B.Sc , Computer Engineering , Sharif University of Technology , 1992 → 1996
MS , Computer Engineering , University of Tehran , 1996 → 1999
Unknown , Computer Science , sherbrooke , 2004 → 2010


Improved Backtracking Search algorithm by new adaptive mutations

3rd international conference on soft computing

Esmaeil Mirkazehi Rigi, Amin Rahati - 1398/08/29


Creating Research Database under Network

Amin Rahati, - 2002

1 - Elaheh Shamsi, Amin Rahati, Effat Dehghanian, A modified binary particle swarm optimization with a machine learning algorithm and molecular docking for QSAR modelling of cholinesterase inhibitors, SAR AND QSAR IN ENVIRONMENTAL RESEARCH. (2021) 32 745-767 View Paper
2 - Baqer Kord, Amin Rahati, Peyman Mahmoudi, Parviz Khosravi, Harir Bidar, Prioritizing the counties of Sistan and Baluchestan province in order to optimize the management of drought budget, تحليل فضايي مخاطرات محيطي. (2020) 7 1-20
3 - Kazem Talaei, Amin Rahati, Lhassane Idoumghar, A novel harmony search algorithm and its application to data clustering, APPLIED SOFT COMPUTING. (2020) 92 106273-1-106273-29 View Paper
4 - Hojjat Rakhshani, Effat Dehghanian, Amin Rahati, Enhanced GROMACS: toward a better numerical simulation framework, JOURNAL OF MOLECULAR MODELING. (2019) 25 355-363
5 - , Amin Rahati, An improved artificial bee colony algorithm and its application to reliability optimization problems, APPLIED SOFT COMPUTING. (2018) 62 736-767
6 - Hojat Rakhshani, Amin Rahati, Snap-drift cuckoo search: A novel cuckoo search optimization algorithm, APPLIED SOFT COMPUTING. (2017) 52 771-794
7 - Hojat Rakhshani, Amin Rahati, Intelligent Multiple Search Strategy Cuckoo Algorithm for Numerical and Engineering Optimization Problems, ARABIAN JOURNAL FOR SCIENCE AND ENGINEERING. (2017) 42 567-593
8 - Hojat Rakhshani, Effat Dehghanian, Amin Rahati, -Hierarchy Cuckoo Search Algorithm for parameter estimation in biological systems, CHEMOMETRICS AND INTELLIGENT LABORATORY SYSTEMS. (2016) 159 1-11
9 - Hojat Rakhshani, Effat Dehghanian, Amin Rahati, Hierarchy cuckoo search algorithm for parameter estimation in biological systems, CHEMOMETRICS AND INTELLIGENT LABORATORY SYSTEMS. (2016) 159 97-107

Introducing a panel for early detection of lung adenocarcinoma by integration of genomics, epigenomics, transcriptomics and proteomics

Haghjoo Niloofar، Moeini Ali، Masoudi-nejad Ali (2019)., EXPERIMENTAL AND MOLECULAR PATHOLOGY, 1(1).

Duplicated Replay Buffer for Asynchronous Deep Deterministic Policy Gradient

Seyed Motehayeri Seyed Mohammad، Baghi Vahid، Maani Miyandoab Ehsan، Moeini Ali (2021)., 2021 26th International Computer Conference, Computer Society of Iran (CSICC), Tehran, Iran, 3-4 March, Tehran, Iran.

On the optimization of Hadoop MapReduce default job scheduling through dynamic job prioritization
Lattices in Cryptography

Integer lattices have found many applications in cryptography: in proofs of security, in attacks, and in constructing cryptosystems.


Can multi-user services operate without sending all user data to the cloud in the clear? Some examples include private location-based services, private computation of aggregate statistics, private recommendation systems, private queries to a database, and anonymous messaging.

Crypto currencies and blockchains

We are developing cryptographic tools with applications to crypto currencies and blockchains. We are also teaching a course on the topic, CS251.

Pairings-Based Cryptography

Cryptographic pairings have numerous applications to cryptography, including everything from identity-based encryption and short digital signatures to broadcast encryption and search-friendly encryption.

Computer and Web Security

Computer security research explores architectures that improve software security and enhances our understanding of attack strategies. Our research covers SSL and TLS, Web security, and areas of operating systems security.

Bulletproofs: Short Proofs for Confidential Transactions and More
Show more
Prio: Private, Robust, and Scalable Computation of Aggregate Statistics
Show more
Order-Revealing Encryption
Show more
Balloon Hashing: Memory-Hard Password Hashing
Show more
PowerSpy: Location Tracking using Mobile Device Power Analysis
Show more
Riposte: An Anonymous Messaging System Handling Millions of Users
Show more
Gyrophone: Recognizing Speech from Gyroscope Signals
Show more
PORTIA: Managing sensitive information in a wired world
Show more
Location privacy
Show more
Identity Based Encryption email system (IBE secure email)

Show more. email system (IBE secure email)

The ITTC project: Intrusion tolerance via threshold cryptography
Show more: Intrusion tolerance via threshold cryptography