like pheromones in their surroundings. In the problem of ants meeting, the...
Article
Full-text available
Nowadays, social medias such as Twitter, Memetracker and Blogs have become powerful tools to propagate information. They facilitate quick dissemination sequence of information such as news article, blog posts, user's interests and thoughts through large scale. Providing strong means to analyzing social networks structure and how information diffuse...
Article
Full-text available
nowadays, we face to new malware and other programs we have to protect systems against them. Malware detection is an important issue in computer's field. In this paper we propose a new method to detect malware by API calls. We have developed a fully automated system to extract API call as features effectively from executable files using n-gram stat...