default search action
Reza Azmi
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j17]Fatemeh Khanmohammadi, Reza Azmi:
Time-Series Anomaly Detection in Automated Vehicles Using D-CNN-LSTM Autoencoder. IEEE Trans. Intell. Transp. Syst. 25(8): 9296-9307 (2024) - [j16]Melika Mosayebi, Reza Azmi:
Cost-effective clonal selection and AIS-based load balancing in cloud computing environment. J. Supercomput. 80(16): 23271-23310 (2024) - [i5]Mehrimah Amirpour, Reza Azmi:
PRFashion24: A Dataset for Sentiment Analysis of Fashion Products Reviews in Persian. CoRR abs/2405.18060 (2024) - 2023
- [c16]Hosna Darvishi, Reza Azmi, Fatemeh Moradian, Maral Zarvani:
Fashion Compatibility Learning Via Triplet-Swin Transformer. CSICC 2023: 1-5 - [c15]Zahra Haghgu, Reza Azmi, Lachin Zamani, Fatemeh Moradian:
OutCLIP, A New Multi-Outfit CLIP Based Triplet Network. CSICC 2023: 1-7 - 2022
- [i4]Narges Norouzi, Reza Azmi, Sara Saberi Tehrani Moghadam, Maral Zarvani:
SnapMode: An Intelligent and Distributed Large-Scale Fashion Image Retrieval Platform Based On Big Data and Deep Generative Adversarial Network Technologies. CoRR abs/2204.03998 (2022) - 2021
- [j15]Negar Moslemi, Mohsen Soryani, Reza Azmi:
Computer vision-based recognition of driver distraction: A review. Concurr. Comput. Pract. Exp. 33(24) (2021) - [j14]Mohammadsadegh Vahidi Farashah, Akbar Etebarian, Reza Azmi, Reza Ebrahimzadeh Dastjerdi:
An analytics model for TelecoVAS customers' basket clustering using ensemble learning approach. J. Big Data 8(1): 1-24 (2021) - [j13]Mohammadsadegh Vahidi Farashah, Akbar Etebarian, Reza Azmi, Reza Ebrahimzadeh Dastjerdi:
A hybrid recommender system based-on link prediction for movie baskets analysis. J. Big Data 8(1): 32 (2021) - [j12]Samaneh Jamshidi, Reza Azmi, Mehran Sharghi, Mohsen Soryani:
Hierarchical deep neural networks to detect driver drowsiness. Multim. Tools Appl. 80(10): 16045-16058 (2021) - [i3]Narges Norouzi, Reza Azmi, Nooshin Noshiri, Robab Anbiaee:
A New Automatic Change Detection Frame-work Based on Region Growing and Weighted Local Mutual Information: Analysis of Breast Tumor Response to Chemotherapy in Serial MR Images. CoRR abs/2110.10242 (2021) - 2020
- [j11]Soodeh Bakhshandeh, Reza Azmi, Mohammad Teshnehlab:
Symmetric uncertainty class-feature association map for feature selection in microarray dataset. Int. J. Mach. Learn. Cybern. 11(1): 15-32 (2020) - [i2]Mahsa Ghanavatinasab, Mastaneh Bahmani, Reza Azmi:
SAF: Simulated Annealing Fair Scheduling for Hadoop Yarn Clusters. CoRR abs/2008.12586 (2020)
2010 – 2019
- 2016
- [j10]Razieh Ganjee, Reza Azmi, Mohsen Ebrahimi Moghaddam:
A Novel Microaneurysms Detection Method Based on Local Applying of Markov Random Field. J. Medical Syst. 40(3): 74:1-74:9 (2016) - [c14]Zohreh Kohan, Reza Azmi:
Hippocampus shape analysis for temporal lobe epilepsy detection in magnetic resonance imaging. Medical Imaging: Biomedical Applications in Molecular, Structural, and Functional Imaging 2016: 97882T - [i1]Zohreh Kohan, Hamidreza Farhidzadeh, Reza Azmi, Behrouz Gholizadeh:
Hippocampus Temporal Lobe Epilepsy Detection using a Combination of Shape-based Features and Spherical Harmonics Representation. CoRR abs/1612.00338 (2016) - 2015
- [j9]Ghazaleh Javadzadeh, Reza Azmi:
IDuFG: Introducing an Intrusion Detection using Hybrid Fuzzy Genetic Approach. Int. J. Netw. Secur. 17(6): 754-770 (2015) - 2014
- [j8]Neda Afzali Seresht, Reza Azmi:
MAIS-IDS: A distributed intrusion detection system using multi-agent AIS approach. Eng. Appl. Artif. Intell. 35: 286-298 (2014) - [j7]Razieh Ganjee, Reza Azmi, Behrouz Gholizadeh:
An Improved Retinal Vessel Segmentation Method Based on High Level Features for Pathological Images. J. Medical Syst. 38(9): 108 (2014) - 2013
- [j6]Maryam Bahojb Imani, Mohammad Reza Keyvanpour, Reza Azmi:
A Novel Embedded Feature Selection Method: a Comparative Study in the Application of Text Categorization. Appl. Artif. Intell. 27(5): 408-427 (2013) - [j5]Reza Azmi, Boshra Pishgoo:
SHADuDT: Secure hypervisor-based anomaly detection using danger theory. Comput. Secur. 39: 268-288 (2013) - [j4]Reza Azmi, Boshra Pishgoo:
STLR: a novel danger theory based structural TLR algorithm. ISC Int. J. Inf. Secur. 5(2): 209-225 (2013) - [c13]Zahra Salek, Fariborz Mousavi Madani, Reza Azmi:
Intrusion detection using neuarl networks trained by differential evaluation algorithm. ISCISC 2013: 1-6 - [c12]Zahra Khani, Reza Azmi:
A protocol for simultaneous use of confidentiality and integrity in large-scale storage systems. SIN 2013: 400-403 - 2012
- [j3]Hammad Afzali, Hamed Nemati, Reza Azmi:
Private Key based query on encrypted data. ISC Int. J. Inf. Secur. 4(1): 41-50 (2012) - [j2]Sahar Yousefi, Reza Azmi, Morteza Zahedi:
Brain tissue segmentation in MR images based on a hybrid of MRF and social algorithms. Medical Image Anal. 16(4): 840-848 (2012) - 2011
- [c11]Mozhgan Azimpour-Kivi, Reza Azmi:
Applying Sequence Alignment in Tracking Evolving Clusters of Web-Sessions Data: An Artificial Immune Network Approach. CICSyN 2011: 42-47 - [c10]Sharareh Shakoori Moghadam Monfared, Reza Azmi:
Recognition of a Subset of Most Common Persian Words Using Zernike Moments and Back-Propagation Neural Network. CICSyN 2011: 247-252 - [c9]Zahra Masdarolomoor, Sadegh Aliakbary, Reza Azmi, Noushin Riahi:
Distributed Community Detection in Complex Networks. CICSyN 2011: 281-286 - [c8]Zahra Masdarolomoor, Reza Azmi, Sadegh Aliakbary, Noushin Riahi:
Finding Community Structure in Complex Networks Using Parallel Approach. EUC 2011: 474-479 - [c7]Farshad Rahimiasl, Reza Azmi:
SeKMAC: A secure model for key management and access control in cryptographic file system. ICITST 2011: 732-737 - [c6]Elahe Borghei, Reza Azmi, Alireza Ghahremanian, Hamed Nemati:
Virtual machine based security architecture. WorldCIS 2011: 210-215 - [c5]Maryam Bahojb Imani, Mohammad Reza Keyvanpour, Reza Azmi:
Semi-supervised Persian font recognition. WCIT 2011: 336-342 - 2010
- [c4]Masoud Rezaei, Nafise Sadat Moosavi, Hamed Nemati, Reza Azmi:
TCvisor: A hypervisor level secure storage. ICITST 2010: 1-9
2000 – 2009
- 2009
- [c3]Negar Almassian, Reza Azmi, Sarah Berenji:
AIDSLK: An Anomaly Based Intrusion Detection System in Linux Kernel. ICISTM 2009: 232-243 - 2007
- [c2]Mona Omidyeganeh, Reza Azmi, Kambiz Nayebi, Abbas Javadtalab:
A New Method to Improve Multi Font Farsi/Arabic Character Segmentation Results: Using Extra Classes of Some Character Combinations. MMM (1) 2007: 670-679 - 2005
- [c1]Mona Omidyeganeh, Kambiz Nayebi, Reza Azmi, Abbas Javadtalab:
A New Segmentation Technique for Multi Font Farsi/Arabic Texts. ICASSP (2) 2005: 757-760 - 2001
- [j1]Reza Azmi, Ehsanollah Kabir:
A new segmentation technique for omnifont Farsi text. Pattern Recognit. Lett. 22(2): 97-104 (2001)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-08-29 21:54 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint