default search action
Bahman Arasteh
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2025
- [j58]Amin Golzari Oskouei, Nasim Abdolmaleki, Asgarali Bouyer, Bahman Arasteh, Kimia Shirini:
Efficient superpixel-based brain MRI segmentation using multi-scale morphological gradient reconstruction and quantum clustering. Biomed. Signal Process. Control. 100: 107063 (2025) - [j57]Tohid Jafarian, Ali Ghaffari, Ali Seyfollahi, Bahman Arasteh:
Detecting and mitigating security anomalies in Software-Defined Networking (SDN) using Gradient-Boosted Trees and Floodlight Controller characteristics. Comput. Stand. Interfaces 91: 103871 (2025) - 2024
- [j56]Alireza Rouhi, Asgarali Bouyer, Bahman Arasteh, Xiaoyang Liu:
Two-pronged feature reduction in spectral clustering with optimized landmark selection. Appl. Soft Comput. 161: 111775 (2024) - [j55]Hao Wang, Bahman Arasteh, Keyvan Arasteh, Farhad Soleimanian Gharehchopogh, Alireza Rouhi:
A software defect prediction method using binary gray wolf optimizer and machine learning algorithms. Comput. Electr. Eng. 118: 109336 (2024) - [j54]Asgarali Bouyer, Pouya Shahgholi, Bahman Arasteh, Erfan Babaee Tirkolaee:
Local core expanding-based label diffusion and local deep embedding for fast community detection algorithm in social networks. Comput. Electr. Eng. 119: 109502 (2024) - [j53]Amir Vafid Hanafi, Ali Ghaffari, Hesam Rezaei, Aida Valipour, Bahman Arasteh:
Intrusion detection in internet of things using improved binary golden jackal optimization algorithm and LSTM. Clust. Comput. 27(3): 2673-2690 (2024) - [j52]Ali Ghaffari, Nasim Jelodari, Samira pouralish, Nahideh Derakhshanfard, Bahman Arasteh:
Securing internet of things using machine and deep learning methods: a survey. Clust. Comput. 27(7): 9065-9089 (2024) - [j51]Ali Hosseinalipour, Reza Ghanbarzadeh, Bahman Arasteh, Farhad Soleimanian Gharehchopogh, Seyedali Mirjalili:
A metaheuristic approach based on coronavirus herd immunity optimiser for breast cancer diagnosis. Clust. Comput. 27(7): 9451-9475 (2024) - [j50]Bahman Arasteh, Keyvan Arasteh, Ali Ghaffari, Reza Ghanbarzadeh:
A new binary chaos-based metaheuristic algorithm for software defect prediction. Clust. Comput. 27(7): 10093-10123 (2024) - [j49]Bahman Arasteh, Sahar Golshan, Shiva Shami, Farzad Kiani:
Sahand: A Software Fault-Prediction Method Using Autoencoder Neural Network and K-Means Algorithm. J. Electron. Test. 40(2): 229-243 (2024) - [j48]Leiqing Zheng, Bahman Arasteh, Mahsa Nazeri Mehrabani, Amir Vahide Abania:
An Automatic Software Testing Method to Discover Hard-to-Detect Faults Using Hybrid Olympiad Optimization Algorithm. J. Electron. Test. 40(4): 539-556 (2024) - [j47]Hamed Danesh, Mohammadbagher Karimi, Bahman Arasteh:
CMShark: A NetFlow and machine-learning based crypto-jacking intrusion-detection method. Intell. Decis. Technol. 18(3): 2255-2273 (2024) - [j46]Mahdi Abdollahi, Asgarali Bouyer, Bahman Arasteh:
A new accurate and fast convergence cuckoo search algorithm for solving constrained engineering optimization problems. Intell. Decis. Technol. 18(3): 2307-2337 (2024) - [j45]Asgarali Bouyer, Moslem Mohammadi, Bahman Arasteh:
Identifying influential nodes based on new layer metrics and layer weighting in multiplex networks. Knowl. Inf. Syst. 66(2): 1011-1035 (2024) - [j44]Bahman Arasteh, Babak Aghaei, Asgarali Bouyer, Keyvan Arasteh:
A quality-of-service aware composition-method for cloud service using discretized ant lion optimization algorithm. Knowl. Inf. Syst. 66(7): 4199-4220 (2024) - [j43]Bahman Arasteh, Babak Aghaei, Behnoud Farzad, Keyvan Arasteh, Farzad Kiani, Mahsa Torkamanian-Afshar:
Detecting SQL injection attacks by binary gray wolf optimizer and machine learning algorithms. Neural Comput. Appl. 36(12): 6771-6792 (2024) - [j42]Bahman Arasteh, Ali Ghaffari:
Efficient software mutation test by clustering the single-line redundant mutants. Data Technol. Appl. 58(5): 807-837 (2024) - [j41]Bahman Arasteh, Ali Ghaffari, Milad Khadir, Mahsa Torkamanian-Afshar, Sajad Pirahesh:
Effective test-data generation using the modified black widow optimization algorithm. Signal Image Video Process. 18(6-7): 5333-5346 (2024) - [j40]Bahman Arasteh, Ali Ghaffari:
A Cost-effective and Machine-learning-based method to identify and cluster redundant mutants in software mutation testing. J. Supercomput. 80(12): 16711-16743 (2024) - [j39]Bahman Arasteh, Ali Ghaffari:
Correction: A Cost-effective and Machine-learning-based method to identify and cluster redundant mutants in software mutation testing. J. Supercomput. 80(13): 19943 (2024) - [j38]Amir Vafid Hanafi, Nadir Ibrahimoglu, Ali Ghaffari, Bahman Arasteh:
Hybrid of COOT Optimization Algorithm with Genetic Algorithm for Sensor Nodes Clustering Using Software Defined Network. Wirel. Pers. Commun. 138(3): 1615-1647 (2024) - 2023
- [j37]Zohre Majidian, Shiva TaghipourEivazi, Bahman Arasteh, Shahram Babaie:
An intrusion detection method to detect denial of service attacks using error-correcting output codes and adaptive neuro-fuzzy inference. Comput. Electr. Eng. 106: 108600 (2023) - [j36]Bahman Arasteh, Peri Gunes, Asgarali Bouyer, Farhad Soleimanian Gharehchopogh, Hamed Alipour-Banaei, Reza Ghanbarzadeh:
A Modified Horse Herd Optimization Algorithm and Its Application in the Program Source Code Clustering. Complex. 2023: 3988288:1-3988288:16 (2023) - [j35]Bahman Arasteh, Reza Ghanbarzadeh, Farhad Soleimanian Gharehchopogh, Ali Hosseinalipour:
Generating the structural graph-based model from a program source-code using chaotic forrest optimization algorithm. Expert Syst. J. Knowl. Eng. 40(6) (2023) - [j34]Asgarali Bouyer, Hamid Ahmadi Beni, Bahman Arasteh, Zahra Aghaee, Reza Ghanbarzadeh:
FIP: A fast overlapping community-based influence maximization algorithm using probability coefficient of global diffusion in social networks. Expert Syst. Appl. 213(Part): 118869 (2023) - [j33]Bahman Arasteh, Farhad Soleimanian Gharehchopogh, Peri Gunes, Farzad Kiani, Mahsa Torkamanian-Afshar:
A Novel Metaheuristic Based Method for Software Mutation Test Using the Discretized and Modified Forrest Optimization Algorithm. J. Electron. Test. 39(3): 347-370 (2023) - [j32]Zeinab Asghari, Bahman Arasteh, Abbas Koochari:
Effective Software Mutation-Test Using Program Instructions Classification. J. Electron. Test. 39(5): 631-657 (2023) - [j31]Asgarali Bouyer, Maryam Sabavand Monfared, Esmaeil Nourani, Bahman Arasteh:
Discovering overlapping communities using a new diffusion approach based on core expanding and local depth traveling in social networks. Int. J. Gen. Syst. 52(8): 991-1019 (2023) - [j30]Farhad Soleimanian Gharehchopogh, Benyamin Abdollahzadeh, Saeid Barshandeh, Bahman Arasteh:
A multi-objective mutation-based dynamic Harris Hawks optimization for botnet detection in IoT. Internet Things 24: 100952 (2023) - [j29]Seyed Salar Sefati, Bahman Arasteh, Simona Halunga, Octavian Fratu, Asgarali Bouyer:
Meet User's Service Requirements in Smart Cities Using Recurrent Neural Networks and Optimization Algorithm. IEEE Internet Things J. 10(24): 22256-22269 (2023) - [j28]Hamid Ahmadi Beni, Asgarali Bouyer, Sevda Azimi, Alireza Rouhi, Bahman Arasteh:
A fast module identification and filtering approach for influence maximization problem in social networks. Inf. Sci. 640: 119105 (2023) - [j27]Bahman Arasteh, Razieh Sadegi, Keyvan Arasteh, Peri Gunes, Farzad Kiani, Mahsa Torkamanian-Afshar:
A bioinspired discrete heuristic algorithm to generate the effective structural model of a program source code. J. King Saud Univ. Comput. Inf. Sci. 35(8): 101655 (2023) - [j26]Bahman Arasteh, Mohammadbagher Karimi, Razieh Sadegi:
Düzen: generating the structural model from the software source code using shuffled frog leaping algorithm. Neural Comput. Appl. 35(3): 2487-2502 (2023) - [j25]Bahman Arasteh:
Clustered design-model generation from a program source code using chaos-based metaheuristic algorithms. Neural Comput. Appl. 35(4): 3283-3305 (2023) - [j24]Bahman Arasteh, Tofigh Allahviranloo, Peri Funes, Mahsa Torkamanian-Afshar, Manju Khari, Muammer Catak:
A discrete heuristic algorithm with swarm and evolutionary features for data replication problem in distributed systems. Neural Comput. Appl. 35(31): 23177-23197 (2023) - [j23]Bahman Arasteh, Amir Seyyedabbasi, Jawad Rasheed, Adnan M. Abu-Mahfouz:
Program Source-Code Re-Modularization Using a Discretized and Modified Sand Cat Swarm Optimization Algorithm. Symmetry 15(2): 401 (2023) - [j22]Bahman Arasteh, Seyed Salar Sefati, Simona Halunga, Octavian Fratu, Tofigh Allahviranloo:
A Hybrid Heuristic Algorithm Using Artificial Agents for Data Replication Problem in Distributed Systems. Symmetry 15(2): 487 (2023) - [j21]Wenguang Fan, Bahman Arasteh, Asgarali Bouyer, Vahid Majidnezhad:
A divide and conquer based development of gray wolf optimizer and its application in data replication problem in distributed systems. J. Supercomput. 79(17): 19396-19430 (2023) - 2022
- [j20]Bahman Arasteh, Mohammad Abdi, Asgarali Bouyer:
Program source code comprehension by module clustering using combination of discretized gray wolf and genetic algorithms. Adv. Eng. Softw. 173: 103252 (2022) - [j19]Bahman Arasteh, Seyed Mohammad Javad Hosseini:
Traxtor: An Automatic Software Test Suit Generation Method Inspired by Imperialist Competitive Optimization Algorithms. J. Electron. Test. 38(2): 205-215 (2022) - [j18]Bahman Arasteh, Parisa Imanzadeh, Keyvan Arasteh, Farhad Soleimanian Gharehchopogh, Bagher Zarei:
A Source-code Aware Method for Software Mutation Testing Using Artificial Bee Colony Algorithm. J. Electron. Test. 38(3): 289-302 (2022) - [j17]Bahman Arasteh, Ahmad Fatolahzadeh, Farzad Kiani:
Savalan: Multi objective and homogeneous method for software modules clustering. J. Softw. Evol. Process. 34(1) (2022) - [c3]Bahman Arasteh, Mohammad Reza Sattari, Reza Shokri Kalan:
Fuzuli: Automatic Test Data Generation for Software Structural Testing using Grey Wolf Optimization Algorithm and Genetic Algorithm. DASC/PiCom/CBDCom/CyberSciTech 2022: 1-6 - 2021
- [j16]Seyed Mohammad Javad Hosseini, Bahman Arasteh, Ayaz Isazadeh, Mehran Mohsenzadeh, Mitra Mirzarezaee:
An error-propagation aware method to reduce the software mutation cost using genetic algorithm. Data Technol. Appl. 55(1): 118-148 (2021) - [j15]Bahman Arasteh, Razieh Sadegi, Keyvan Arasteh:
Bölen: software module clustering method using the combination of shuffled frog leaping and genetic algorithm. Data Technol. Appl. 55(2): 251-279 (2021) - 2020
- [j14]Bahman Arasteh, Razieh Sadegi, Keyvan Arasteh:
ARAZ: A software modules clustering method using the combination of particle swarm optimization and genetic algorithms. Intell. Decis. Technol. 14(4): 449-462 (2020) - [j13]Nasrin Shomali, Bahman Arasteh:
Mutation reduction in software mutation testing using firefly optimization algorithm. Data Technol. Appl. 54(4): 461-480 (2020) - [j12]Bahman Arasteh, Saideh Khosroshahizadeh:
Software reliability enhancement against hardware transient errors using inherently reliable data structures. Int. J. Syst. Assur. Eng. Manag. 11(5): 883-898 (2020) - [j11]Amir Ghaemi, Bahman Arasteh:
SFLA-based heuristic method to generate software structural test data. J. Softw. Evol. Process. 32(1) (2020) - [j10]Elmira Hatami, Bahman Arasteh:
An efficient and stable method to cluster software modules using ant colony optimization algorithm. J. Supercomput. 76(9): 6786-6808 (2020)
2010 – 2019
- 2019
- [j9]Bahman Arasteh:
ReDup: A software-based method for detecting soft-error using data analysis. Comput. Electr. Eng. 78: 89-107 (2019) - 2018
- [j8]Bahman Arasteh, Jalal Najafi:
Programming guidelines for improving software resiliency against soft-errors without performance overhead. Computing 100(9): 971-1003 (2018) - [j7]Bahman Arasteh:
A Program-Aware Fault-Injection Method for Dependability Evaluation Against Soft-Error Using Genetic Algorithm. J. Circuits Syst. Comput. 27(9): 1850144:1-1850144:30 (2018) - 2017
- [j6]Zohreh Karimi Aghdam, Bahman Arasteh:
An Efficient Method to Generate Test Data for Software Structural Testing Using Artificial Bee Colony Optimization Algorithm. Int. J. Softw. Eng. Knowl. Eng. 27(6): 951-966 (2017) - [j5]Bahman Arasteh:
Improving the Resiliency of Software Against Soft-Errors Without External Redundancy and Performance Overhead. J. Circuits Syst. Comput. 26(7): 1750124:1-1750124:28 (2017) - 2015
- [j4]Bahman Arasteh, Asgarali Bouyer, Sajjad Pirahesh:
An efficient vulnerability-driven method for hardening a program against soft-error using genetic algorithm. Comput. Electr. Eng. 48: 25-43 (2015) - [j3]Saeid Taghavi Afshord, Yuri Pottosin, Bahman Arasteh:
An input variable partitioning algorithm for functional decomposition of a system of Boolean functions based on the tabular method. Discret. Appl. Math. 185: 208-219 (2015) - 2014
- [j2]Bahman Arasteh, Seyed Ghassem Miremadi, Amir Masoud Rahmani:
Developing Inherently Resilient Software Against Soft-Errors Based on Algorithm Level Inherent Features. J. Electron. Test. 30(2): 193-212 (2014) - 2013
- [j1]Asgarali Bouyer, Bahman Arasteh:
An Adaptable Job Submission System Based on Moderate Price-Adjusting Policy in Market-Based Grids. Wirel. Pers. Commun. 73(4): 1573-1590 (2013) - 2012
- [c2]Bahman Arasteh, Amir Masoud Rahmani, Ali Mansoor, Seyed Ghassem Miremadi:
Using Genetic Algorithm to Identify Soft-Error Derating Blocks of an Application Program. DSD 2012: 359-367 - 2011
- [c1]Bahman Arasteh, Mohammad Javad Hosseini:
A Dependable and Efficient Scheduling Model for Critical Applications on Grid Systems. PARELEC 2011: 79-86
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-07 21:33 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint