2021 |
---|
A new density-based subspace selection method using mutual information for high dimensional outlier detection . Knowledge-Based Systems : (2021) |
A hybrid distributed batch-stream processing approach for anomaly detection . Information Sciences : (2021) |
Improving Multi-floor WiFi-based Indoor positioning systems by Fingerprint grouping . 5th International Conference on Internet of Things and Applications : (2021) | 2020 |
SAIoT: Scalable Anomaly-aware Services Composition in CloudIoT Environments . IEEE Internet of Things Journal : (2020) |
Skeleton-based structured early activity prediction . Multimedia Tools and Applications : 1-27 (2020) |
A trust management scheme for IoT-enabled environmental health/accessibility monitoring services : I. J. of Information Security 22(1) : 205-217 (2020) |
Switching structured prediction for simple and complex human activity recognition . IEEE Transactions on Cybernetics : (2020) |
SAHAR: a control plane architecture for high available software-defined networks . International Journal of Communication Networks and Distributed Systems: 24(4): 409-440 (2020 ) |
Joint VNF Load Balancing and Service Auto-Scaling in NFV with Multimedia Case Study . 2020 25th International Computer Conference, Computer Society of Iran (CSICC) : 1-7 (2020) | 2019 |
Robust Speech Recognition using Long Short Term Memory Networks and Bottleneck Features. CoRR abs/1901.10629 (2019) |
Language Modeling Using Part-of-speech and Long Short-Term Memory Networks. 2019 9th International Conference on Computer and Knowledge Engineering (ICCKE): 182-187 (2019) |
Improved dynamic match phone lattice search for Persian spoken term detection system in online and offline applications. I. J. Speech Technology 22(1): 205-217 (2019) |
A Convolutional Neural Network model based on Neutrosophy for Noisy Speech Recognition. CoRR abs/1901.10629 (2019) | 2018 |
Discriminative keyword spotting using triphones information and N-best search. Inf. Sci. 423: 157-171 (2018) |
XeniumNFV: A Unified, Dynamic, Distributed and Event-Driven SDN/NFV Testbed. CloudCom 2018: 320-326 |
An IMS-Aware VM Placement in Cloud Environment. CloudCom 2018: 327-334 |
Hierarchical Bayesian Classifier Combination. MLDM (1) 2018: 113-125 |
A Trust Management Scheme for IoT-Enabled Environmental Health/Accessibility Monitoring Services. CoRR abs/1811.07028 (2018) | 2017 |
A Collaborative Load Balancer for Network Intrusion Detection in Cloud Environments. JCP 12(1): 28-47 (2017) |
Delay-Dependent Criteria for Robust Dynamic Stability Control of Articulated Vehicles. RAAD 2017: 424-432 | 2016 |
T-S fuzzy controller design for stabilization of nonlinear networked control systems. Eng. Appl. of AI 50: 135-141 (2016) |
A fast hierarchical search algorithm for discriminative keyword spotting. Inf. Sci. 336: 45-59 (2016) |
An efficient infrastructure based service discovery in vehicular networks using P2P structures. The Journal of Supercomputing 72(3): 1013-1034 (2016) | 2015 |
Binaural source separation based on spatial cues and maximum likelihood model adaptation. Digital Signal Processing 36: 174-183 (2015) |
An enhanced noise resilient K-associated graph classifier. Expert Syst. Appl. 42(21): 8283-8293 (2015) |
A geometric density-based sample reduction method. Intell. Data Anal. 19(6): 1233-1257 (2015) |
A Graph-based Model for RSUs Deployment in Vehicular Networks by Considering Urban and Network Limitations and QoS Requirements of Service Advertisement and Discovery. TIIS 9(5): 1662-1681 (2015) |
Feature engineering for detection of Denial of Service attacks in session initiation protocol. Security and Communication Networks 8(8): 1587-1601 (2015) |
Speech enhancement using a wavelet thresholding method based on symmetric Kullback-Leibler divergence. Signal Processing 106: 184-197 (2015) | 2014 |
A fast anomaly detection system using probabilistic artificial immune algorithm capable of learning new attacks. Evolutionary Intelligence 6(3): 135-156 (2014) |
An improved feature transformation method using mutual information. I. J. Speech Technology 17(2): 107-115 (2014) |
Evolutionary combination of kernels for nonlinear feature transformation. Inf. Sci. 274: 95-107 (2014) |
Extension of a Kernel-Based Classifier for Discriminative Spoken Keyword Spotting. Neural Processing Letters 39(2): 195-218 (2014) |
A Clustering Density-Based Sample Reduction Method. Canadian Conference on AI 2014: 319-325 |
A Noise Resilient and Non-parametric Graph-based Classifier. KDIR 2014: 170-175 |
Improving keyword detection rate using a set of rules to merge HMM-based and SVM-based keyword spotting results. ICACCI 2014: 1715-1718 | 2013 |
Keyword spotting using an evolutionary-based classifier and discriminative features. Eng. Appl. of AI 26(7): 1660-1670 (2013) |
Detecting keywords in Persian conversational telephony speech using a discriminative English keyword spotter. ISSPIT 2013: 272-276 | 2012 |
Overload control in SIP networks using no explicit feedback: A window based approach. Computer Communications 35(12): 1472-1483 (2012) |
Improving linear discriminant analysis with artificial immune system-based evolutionary algorithms. Inf. Sci. 189: 219-232 (2012) |
New class-dependent feature transformation for intrusion detection systems. Security and Communication Networks 5(12): 1296-1311 (2012) |
A Real Time Anomaly Detection System Based on Probabilistic Artificial Immune Based Algorithm. ICARIS 2012: 205-217 | 2011 |
Genetic-based minimum classification error mapping for accurate identifying Peer-to-Peer applications in the internet traffic. Expert Syst. Appl. 38(6): 6417-6423 (2011) |
Optimized discriminative transformations for speech features based on minimum classification error. Pattern Recognition Letters 32(7): 948-955 (2011) |
Evolutionary eigenvoice MLLR speaker adaptation. WCIT 2011: 992-997 |
Performance evaluation for an HMM-based keyword spotter and a large-margin based one in noisy environments. WCIT 2011: 1018-1022 | 2010 |
Discriminative transformation for speech features based on genetic algorithm and HMM likelihoods. IEICE Electronic Express 7(4): 247-253 (2010) |
Controlling Overload in SIP Proxies: An Adaptive Window Based Approach Using No Explicit Feedback. GLOBECOM 2010: 1-5 |
Overload control in SIP servers: Evaluation and improvement. ICT 2010: 666-672 |
New Approach in Transform-Based Speaker Adaptation Using Minimum Classification Error. UKSim 2010: 295-298 | 2009 |
Noise cross PSD estimation using phase information in diffuse noise field. Signal Processing 89(5): 703-709 (2009) |
Noise power spectrum estimation using constrained variance spectral smoothing and minima tracking. Speech Communication 51(11): 1098-1113 (2009) |
Evolutionary-class independent LDA as a pre-process for improving classification. GECCO 2009: 1909-1910 |
Robust speech recognition using evolutionary class-dependent LDA. GECCO (Companion) 2009: 2109-2114 |
An objective measure for the musical noise assessment in noise reduction systems. ICASSP 2009: 4429-4432 |
Power level difference as a criterion for speech enhancement. ICASSP 2009: 4653-4656 |
LDA Pre-processing for Classification: Class-Dependent Single Objective GA and Multi-objective GA Approaches. IDEAL 2009: 457-464 |
Configuration of a SIP Signaling Network: An Experimental Analysis. NCM 2009: 76-81 | 2008 |
A dual microphone coherence based method for speech enhancement in headsets. INTERSPEECH 2008: 431-434 |
A wavelet based speech enhancement method using noise classification and shaping. INTERSPEECH 2008: 561-564 |
Genetic programming based optimization of class-dependent PCA for extracting robust MFCC. INTERSPEECH 2008: 1541-1544 | 2007 |
SNR-dependent compression of enhanced Mel sub-band energies for compensation of noise effects on MFCC features. Pattern Recognition Letters 28(11): 1320-1326 (2007) |
Mel sub-band filtering and compression for robust speech recognition. INTERSPEECH 2007: 1102-1105 | 2006 |
Spectral peaks enhancement for extracting robust speech features. EUSIPCO 2006: 1-5 |
A framework for robust MFCC feature extraction using SNR-dependent compression of enhanced mel filter bank energies. INTERSPEECH 2006 | 2005 |
Improved HMM entropy for robust sub-band speech recognition. EUSIPCO 2005: 1-4 |
Sub-band weighted projection measure for robust sub-band speech recognition. INTERSPEECH 2005: 945-948 | 2004 |
Application of wavelet transform and wavelet thresholding in robust sub-band speech recognition. EUSIPCO 2004: 345-348 | 2001 |
Motivation from a Full-Rate Specific Design to a DSP Core Approach for GSM Vocoders. FPL 2001: 388-397 |