Branding/Logomark minus Citation Combined Shape Icon/Bookmark-empty Icon/Copy Icon/Collection Icon/Close Copy 7 no author result Created with Sketch. Icon/Back Created with Sketch. Match!
Hamid R. Rabiee
Sharif University of Technology
180Publications
17H-index
1,211Citations
Publications 180
Newest
Published on Jun 2, 2019 in NAACL (North American Chapter of the Association for Computational Linguistics)
Elham J. Barezi (Sharif University of Technology), Ian wood1
Estimated H-index: 1
+ 1 AuthorsHamid R. Rabiee17
Estimated H-index: 17
(Sharif University of Technology)
Published on Jan 1, 2019in arXiv: Information Theory
Seyed Ali Ossia1
Estimated H-index: 1
,
Borzoo Rassouli6
Estimated H-index: 6
+ 2 AuthorsDeniz Gunduz31
Estimated H-index: 31
Privacy-preserving data release is about disclosing information about useful data while retaining the privacy of sensitive data. Assuming that the sensitive data is threatened by a brute-force adversary, we define Guessing Leakage as a measure of privacy, based on the concept of guessing. After investigating the properties of this measure, we derive the optimal utility-privacy trade-off via a linear program with any $f$-information adopted as the utility measure, and show that the optimal utilit...
1 Citations
Published on Dec 1, 2018in Social Network Analysis and Mining
Hamidreza Mahyar5
Estimated H-index: 5
(Sharif University of Technology),
Rouzbeh Hasheminezhad2
Estimated H-index: 2
(ETH Zurich)
+ 4 AuthorsHamid R. Rabiee17
Estimated H-index: 17
(Sharif University of Technology)
This paper addresses the problem of identifying central nodes from the information flow standpoint in a social network. Betweenness centrality is the most prominent measure that shows the node importance from the information flow standpoint in the network. High betweenness centrality nodes play crucial roles in the spread of propaganda, ideologies, or gossips in social networks, the bottlenecks in communication networks, and the connector hubs in biological systems. In this paper, we introduce D...
2 Citations Source Cite
Published on Sep 29, 2018in bioRxiv
Masroor Bayati (Sharif University of Technology), Hamid R. Rabiee17
Estimated H-index: 17
(Sharif University of Technology)
+ 4 AuthorsHamid Alinejad-Rokny1
Estimated H-index: 1
(Harry Perkins Institute of Medical Research)
Analyses of large somatic mutation datasets, using advanced computational algorithms, have revealed at least 30 independent mutational signatures in tumor samples. These studies have been instrumental in identification and quantification of responsible endogenous and exogenous molecular processes in cancer. The quantitative approach used to deconvolute mutational signatures is becoming an integral part of cancer research. Therefore, development of a stand-alone tool with a user-friendly graphica...
Source Cite
Mohammadreza Doostmohammadian5
Estimated H-index: 5
(Semnan University),
Hamid R. Rabiee17
Estimated H-index: 17
(Sharif University of Technology)
+ 1 AuthorsUsman A. Khan17
Estimated H-index: 17
(Tufts University)
Observability of complex systems/networks is the focus of this paper, which is shown to be closely related to the concept of contraction . Indeed, for observable network tracking it is necessary/sufficient to have one node in each contraction measured. Therefore, nodes in a contraction are equivalent to recover for loss of observability, implying that contraction size is a key factor for observability recovery. Here, using a polynomial order contraction detection algorithm, we analyze the distri...
1 Citations Source Cite
Published on May 23, 2018in PLOS ONE 2.78
Ali Zarezade4
Estimated H-index: 4
,
Sina Jafarzadeh2
Estimated H-index: 2
,
Hamid R. Rabiee17
Estimated H-index: 17
1 Citations Source Cite
Published on May 1, 2018in IEEE Computer 3.56
Seyed Ali Osia2
Estimated H-index: 2
(Sharif University of Technology),
Ali Shahin Shamsabadi2
Estimated H-index: 2
(QMUL: Queen Mary University of London)
+ 2 AuthorsHamed Haddadi20
Estimated H-index: 20
(Imperial College London)
Although the ability to collect, collate, and analyze the vast amount of data generated from cyber-physical systems and Internet of Things devices can be beneficial to both users and industry, this process has led to a number of challenges, including privacy and scalability issues. The authors present a hybrid framework where user-centered edge devices and resources can complement the cloud for providing privacy-aware, accurate, and efficient analytics.
3 Citations Source Cite
Published on Apr 27, 2018in ACM Transactions on Knowledge Discovery From Data 2.54
Ali Khodadadi4
Estimated H-index: 4
(Sharif University of Technology),
Seyyed Abbas Hosseini3
Estimated H-index: 3
(Sharif University of Technology)
+ 1 AuthorsHamid R. Rabiee17
Estimated H-index: 17
(Sharif University of Technology)
User modeling plays an important role in delivering customized web services to the users and improving their engagement. However, most user models in the literature do not explicitly consider the temporal behavior of users. More recently, continuous-time user modeling has gained considerable attention and many user behavior models have been proposed based on temporal point processes. However, typical point process-based models often considered the impact of peer influence and content on the user...
2 Citations Source Cite
12345678910