Dangerous skills got certified: Measuring the trustworthiness of skill certification in voice personal assistant platforms L Cheng, C Wilson, S Liao, J Young, D Dong, H Hu Proceedings of the 2020 ACM SIGSAC Conference on Computer and Communications …, 2020 | 82 | 2020 |
{SkillDetective}: Automated {Policy-Violation} detection of voice assistant applications in the wild J Young, S Liao, L Cheng, H Hu, H Deng 31st USENIX Security Symposium (USENIX Security 22), 2022 | 35 | 2022 |
Configurable anonymous authentication schemes for the Internet of Things (IoT) A Rasheed, RR Hashemi, A Bagabas, J Young, C Badri, K Patel 2019 IEEE International Conference on RFID (RFID), 1-8, 2019 | 14 | 2019 |
An RNN Model for Exploring the Macroeconomic and Financial Indicators in the Context of the COVID-19 Pandemic RR Hashemi, OM Ardakani, JA Young, AG Baharami 2022 International Conference on Computational Science and Computational …, 2022 | 4 | 2022 |
Extraction of the Essential Constituents of the S&P 500 Index RR Hashemi, OM Ardakani, AA Bahrami, JA Young 2017 international conference on computational science and computational …, 2017 | 4 | 2017 |
A Mediated Multi-RNN Hybrid System for Prediction of Stock Prices RR Hashemi, OM Ardakani, AA Bahrami, JA Young 2020 International Conference on Computational Science and Computational …, 2020 | 3 | 2020 |
A Mining Driven Decision Support System for Joining the European Monetary Union RR Hashemi, O Ardakani, A Bahrami, J Young, R Campbell The Eighth International Conference on Advances in Information Mining and …, 2018 | 3 | 2018 |
Vaccine: A Block Cipher Method for Masking and Unmasking of Ciphertexts’ Features RR Hashemi, A Rasheed, A Bahrami, J Young The Second International Conference on Cyber-Technologies and Cyber-Systems …, 2017 | 2 | 2017 |
Mining the Impact of Social Media on High-Frequency Financial data RR Hashemi, OM Ardakani, JA Young, C Tamrakar 2021 International Conference on Computational Science and Computational …, 2021 | 1 | 2021 |
Discovery of burglary hotspots and extraction of their features A Little, RR Hashemi, JA Young 2020 International Conference on Computational Science and Computational …, 2020 | 1 | 2020 |
A Methodological Framework for Validating ZKP Authentication Process JA Young, A Rasheed, RR Heshemi, A Bagabas 2020 IEEE 17th International Conference on Smart Communities: Improving …, 2020 | 1 | 2020 |
IoT Security Through Device Profiling JA Young | 1 | 2019 |
10 RNN models for evaluating financial indices: examining volatility and demand-supply shifts in financial markets during COVID-19 RR Hashemi, OM Ardakani, J Young, AG Bahrami Big Data, Data Mining and Data Science: Algorithms, Infrastructures …, 2024 | | 2024 |
Effects of Phenotypical Patterns on Epigenetic Markers RR Hashemi, AA Bahrami, JA Young, A Schrey, T Robbins, A Ragsdale, ... 2018 International Conference on Computational Science and Computational …, 2018 | | 2018 |
A Block Cipher Masking Technique for Single and Multi-Paired-User Environments RR Hashemi, A Rasheed, J Young, AA Bahrami International Journal on Advances in Security 11 (1-2), 180, 2018 | | 2018 |
Mining Diatom Algae Fossil Data for Discovering Past Lake Salinity RR Hashemi, AA Bahrami, JA Young, NR Tyler, JYS Hodgson IADIS International Journal on Computer Science & Information Systems 12 (2), 2017 | | 2017 |
An Ecological-Based Genetic Investigation Using Association Analysis Approach BIOCOMP’16 RR Hashemi, A Bahrami, JA Young, AW Schrey Proceedings of the 17th International Conference on Bioinformatics and …, 2017 | | 2017 |
Extraction of Historical Water Salinity from Diatom Algae Fossils: A Data Mining Approach RR Hashemi, AA Bahrami, JA Young, NR Tyler, J Hodgson | | 2016 |
A Grid Based Analysis Approach for Learning From Sparse Data RR Hashemi, M Bahar, N Tang, J Young | | 2003 |
Privacy Preserved Authentication: A Neural Network Approach RR Hashemi, A Rasheed, J Young, AA Bahrami | | |