


default search action
Mojtaba Vahidi-Asl
Person information
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j20]Saeed Amiri-Chimeh, Hassan Haghighi, Mojtaba Vahidi-Asl:
JAHAN: A framework for procedural generation of game maps from design specifications. Entertain. Comput. 50: 100644 (2024) - 2023
- [j19]Morteza RezaeiZadeh
, Raazieh Mohagheghiaan, Mojtaba Vahidi-Asl:
Critical meta-analysis of problem-solving serious games: Clear signs of pedagogists' disengagement and over-optimistic expectations. Int. J. Serious Games 10(2): 85-113 (2023) - [j18]Saeed Amiri-Chimeh, Hassan Haghighi, Mojtaba Vahidi-Asl:
Ravi: A formal framework for authoring interactive narratives. New Rev. Hypermedia Multim. 29(3-4): 167-205 (2023) - [j17]Behnam Khazael
, Mojtaba Vahidi-Asl, Hadi Tabatabaee Malazi
:
Geospatial complex event processing in smart city applications. Simul. Model. Pract. Theory 122: 102675 (2023) - 2022
- [j16]Amirabbas Majd, Mojtaba Vahidi-Asl, Alireza Khalilian
, Babak Bagheri:
ConsilientSFL: using preferential voting system to generate combinatorial ranking metrics for spectrum-based fault localization. Appl. Intell. 52(10): 11068-11088 (2022) - [j15]Meysam Valueian, Mojtaba Vahidi-Asl, Alireza Khalilian
:
SituRepair: Incorporating machine-learning fault class prediction to inform situational multiple fault automatic program repair. Int. J. Crit. Infrastructure Prot. 37: 100527 (2022) - 2021
- [j14]Maryam Raiyat Aliabadi, Margo I. Seltzer, Mojtaba Vahidi-Asl, Ramak Ghavamizadeh:
ARTINALI#: An Efficient Intrusion Detection Technique for Resource-Constrained Cyber-Physical Systems. Int. J. Crit. Infrastructure Prot. 33: 100430 (2021) - [j13]Mohammad Nosrati, Hassan Haghighi, Mojtaba Vahidi-Asl:
Test data generation using genetic programming. Inf. Softw. Technol. 130: 106446 (2021) - [j12]Maryam Raiyat Aliabadi, Mojtaba Vahidi-Asl, Ramak Ghavamizadeh:
ARTINALI++: Multi-dimensional Specification Mining for Complex Cyber-Physical System Security. J. Syst. Softw. 180: 111016 (2021) - 2020
- [j11]Amirabbas Majd, Mojtaba Vahidi-Asl, Alireza Khalilian
, Pooria Poorsarvi-Tehrani, Hassan Haghighi:
SLDeep: Statement-level software defect prediction using deep-learning model on static code features. Expert Syst. Appl. 147: 113156 (2020) - [j10]Mohammad Nosrati
, Hassan Haghighi, Mojtaba Vahidi-Asl:
Using likely invariants for test data generation. J. Syst. Softw. 164: 110549 (2020)
2010 – 2019
- 2019
- [j9]Alireza Khalilian
, Alireza Mirzaeiyan, Mojtaba Vahidi-Asl, Hassan Haghighi:
Experiments with automatic software piracy detection utilising machine-learning classifiers for micro-signatures. J. Exp. Theor. Artif. Intell. 31(2): 267-289 (2019) - [j8]Amirabbas Majd, Mojtaba Vahidi-Asl, Alireza Khalilian
, Ahmad Baraani-Dastjerdi, Bahman Zamani
:
Code4Bench: A multidimensional benchmark of Codeforces data for different program analysis techniques. J. Comput. Lang. 53: 38-52 (2019) - [c15]Sharmin Moosavi, Hassan Haghighi, Hasti Sahabi, Farzam Vatanzade, Mojtaba Vahidi-Asl:
Greenify: A Game with the Purpose of Test Data Generation for Unit Testing. FSEN 2019: 77-92 - [c14]Babak Bagheri, Mohammad Rezaalipour, Mojtaba Vahidi-Asl:
An Approach to Generate Effective Fault Localization Methods for Programs. FSEN 2019: 244-259 - 2018
- [j7]Alireza Khalilian
, Amir Nourazar, Mojtaba Vahidi-Asl, Hassan Haghighi:
G3MD: Mining frequent opcode sub-graphs for metamorphic malware detection of existing families. Expert Syst. Appl. 112: 15-33 (2018) - [j6]Saeed Amiri-Chimeh
, Hassan Haghighi, Mojtaba Vahidi-Asl, Kamyar Setayesh-Ghajar, Farshad Gholami-Ghavamabad:
Rings: A Game with a Purpose for Test Data Generation. Interact. Comput. 30(1): 1-30 (2018) - [j5]Azadeh Zamanifar
, Eslam Nazemi
, Mojtaba Vahidi-Asl:
A Mobility Solution for Hazardous Areas Based on 6LoWPAN. Mob. Networks Appl. 23(6): 1539-1554 (2018) - 2017
- [j4]Azadeh Zamanifar
, Eslam Nazemi
, Mojtaba Vahidi-Asl:
DSHMP-IOT: A distributed self healing movement prediction scheme for internet of things applications. Appl. Intell. 46(3): 569-589 (2017) - [j3]Azadeh Zamanifar
, Eslam Nazemi
, Mojtaba Vahidi-Asl:
DMP-IOT: A distributed movement prediction scheme for IOT health-care applications. Comput. Electr. Eng. 58: 310-326 (2017) - 2015
- [j2]Saeed Parsa, Mojtaba Vahidi-Asl, Farzaneh Zareie:
Statistical Based Slicing Method for Prioritizing Program Fault Relevant Statements. Comput. Informatics 34(4): 823-857 (2015) - 2014
- [j1]Saeed Parsa
, Mojtaba Vahidi-Asl, Maryam Asadi-Aghbolaghi
:
Hierarchy-Debug: a scalable statistical technique for fault localization. Softw. Qual. J. 22(3): 427-466 (2014) - 2011
- [c13]Saeed Parsa
, Hamid Rafati PorShokooh, Saman Teymouri, Mojtaba Vahidi-Asl:
A Heuristic Test Data Generation Approach for Program Fault Localization. AICI (1) 2011: 236-243 - [c12]Saeed Parsa
, Maryam Asadi-Aghbolaghi
, Mojtaba Vahidi-Asl:
Statistical Debugging Using a Hierarchical Model of Correlated Predicates. AICI (1) 2011: 251-256 - [c11]Zaynab Mousavian
, Mojtaba Vahidi-Asl, Saeed Parsa
:
Finding software fault relevant subgraphs a new graph mining approach for software debugging. CCECE 2011: 908-911 - [c10]Zaynab Mousavian
, Mojtaba Vahidi-Asl, Saeed Parsa
:
Scalable graph analyzing approach for software fault-localization. AST 2011: 15-21 - [c9]Saeed Parsa
, Farzaneh Zareie, Mojtaba Vahidi-Asl:
Fuzzy Clustering the Backward Dynamic Slices of Programs to Identify the Origins of Failure. SEA 2011: 352-363 - 2010
- [c8]Saeed Parsa
, Somaye Arabi Naree, Neda Ebrahimi, Mojtaba Vahidi-Asl:
Finding Discriminative Weighted Sub-graphs to Identify Software Bugs. BAIP 2010: 305-309 - [c7]Saeed Parsa
, Azam Peyvandi-Pour
, Mojtaba Vahidi-Asl:
Introducing a New Predicate Network Model Constructed Based on Null Hypothesis Testing for Software Fault Localization. ICICA (LNCS) 2010: 197-204
2000 – 2009
- 2009
- [c6]Saeed Parsa
, Mojtaba Vahidi-Asl, Somaye Arabi Naree, Behrouz Minaei-Bidgoli
:
Software Fault Localization Using Elastic Net: A New Statistical Approach. FGIT-ASEA 2009: 127-134 - 2008
- [c5]Saeed Parsa
, Somaye Arabi Naree, Mojtaba Vahidi-Asl:
A Learning Approach to Early Bug Prediction in Deployed Software. AIMSA 2008: 400-404 - [c4]Saeed Parsa
, Somaye Arabi Naree, Mojtaba Vahidi-Asl:
Early Bug Detection in Deployed Software Using Support Vector Machine. CSICC 2008: 518-525 - [c3]Saeed Parsa
, Mojtaba Vahidi-Asl, Somaye Arabi Naree:
Finding Causes of Software Failure Using Ridge Regression and Association Rule Generation Methods. SNPD 2008: 873-878 - 2007
- [c2]Alireza Saberi, Mojtaba Vahidi, Behrouz Minaei-Bidgoli:
Learn to Detect Phishing Scams Using Learning and Ensemble ?Methods. Web Intelligence/IAT Workshops 2007: 311-314 - [c1]Mohsen Sharifi, Alireza Saberi, Mojtaba Vahidi, Mohammad Zoroufi:
A Zero Knowledge Password Proof Mutual Authentication Technique Against Real-Time Phishing Attacks. ICISS 2007: 254-258
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-01-21 00:23 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint