Brief CV
								
								Seyyed Amir Asghari received his B.Sc. degree in 2007 (hardware engineering major), M.Sc. and Ph.D. in 2009 and 2013 respectively (computer architecture major) from Amirkabir University of Technology. His current research interests include fault-tolerant design and real-time embedded system design. He has served as a faculty member in the Department of Electrical and Computer Engineering at Kharazmi University.
 
								
								 Languages
								#
										Language
										Translation Skill
										Dialogue Skill
									1
										English
										Good
										Good
									 Research interests
								#
										Title
										Start date
									1
										Fault Tolerant Systems
										
									2
										Operating Systems
										
									3
										Wireless Sensor Systems
										
									4
										Real-Time Embedded Systems
										
									5
										Digital Transformation
										
									6
										Service Oriented Architecture (SOA) Design
										
									7
										E-Government, Digital Government and Smart Government
										
									 Theses supervised
								#
										Title
										Persons
									1
										Load balancing optimization of Virtual Machine For Cloud Data Centers Using Squirrel Search Algorithm
										Sajjad Motalleb Zadeh
									2
										Provide an improved unmanned aerial vehicle detection system to increase accuracy using deep learning
										Sajjad Ansarian
									3
										Providing a Improved Unmanned Aerial Vehicle Detection System to Increase Speed Using Deep Learning
										Mohammad Bahrami
									4
										Providing an improved method to increase backup & recovery operation of metadata in SSD based NAND Flash
										Fereshte Pourdad
									5
										A Configurable Rounding based Approximate Divider
										Alireza Lashkari
									6
										Wireless Sensor Network Nodes Placement for Structural Health Monitoring by Markov Decision Process
										Seyyed Sahan Naghib Hashemi
									7
										An Improved Sleep Scheduling Method to Reduce Energy Consumption in Wireless Sensor Networks
										Parvin Dokht Ghasem zadeh
									8
										Providing an improved method of getting checkpoints to reduce the checkpoint overhead
										Davoud Khalili
									9
										Provides an improved method for storing mapping tables in non-volatile memory (NVM) for solid-state drives
										Seyyed Mehdi Mirzamani
									10
										Improving accuracy of fake accounts detection in Instagram social network based-on the content and computing features of profiles using supervised machine learning algorithms
										Mohammad Sadegh Moradian
									11
										Introducing a Routing Protocol in Wireless Sensor Networks using Reinforcement Learning to Increase Network Lifetime
										Ali Forghani Elah Abadi
									12
										Optimization of Flash Translation Layer in NAND Flash Storage Systems
										Shahabodin Golpayegan
									13
										Energy Consumption Reduction in WSNs Using Artificial Inteligence Methods
										Masih Akbari
									14
										Improving techniques in directory-based shared-memory many-core systems
										Narges Akbari
									15
										Improving Performance and Lifetime of SSDs Using Distributed Systems
										Reza Ghomali Taghizadeh
									16
										Providing an improved method to increase backup & recovery operation of metadata in SSD based NAND Flash
										فرشته پورداد
									17
										Suggesting a new intelligent method to prevent overwriting duplicate data on SSDs
										Ramin Ghomali Taghizadeh
									18
										Providing a New Method To Improve Efficiency and Enhance The Mapping Table Of LAST InSSD Storage Devices
										Ali Geravand
									19
										Providing an improved method for metadata information recovery with hybrid address translation in SSD environment power off failure time
										Azam Karamyar
									20
										A novel method for victim block selection based on scoring
										Asal Khanbadr
									21
										a novel design in high precision approximate multiplier by improving frequency, power consumption and area
										Fahime Hajizadeh
									22
										Providing an Iproved Method for Intrusion Detetion in Network via Data Mining Algorithm
										Ayyoub Safaei
									23
										An Improved Process Supervision and Control Method for Malware Detection
										Behnam Abdolla Shamshirsaz
									24
										Automatic Recognition of white blood cells using deep learning
										Sahar Khosravian
									25
										improving group recommender systems by a multiview approach
										Maryam Sadeghi
									26
										Customizing Online Sales Using Web Usage Mining and Sematic Based Web Mining via Clustering
										Mohammad Ali Farsi Aliabadi
									27
										Online Learning Recommender System Based on Online clustering
										Maryam Zarei
									28
										Providing an Improved Approach for Nearest Neighbor Search and Rates Weighting by Evolutionary Computing Methods in Recommendation Systems
