{"id":3921,"date":"2014-10-15T15:37:54","date_gmt":"2014-10-15T14:37:54","guid":{"rendered":"http:\/\/people.unica.it\/researchersinmotion\/?page_id=3921"},"modified":"2015-03-04T15:45:34","modified_gmt":"2015-03-04T14:45:34","slug":"cv-zeinab-khorshhidpour","status":"publish","type":"page","link":"https:\/\/people.unica.it\/researchersinmotion\/alumni-profiles\/zeinab-khorshidpour\/cv-zeinab-khorshhidpour\/","title":{"rendered":"CV Zeinab Khorshidpour"},"content":{"rendered":"<p>PERSONAL INFORMATION:<\/p>\n<ul>\n<li>Nationality: <strong>Iran<\/strong><\/li>\n<\/ul>\n<p>RESEARCH INTERESTS:<\/p>\n<ul>\n<li>Computer security<\/li>\n<li>Malware detection<\/li>\n<li>Adversarial classification<\/li>\n<li>Spam filtering<\/li>\n<li>Machine learning applications<\/li>\n<li>Game theory<\/li>\n<li>Distance metric learning<\/li>\n<\/ul>\n<p>EDUCATION:<\/p>\n<p>2011- : <strong>Shiraz University<\/strong><\/p>\n<p>Department of Computer Science and Engineering<em> PhD. Student in Computer Science, Artificial Intelligence, <\/em><strong><em>GPA: 18.63 <\/em><\/strong>(Ranked 1<sup>st<\/sup>, without thesis number)<\/p>\n<p>Thesis Title: <strong><em>\u201cA Novel Statistical Approach for Detection of Packed Malwares\u201d<\/em><\/strong><\/p>\n<p>Advisor 1: Dr. Sattar Hashemi, Advisor 2: Dr. Ali Hamzeh<\/p>\n<p>2008-2011: <strong>Shiraz University<\/strong><\/p>\n<p><strong>\u00a0<\/strong>Department of Computer Science and Engineering<em> M.S. Degree in Computer, Artificial Intelligence, <strong>GPA: 19.27<\/strong><\/em> (Ranked 1<sup>st<\/sup>)<\/p>\n<p>Advisor 1: Dr. Sattar Hashemi, Advisor 2: Dr. Ali Hamzeh<\/p>\n<p>Thesis Title: <em>\u201c<strong>Distance Learning for Categorical Attributes\u201d<\/strong><\/em><\/p>\n<p>2003-2007: <strong>Beheshti University<\/strong><\/p>\n<p>Department of Computer and Electronic Engineering<\/p>\n<p><em>B.S. Degree in Computer Science, <strong>GPA: 14.07<\/strong><\/em><\/p>\n<p>2002-2003: <strong>Al-Zahra Pre-College School<\/strong> (Bandar-Lengeh) GPA: 18.7<\/p>\n<p>1999-2002: <strong>Hazrat Zeinab High School<\/strong> (Bandar-Lengeh)<\/p>\n<p><em>Diploma in Mathematics and Physics<\/em>, GPA: 19<\/p>\n<p>&nbsp;<\/p>\n<p>AWARDS AND HONORS:<\/p>\n<p><strong>2013<\/strong>: \u00a0\u00a0\u00a0\u00a0 Ranked 1<sup>st<\/sup> among PhD. students of department with major field of Artificial Intelligence- Just courses<\/p>\n<p><strong>2011<\/strong>: \u00a0\u00a0\u00a0 Ranked 1<sup>st<\/sup> among M.S. students of department with major field of Artificial Intelligence<\/p>\n<p>&nbsp;<\/p>\n<p>PUBLICATIONS:<\/p>\n<p><strong>Published Papers:<\/strong><strong>\u00a0<\/strong><\/p>\n<ol>\n<li><strong>Khorshidpour Z<\/strong>, Hashemi S, Hamzeh A. &#8220;Distance learning for categorical attribute based on context information.\u201d<em> 2nd International Conference on Software Technology and Engineering (ICSTE)<\/em>. Vol. 2. IEEE, 2010.<\/li>\n<\/ol>\n<p>&nbsp;<\/p>\n<ol start=\"2\">\n<li><strong>Khorshidpour Z<\/strong>, Hashemi S, Hamzeh A. &#8220;An Evolvable-Clustering-Based Algorithm to Learn Distance Function for Supervised Environment.&#8221;<em>International Journal of Computer Science Issues (IJCSI)<\/em>7.5, 2010.<\/li>\n<\/ol>\n<p>&nbsp;<\/p>\n<ol start=\"3\">\n<li><strong>Khorshidpour Z<\/strong>, Hashemi S, Hamzeh A. &#8220;An approach to learn categorical distance based on attributes correlation.&#8221;<em>19th Iranian Conference on Electrical Engineering (ICEE),<\/em> IEEE, 2011.<\/li>\n<\/ol>\n<p>&nbsp;<\/p>\n<ol start=\"4\">\n<li><strong>Khorshidpour Z<\/strong>, Hashemi S, Hamzeh A. &#8220;CBDL: Context\u2010based distance learning for categorical attributes.&#8221;<em>International Journal of Intelligent Systems<\/em>26.11, 1076-1100, 2011.<\/li>\n<\/ol>\n<p>&nbsp;<\/p>\n<ol start=\"5\">\n<li>Eskandari M, <strong>Khorshidpour Z<\/strong>, Hashemi S. &#8220;To Incorporate Sequential Dynamic Features in Malware Detection Engines.&#8221;<em>Intelligence and Security Informatics Conference (EISIC), European<\/em>. IEEE, 2012.<\/li>\n<\/ol>\n<p>&nbsp;<\/p>\n<ol start=\"6\">\n<li>Eskandari M, <strong>Khorshidpour Z<\/strong>, Hashemi S. &#8220;HDM-Analyzer: a hybrid analysis approach based on data mining techniques for malware detection.&#8221;<em>Journal of Computer Virology and Hacking Techniques<\/em>9.2, 77-93, 2013.<\/li>\n<\/ol>\n<p>&nbsp;<\/p>\n<p><strong>Technical Reports:<\/strong><\/p>\n<p>[2009]\u00a0\u00a0 <strong>Zeinab Khorshidpour<\/strong>, \u201c<em>Particle Swarm Intelligence<\/em>\u201d, for M. S. course.<\/p>\n<p>[2010] \u00a0 <strong>Zeinab Khorshidpour<\/strong>, <em>\u201cSimilarity and dissimilarity between nominal attributes\u201d, <\/em>M.S. Seminar<\/p>\n<p>[2011] <strong>Zeinab Khorshidpour<\/strong>, \u201c<em>Signature of Clam AV<\/em>\u201d, APA CERT.<\/p>\n<p>[2011] <strong>Zeinab Khorshidpour<\/strong>, \u201c<em>Games with Incomplete Information: Bayesian Game<\/em>\u201d, for Ph.D. course.<\/p>\n<p>[2012] Zeinab<strong> Khorshidpour<\/strong>, \u201c<em>Artificial Intelligence in Prediction of Secondary Protein Structure<\/em>\u00a0\u201cfor Ph.D. course.<\/p>\n<p>[2013] <strong>Zeinab Khorshidpour<\/strong>, \u201c<em>Proposing an expert system for malware detection<\/em> \u201c, for Ph.D. course.<\/p>\n<p>[2013] <strong>Zeinab Khorshidpour<\/strong>, \u201c<em>An Efficient Game Theoretical Model for Intelligent Malware Detection System<\/em>\u201d, for Ph.D. course.<\/p>\n<p>&nbsp;<\/p>\n<p>EXPERIENCES:<\/p>\n<p><strong>Work Experience:<\/strong><\/p>\n<ul>\n<li>January 2011-September 2011, Head of Computer technology and IT Department, Bandar-Abbas, Jahad University<\/li>\n<li>July 2010 \u2013 Now, APA\u00a0CERT Center\n<ul>\n<li><em>2010-2012, Programmer<\/em><\/li>\n<li><em>2012-2013- Technical Assistant<\/em><\/li>\n<li><em>2013- Now- Researcher <\/em><\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<p><em>\u00a0<\/em><strong>Workshops:<\/strong><\/p>\n<ul>\n<li><em>Malware Detection and analysis Methods, <\/em>APA-CERT, International Security and cryptology Conference, Mashhad, Iran.<\/li>\n<li><em>Signature Extraction and Evaluation, <\/em>Governor, Boshehr, Iran.<\/li>\n<\/ul>\n<p><strong>Teaching Experience:<\/strong><\/p>\n<ul>\n<li><strong><em>January 2009- \u00a0September 2009<\/em><\/strong><em>, Shiraz Azad University<\/em><\/li>\n<\/ul>\n<p><em>Logic circuits<\/em><\/p>\n<ul>\n<li><strong><em>January 2010 &#8211; September 2010<\/em><\/strong><em>, Bandar-Lengeh Azad University<\/em><\/li>\n<\/ul>\n<p><em>Logic Circuits, Internet theory<\/em><\/p>\n<ul>\n<li><strong><em>September 2010, January 2011<\/em><\/strong><em>, Shiraz Pasargad University<\/em><\/li>\n<\/ul>\n<p><em>Simulation System<\/em><\/p>\n<ul>\n<li><strong><em>January 2011-September 2011<\/em><\/strong><em>, Bandar-Abbas Azad University<\/em><\/li>\n<\/ul>\n<p><em>Artificial Intelligence<\/em><\/p>\n<ul>\n<li><strong><em>January 2011-September 2011<\/em><\/strong><em>, Bandar-Abbas Jahad University<\/em><\/li>\n<\/ul>\n<p><em>Artificial Intelligence, System Modelling, Assembly, Image Processing<\/em><\/p>\n<ul>\n<li><strong><em>January 2011-September 2011<\/em><\/strong><em>, Bandar- Lengeh Azad University<\/em><\/li>\n<\/ul>\n<p><em>\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Artificial Intelligence, Discrete System Simulation<\/em><\/p>\n<ul>\n<li><strong><em>January 2012, September 2012<\/em><\/strong><em>, Shiraz University<\/em><\/li>\n<\/ul>\n<p><em>\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Flowchart and Programming<\/em><\/p>\n<ul>\n<li><strong><em>September 2013- January 2014<\/em><\/strong><em>, Shiraz Niayesh College<\/em><\/li>\n<\/ul>\n<p><em>Fuzzy Systems for business management<\/em><\/p>\n<ul>\n<li><strong><em>March 2014- Now<\/em><\/strong><em>, Shiraz Niayesh College<\/em><\/li>\n<li><em>Fuzzy Systems for business<\/em><\/li>\n<li><strong><em>A in Shiraz University<\/em><\/strong><\/li>\n<\/ul>\n<p><em>\u00a0<\/em><strong><em>Important Projects and Experiences:<\/em><\/strong><\/p>\n<ul>\n<li>Work on Signature Evaluation Module, Native Antivirus Project<\/li>\n<li>Work on Heuristic Module, based on entropy and machine learning features, Native Antivirus Project<\/li>\n<li>Work on Self Protection Module, SSDT Hooking, Process Termination, Protection from Deletion, Modification and hidden File and Folder, Native Antivirus Project<\/li>\n<li>Collaboration in Stuxnet Anti-Removal, a signature based method.<\/li>\n<li>Collaboration in DUQU Anti-Removal, a signature based method.<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p><strong>MAJOR COURCES IN M.S.<\/strong><\/p>\n<ul>\n<li>Fuzzy System (17.20\/20)<\/li>\n<li>Statistical Pattern Recognition(20\/20)<\/li>\n<li>Machine Learning(20\/20)<\/li>\n<li>Evolutionary Algorithm(18.30\/20)<\/li>\n<li>Advanced Evolutionary(20\/20)<\/li>\n<li>Image Processing (18.5\/20)<\/li>\n<li>Discrete Signal Processing(19.5\/20)<\/li>\n<li>Special Topic in Machine Learning- Reinforcement Learning(18.75\/20)<\/li>\n<\/ul>\n<p><strong>\u00a0<\/strong><strong>COURCES IN Ph.D<\/strong><\/p>\n<ul>\n<li>Computer Vision (17.75\/20)<\/li>\n<li>Advanced Machine Learning (19.63\/20)<\/li>\n<li>Neural Network(19.40\/20)<\/li>\n<li>Distributed AI (20\/20)<\/li>\n<li>Expert Systems and Knowledge Engineering (18.5\/20)<\/li>\n<li>Bio Informatics (16.5\/20)<\/li>\n<\/ul>\n<p><strong>\u00a0<\/strong><strong>Technical Skills:<\/strong><\/p>\n<ul>\n<li>C++, Matlab, Java<\/li>\n<li>Working with some data mining tools<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<p><strong>LANGUAGES<\/strong><\/p>\n<p><strong>Persian<\/strong><\/p>\n<p>Fluent, Native<\/p>\n<p><strong>English<\/strong><\/p>\n<p>Listening (Fair), Reading (good), speaking (Fair), Writing (good)<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p><a href=\"#_ftnref1\" name=\"_ftn1\"><\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>PERSONAL INFORMATION: Nationality: Iran RESEARCH INTERESTS: Computer security Malware detection Adversarial classification Spam filtering Machine learning applications Game theory Distance metric learning EDUCATION: 2011- : Shiraz University Department of Computer Science and Engineering PhD. Student in Computer Science, Artificial Intelligence, GPA: 18.63 (Ranked 1st, without thesis number) Thesis Title: \u201cA Novel Statistical Approach for Detection of Packed Malwares\u201d Advisor 1: Dr. Sattar Hashemi, Advisor 2: Dr. Ali Hamzeh 2008-2011: Shiraz University \u00a0Department of Computer Science and Engineering M.S. Degree in Computer, Artificial Intelligence, GPA: 19.27 (Ranked 1st) Advisor 1: Dr. Sattar Hashemi, Advisor 2: Dr. Ali Hamzeh Thesis Title: \u201cDistance <a href='https:\/\/people.unica.it\/researchersinmotion\/alumni-profiles\/zeinab-khorshidpour\/cv-zeinab-khorshhidpour\/' class='excerpt-more'>[&#8230;]<\/a><\/p>\n","protected":false},"author":366,"featured_media":0,"parent":3912,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"ngg_post_thumbnail":0,"footnotes":""},"class_list":["post-3921","page","type-page","status-publish","hentry","post-seq-1","post-parity-odd","meta-position-corners","fix"],"publishpress_future_action":{"enabled":false,"date":"2026-04-11 06:48:11","action":"change-status","newStatus":"draft","terms":[],"taxonomy":"frm_application","extraData":[]},"publishpress_future_workflow_manual_trigger":{"enabledWorkflows":[]},"_links":{"self":[{"href":"https:\/\/people.unica.it\/researchersinmotion\/wp-json\/wp\/v2\/pages\/3921","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/people.unica.it\/researchersinmotion\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/people.unica.it\/researchersinmotion\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/people.unica.it\/researchersinmotion\/wp-json\/wp\/v2\/users\/366"}],"replies":[{"embeddable":true,"href":"https:\/\/people.unica.it\/researchersinmotion\/wp-json\/wp\/v2\/comments?post=3921"}],"version-history":[{"count":7,"href":"https:\/\/people.unica.it\/researchersinmotion\/wp-json\/wp\/v2\/pages\/3921\/revisions"}],"predecessor-version":[{"id":4563,"href":"https:\/\/people.unica.it\/researchersinmotion\/wp-json\/wp\/v2\/pages\/3921\/revisions\/4563"}],"up":[{"embeddable":true,"href":"https:\/\/people.unica.it\/researchersinmotion\/wp-json\/wp\/v2\/pages\/3912"}],"wp:attachment":[{"href":"https:\/\/people.unica.it\/researchersinmotion\/wp-json\/wp\/v2\/media?parent=3921"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}