Skip to main content

Research Repository

Advanced Search

All Outputs (4)

Application of Deep Learning in Generating Structured Radiology Reports: A Transformer-Based Technique (2022)
Journal Article
Moezzi, S. A. R., Ghaedi, A., Rahmanian, M., Mousavi, S. Z., & Sami, A. (2023). Application of Deep Learning in Generating Structured Radiology Reports: A Transformer-Based Technique. Journal of Digital Imaging, 36(1), 80-90. https://doi.org/10.1007/s10278-022-00692-x

Since radiology reports needed for clinical practice and research are written and stored in free-text narrations, extraction of relative information for further analysis is difficult. In these circumstances, natural language processing (NLP) techniqu... Read More about Application of Deep Learning in Generating Structured Radiology Reports: A Transformer-Based Technique.

De novo design of novel protease inhibitor candidates in the treatment of SARS-CoV-2 using deep learning, docking, and molecular dynamic simulations (2021)
Journal Article
Arshia, A. H., Shadravan, S., Solhjoo, A., Sakhteman, A., & Sami, A. (2021). De novo design of novel protease inhibitor candidates in the treatment of SARS-CoV-2 using deep learning, docking, and molecular dynamic simulations. Computers in Biology and Medicine, 139, Article 104967. https://doi.org/10.1016/j.compbiomed.2021.104967

The main protease of SARS-CoV-2 is a critical target for the design and development of antiviral drugs. 2.5 M compounds were used in this study to train an LSTM generative network via transfer learning in order to identify the four best candidates ca... Read More about De novo design of novel protease inhibitor candidates in the treatment of SARS-CoV-2 using deep learning, docking, and molecular dynamic simulations.

An Empirical Study of C++ Vulnerabilities in Crowd-Sourced Code Examples (2020)
Journal Article
Verdi, M., Sami, A., Akhondali, J., Khomh, F., Uddin, G., & Karami Motlagh, A. (2022). An Empirical Study of C++ Vulnerabilities in Crowd-Sourced Code Examples. IEEE Transactions on Software Engineering, 48(5), 1497-1514. https://doi.org/10.1109/tse.2020.3023664

Software developers share programming solutions in Q&A sites like Stack Overflow, Stack Exchange, Android forum, and so on. The reuse of crowd-sourced code snippets can facilitate rapid prototyping. However, recent research shows that the shared code... Read More about An Empirical Study of C++ Vulnerabilities in Crowd-Sourced Code Examples.

Malware detection based on mining API calls (2010)
Presentation / Conference Contribution
Sami, A., Yadegari, B., Rahimi, H., Peiravian, N., Hashemi, S., & Hamze, A. (2010, March). Malware detection based on mining API calls. Presented at The 2010 ACM Symposium, Sierre, Switzerland

Financial loss due to malware nearly doubles every two years. For instance in 2006, malware caused near 33.5 Million GBP direct financial losses only to member organizations of banks in UK. Recent malware cannot be detected by traditional signature b... Read More about Malware detection based on mining API calls.