										Malihe Sheidaei far
									29
										Hardware design network connection filtering including ip, URL and domain infected
										Shahaboddin Bostanchi
									30
										Recommend user's favorite texts according to history of read news using classification
										Hamid Reza Sedigh
									31
										an Improved  Method for Intrusion Detection in Computer Networks using Data Mining Techniques
										Hadi Najafi Mohsen Abad
									32
										Designing a Fuzzy Expert System For Outcome of The Audit Report Forecasting
										Mohammad Javad Rezaei
									33
										MR Image Registration under Variant Illumination using improving region-based methods
										Masoume Pourbarat
									34
										Image Quality Improvement (Image Super Resolution) using Sequential Images from a Scene
										Leila Shafiei
									35
										a combined method to reduce the voltage consumption in spiking neural networks.
										شقایق مهدیزاده سراج
									36
										Applying approximate computing methods to improve the performance of a multiplier
										محمدرضا رفیعی نژاد
									37
										Use of approximate computing methods in convolutional neural networks to improve accuracy and performance
										محمدرضا رفیعی نژاد
									38
										An improved method for Intrusion & Anomaly Detection in IoT Networks Using Generative Adversarial Networks
										محمدامین چیذری
									39
										efficient method for detecting deep fake in images
										محمدرضا فرجی
									40
										Optimization of energy consumption in wireless sensor networks using improved in KRSS method
										بهزاد بیک وردی
									41
										Provide an Improved Method for Predicting Diabetes using Machine Learning Algorithms on GPUs
										اناهیتا فتحی هفشجانی
									42
										Presenting a new approximate multiplier circuit using the Wallace multiplication algorithm, in order to improve the efficiency, power consumption and required area, taking into account the degree of approximation
										محمد سعید پاک نژاد
									43
										Improving Intrusion Detection Systems using Deep Learning
										سیدفراز فتحنایی اصل
									44
										An Efficient method for generating deep-fake media with Deep Neural Network
										وحید معینی
									45
										A Comprehensive Blockchain-Based Vehicle Information Registration System Aimed at Enhancing Efficiency in Processing Blocks within the Used Car Trade
										شبنم بهلولی
									46
										An Improved Hybrid Clustering Approach Based on Multilevel Implementation in Vehicular Ad Hoc Networks
										رضا رسول زاده دراباد
									47
										An Improved Method in Sparse Matrix Multiplication Accelerator To Enhance Speed
										سارا جلالی خلیل آبادی
									48
										Improvement of methods in Deepfake video detection
										اناهیتا اریا
									49
										An improved Deep Learning-Based Model for Anomaly Detection in IoT Networks
										نگار منصوری
									50
										Improving Analysis Intrusion Detection Systems by Explainable it
										سامان عطارکاشانی
									51
										Accelerating GridSearchCV Hyperparameter Tuning Method Using an FPGA-Based Hardware Accelerator
										ارین شهبازیان کتمجانی
									52
										Providing an Improved Method in Intrusion Detection System to increase Detection Rate of Attacks based on Deep Learning
										فرشته قربان زاده معافی
									53
										"Presenting an Improved Method for Reducing Energy Consumption in Vehicular Ad Hoc Networks Using the Store-Carry-Forward Approach"
										یاسمن محسنی
									54
										A Novel Method in Approximate Multipliers to Improve Reliability
										سیده یاسمن طاهرزاده
									55
										Improving Intrusion Detection Systems Using Federated Learning in the Internet of Things (IoT)
										امیرحسین صادقی
									56
										Proposing an Improved Method for Malware Detection Based on Hardware Performance Counters
										ریحانه صنعت پیشه
									57
										Using in-memory computing to speed up network alert prediction
										یونس خسروی
									58
										Optimization of Neural Network for Fingerprint Recognition Based on FPGA
										زینب احمدی
									59
										A Novel Method for Enhancing the Efficiency of a SpGEMM Accelerator Using Approximate Multipliers
										عاطفه صحبتی احمداباد
									 Theses advised
								#
										Title
										Persons
									1
										The application of machine learning algorithms in determining the dimensions of psychological data
										هانیه قره اوغلانی خانشان
									 Published articles
								#
										Paper title
										Writer
										Magazine title
										Publish year
										Publish type
										Article type
									1
										Improve accuracy in CNNs while using approximate computing methods
										Mohamadreza Rafieinejad, Mohammadreza Binesh Marvasti, Seyyed Amir Asghari, Kimiya Shahbakhti
										JOURNAL OF SUPERCOMPUTING
										2025
										Full Text
										
									2
										Improved Authentication in Information Systems through a Mobile Identity Management Scheme (MoIdM-MSS) Utilizing Mobile Signature Service
										Mohammadjavad Sharifpour, Mehdi Shajari, Seyyed Amir Asghari
										EAI Endorsed Transactions on Scalable Information Systems
										2025
										Full Text
										
									3
										A Review of Game Theory-Based Trust Modeling Approaches in Infrastructure-Free Social Networks
										Alireza Sedighi, Seyyed Amir Asghari, Romoozi Morteza, Babaei Hamidieh
										Management Strategies and Engineering Sciences
										2025
										Full Text
										
									4
										Providing a Trustworthy Framework on the Social Internet of Vehicles Based on Fuzzy Logic and Game Theory
										Alireza Seddighi, Seyyed Amir Asghari, Morteza Romoozi, Hamideh Babaei
										International Journal of Multiphysics
										2024
										Full Text
										
									5
										A stochastic multi-objective optimization method for railways scheduling: a NSGA-II-based hybrid approach
										Massoud Seifpour, Seyyed Amir Asghari, Mostafa Ghobaei-Arani
										JOURNAL OF SUPERCOMPUTING
										2023
										Full Text
										
									6
										IBU: An In-Block Update Address Mapping Scheme for Solid-State Drives
										Reza Gholami taghizadeh, Mohammadreza Binesh Marvasti, Seyyed Amir Asghari, Ramin Gholami taghi zadeh, Morteza Nabavi, Yvon Savaria
										IEEE Access
										2022
										Full Text
										
									7
										A power constrained approximate multiplier with a high level of configurability
										Mostafa Abbasmollaei, Fahime Hajizadeh, Siamak Mohammadi, Mohammadreza Binesh Marvasti, Seyyed Amir Asghari, Behrouz Samieiyan
										MICROPROCESSORS AND MICROSYSTEMS
										2022
										Full Text
										
									8
										RLBEEP: Reinforcement-Learning-Based Energy Efficient Control and Routing Protocol for Wireless Sensor Networks
										Ali Forghani Elah Abadi, Seyyed Amir Asghari, Mohammadreza Binesh Marvasti, Golnoush Abaei, Morteza Nabavi, Yvon Savaria
										IEEE Access
										2022
										Full Text
										
									9
										An Improved Process Supervision and Control Method for Malware Detection
										Behnam Abdollah Shamshirsaz, Seyyed Amir Asghari, Mohammadreza Binesh Marvasti
										International Arab Journal of Information Technology
										2022
										Full Text
										
									10
										Silent Data Corruption Estimation and Mitigation Without Fault Injection
										Moona Yakhchi, Mahdi Fazeli, Seyyed Amir Asghari
										IEEE Canadian Journal of Electrical and Computer Engineering
										2022
										Full Text
										
									11
										Configurable DSI partitioned approximate multiplier
										Fahime Hajizadeh, Mohammadreza Binesh Marvasti, Seyyed Amir Asghari, Mostafa Abbas Mollaei, Amir M. Rahmani
										Future Generation Computer Systems-The International Journal of eScience
										2021
										Full Text
										
									12
										A Multi-View Group Recommender System based on Trust and Ratings
										Seyyed Amir Asghari, Maryam Sadegi, Mir Mohsen Pedram
										The CSI Journal on Computer Science and Engineering
										2021
										Full Text
										
									13
										A Model to Create Organizational Value with Big Data Analytics
										Ali Mirarab, Seyedeh Leili Mirtaheri, Seyyed Amir Asghari
										COMPUTER SYSTEMS SCIENCE AND ENGINEERING
										2020
										Full Text
										
									14
										Anycast routing in time-expanded vehicular networks
										Alireza Amirshahi, Morteza Romoozi, , Seyyed Amir Asghari
										COMPUTERS  and  ELECTRICAL ENGINEERING
										2020
										Full Text
										
									15
										Modeling Geographical Anycasting Routing in Vehicular Networks
										Alireza Amirshahi, Romoozi Morteza, , Seyyed Amir Asghari
										KSII Transactions on Internet and Information Systems
										2020
										Full Text
										
									16
										CA-Dedupe: content-aware deduplication in SSDs
										Ramin Gholami taghi zadeh, Reza Gholami taghizadeh, Fahimeh Khakpash, Mohammadreza Binesh Marvasti, Seyyed Amir Asghari
										JOURNAL OF SUPERCOMPUTING
										2020
										Full Text
										
									17
										A software implemented comprehensive soft error detection method for embedded systems
										Seyyed Amir Asghari, Mohammadreza Binesh Marvasti, Masoud Daneshtalab
										MICROPROCESSORS AND MICROSYSTEMS
										2020
										Full Text
										
									18
										A novel method for victim block selection for NAND flash-based solid state drives based on scoring
										ASAL KHANBADR, Mohammadreza Binesh Marvasti, Seyyed Amir Asghari, Sohrab Khanbadr, Amir M. Rahmani
										JOURNAL OF SUPERCOMPUTING
										2020
										Full Text
										
									19
										Value creation with big data analytics for enterprises: a survey
										Ali Mirarab, Seyedeh Leili Mirtaheri, Seyyed Amir Asghari
										telkomnika
										2019
										Full Text
										
									20
										FRCD: Fast recovery of compressible data in flash memories
										Mahyar Nazari, Reza Gholami taghizadeh, Seyyed Amir Asghari, Mohammadreza Binesh Marvasti, Amir M. Rahmani
										COMPUTERS  and  ELECTRICAL ENGINEERING
										2019
										Full Text
										
									21
										Enhancing Transient Fault Tolerance in Embedded Systems
										Seyyed Amir Asghari, Mohammadreza Binesh Marvasti, Amir Mohammad Rahmani
										Future Generation Computer Systems-The International Journal of eScience
										2018
										Full Text
										
									22
										Hybrid GA-AIS for Efficient Feature Extraction in E-mail Spam Detection
										Zahra Razi, Seyyed Amir Asghari
										International Journal of Mechatronics Electrical and Computer Technology
										2017
										Full Text
										
									23
										Providing an Improved Feature Extraction Method for Spam Detection Based on Genetic Algorithm in an Immune System
										Zahra Razi, Seyyed Amir Asghari
										Journal of Knowledge-Based Engineering and Innovation
										2017
										Full Text
										
									24
										Improving The Checkpoint Size Based on Artificial Neural Networks in Embedded System
										Sanaz Taheri, Seyyed Amir Asghari
										International Journal of Educational Advancement
										2016
										Full Text
										
