Hamid Bostani

543 total citations
11 papers, 375 citations indexed

About

Hamid Bostani is a scholar working on Computer Networks and Communications, Artificial Intelligence and Signal Processing. According to data from OpenAlex, Hamid Bostani has authored 11 papers receiving a total of 375 indexed citations (citations by other indexed papers that have themselves been cited), including 5 papers in Computer Networks and Communications, 5 papers in Artificial Intelligence and 3 papers in Signal Processing. Recurrent topics in Hamid Bostani's work include Network Security and Intrusion Detection (5 papers), Electricity Theft Detection Techniques (3 papers) and Internet Traffic Analysis and Secure E-voting (3 papers). Hamid Bostani is often cited by papers focused on Network Security and Intrusion Detection (5 papers), Electricity Theft Detection Techniques (3 papers) and Internet Traffic Analysis and Secure E-voting (3 papers). Hamid Bostani collaborates with scholars based in Iran, Netherlands and Germany. Hamid Bostani's co-authors include Mansour Sheikhan, Veelasha Moonsamy, Güneş Acar, Zhengyu Zhao, Arunesh Mathur and Frederik Zuiderveen Borgesius and has published in prestigious journals such as SHILAP Revista de lepidopterología, Pattern Recognition and Information Sciences.

In The Last Decade

Hamid Bostani

9 papers receiving 358 citations

Peers — A (Enhanced Table)

Peers by citation overlap · career bar shows stage (early→late) cites · hero ref

Name h Career Trend Papers Cites
Hamid Bostani Iran 6 301 215 170 49 45 11 375
Markku Antikainen Finland 7 295 1.0× 181 0.8× 132 0.8× 26 0.5× 61 1.4× 11 348
Syed Ghazanfar Abbas Pakistan 10 408 1.4× 254 1.2× 247 1.5× 73 1.5× 119 2.6× 13 493
D. Lalitha Bhaskari India 8 173 0.6× 145 0.7× 122 0.7× 35 0.7× 73 1.6× 32 284
Gilberto Fernandes Brazil 6 319 1.1× 278 1.3× 104 0.6× 46 0.9× 30 0.7× 11 376
K. Munivara Prasad India 8 335 1.1× 261 1.2× 226 1.3× 42 0.9× 74 1.6× 15 402
Xuan Dau Hoang Vietnam 7 298 1.0× 230 1.1× 228 1.3× 20 0.4× 97 2.2× 16 355
Majjed Al-Qatf China 7 317 1.1× 302 1.4× 170 1.0× 30 0.6× 30 0.7× 13 425
Han Han China 7 193 0.6× 154 0.7× 98 0.6× 25 0.5× 34 0.8× 27 309
Yousef Sanjalawe Jordan 10 216 0.7× 149 0.7× 86 0.5× 37 0.8× 58 1.3× 47 305
Kamalakanta Sethi India 10 330 1.1× 282 1.3× 217 1.3× 53 1.1× 130 2.9× 23 441

Countries citing papers authored by Hamid Bostani

Since Specialization
Citations

This map shows the geographic impact of Hamid Bostani's research. It shows the number of citations coming from papers published by authors working in each country. You can also color the map by specialization and compare the number of citations received by Hamid Bostani with the expected number of citations based on a country's size and research output (numbers larger than one mean the country cites Hamid Bostani more than expected).

Fields of papers citing papers by Hamid Bostani

Since Specialization
Physical SciencesHealth SciencesLife SciencesSocial Sciences

This network shows the impact of papers produced by Hamid Bostani. Nodes represent research fields, and links connect fields that are likely to share authors. Colored nodes show fields that tend to cite the papers produced by Hamid Bostani. The network helps show where Hamid Bostani may publish in the future.

Co-authorship network of co-authors of Hamid Bostani

This figure shows the co-authorship network connecting the top 25 collaborators of Hamid Bostani. A scholar is included among the top collaborators of Hamid Bostani based on the total number of citations received by their joint publications. Widths of edges represent the number of papers authors have co-authored together. Node borders signify the number of papers an author published with Hamid Bostani. Hamid Bostani is excluded from the visualization to improve readability, since they are connected to all nodes in the network.

All Works

11 of 11 papers shown
1.
Bostani, Hamid, et al.. (2025). Level Up with ML Vulnerability Identification: Leveraging Domain Constraints in Feature Space for Robust Android Malware Detection. ACM Transactions on Privacy and Security. 28(2). 1–32.
2.
Bostani, Hamid, et al.. (2024). Targeted and Troublesome: Tracking and Advertising on Children’s Websites. Radboud Repository (Radboud University). 1517–1535.
3.
Bostani, Hamid & Veelasha Moonsamy. (2023). EvadeDroid: A practical evasion attack on machine learning for black-box Android malware detection. Computers & Security. 139. 103676–103676. 28 indexed citations
4.
Bostani, Hamid, et al.. (2020). A strong coreset algorithm to accelerate OPF as a graph-based machine learning in large-scale problems. Information Sciences. 555. 424–441. 1 indexed citations
5.
Sheikhan, Mansour & Hamid Bostani. (2017). A Security Mechanism for Detecting Intrusions in Internet of Things Using Selected Features Based on MI-BGSA. SHILAP Revista de lepidopterología. 8 indexed citations
6.
Bostani, Hamid, et al.. (2017). Developing a fast supervised optimum-path forest based on coreset. 172–177. 2 indexed citations
7.
Sheikhan, Mansour & Hamid Bostani. (2016). A hybrid intrusion detection architecture for Internet of things. 601–606. 28 indexed citations
8.
Bostani, Hamid & Mansour Sheikhan. (2016). Hybrid of anomaly-based and specification-based IDS for Internet of Things using unsupervised OPF based on MapReduce approach. Computer Communications. 98. 52–71. 177 indexed citations
9.
Bostani, Hamid & Mansour Sheikhan. (2016). Modification of optimum-path forest using Markov cluster process algorithm. 1–5. 2 indexed citations
10.
Bostani, Hamid & Mansour Sheikhan. (2016). Modification of supervised OPF-based intrusion detection systems using unsupervised learning and social network concept. Pattern Recognition. 62. 56–72. 42 indexed citations
11.
Bostani, Hamid & Mansour Sheikhan. (2015). Hybrid of binary gravitational search algorithm and mutual information for feature selection in intrusion detection systems. Soft Computing. 21(9). 2307–2324. 87 indexed citations

Rankless uses publication and citation data sourced from OpenAlex, an open and comprehensive bibliographic database. While OpenAlex provides broad and valuable coverage of the global research landscape, it—like all bibliographic datasets—has inherent limitations. These include incomplete records, variations in author disambiguation, differences in journal indexing, and delays in data updates. As a result, some metrics and network relationships displayed in Rankless may not fully capture the entirety of a scholar's output or impact.

Explore authors with similar magnitude of impact

Rankless by CCL
2026