									25
										An Effective Soft Error Detection Mechanism using Redundant Instructions
										Seyyed Amir Asghari, Taheri Hassan
										International Arab Journal of Information Technology
										2015
										Full Text
										
									26
										An Investigation into Soft Error Detection Efficiency at Operating System Level
										Seyyed Amir Asghari, Okyay Kaynak,
										SCIENTIFIC WORLD JOURNAL
										2014
										Full Text
										
									27
										Software-Based Control Flow Checking Against Transient Faults in Industrial Environments
										Okyay Kaynak, Seyyed Amir Asghari, ,
										IEEE Transactions on Industrial Informatics
										2014
										Full Text
										
									 Presented articles
								#
										Title
										Writer
										Conference
										Date
										Presentation type
									1
										Unsupervised Graph-Based Anomaly Detection Using Variational Autoencoder
										Zeinab Sadat  Sadrolhefazi, Hadi Zare, Seyyed Amir Asghari, Parham Moradi, Mahdi Jalili
										International Conference on Data Mining Workshops (ICDMW) - United Arab Emirates
										1403/09/19
										Oral
									2
										BBTM-IoT: New IoT Systems Trust Management Model Using Blockchain
										Mohammadjavad Sharifpour, Seyyed Amir Asghari, Shabnam Bohloli
										19th Iranian Conference on Intelligent Systems - Iran
										1403/08/02
										Oral
									3
										Securing Healthcare with Deep Learning: A CNN-Based Model for Medical IoT Threat Detection
										Alireza Mohammadi, Hosna Ghahramani, Seyyed Amir Asghari, Mahdi Aminian
										19th Iranian Conference on Intelligent Systems - Iran
										1403/08/02
										Oral
									4
										A Hybrid Method to Reduce the Voltage Consumption in the Spiking Neural Networks
										Shaghayegh Mehdizadeh saraj, Seyyed Amir Asghari, Mohammadreza Binesh Marvasti
										13th International Conference on Information and Knowledge Technology (IKT) - Iran
										1401/09/29
										Oral
									5
										Ensemble Model Based on an Improved Convolutional Neural Network with a Domainagnostic Data Augmentation Technique
										Seyed faraz Fatahnaie asl, Azhdehnia Armin, Seyyed Amir Asghari, Mohammadreza Binesh Marvasti
										13th International Conference on Information and Knowledge Technology (IKT) - Iran
										1401/09/29
										Oral
									6
										An Improved Drone Detection Method Using Deep Learning for Augmentation Detection Speed
										Mohammad Bahrami, Seyyed Amir Asghari, Mohammadreza Binesh Marvasti, Sajjad Ansariyan
										13th International Conference on Information and Knowledge Technology (IKT) - Iran
										1401/09/29
										Oral
									7
										An Improved Method Multi-View Group Recommender System (IMVGRS)
										Maryam Sadeghi, Seyyed Amir Asghari, Mir Mohsen Pedram
										2020 8th Iranian Joint Congress on Fuzzy and intelligent Systems (CFIS) - Iran
										1399/06/12
										Oral
									8
										Providing an Improved Feature Extraction Method for Spam Detection Based on Genetic Algorithm in an Immune System
										Zahra Razi, Seyyed Amir Asghari
										3rd International Conference on Knowledge-Based Engineering and Innovation - Iran
										1395/10/10
										Oral
									9
										E-mail Spam Detection using Combination of GA-AIS Algorithm and Classification using SVM
										Zahra Razi, Seyyed Amir Asghari
										 - Iran
										1395/09/25
										Oral
									10
										Advanced Cyberattack Detection in Internet of Medical Things (IoMT) Using Convolutional Neural Networks
										Mohammadi Alireza, Hosna Ghahramani, Seyyed Amir Asghari, Aminian Mehdi
										 - Malaysia
										1394/12/14
										Oral
									 
				 
					