Seguir
Mohammed Abuhamad
Mohammed Abuhamad
Dirección de correo verificada de luc.edu - Página principal
Título
Citado por
Citado por
Año
Sensor-based Continuous Authentication of Smartphones' Users Using Behavioral Biometrics: A Contemporary Survey
M Abuhamad, A Abusnaina, DH Nyang, D Mohaisen
IEEE Internet of Things Journal 8 (1), 65 - 84, 2021
1572021
AUToSen: Deep Learning-based Implicit Continuous Authentication Using Smartphone Sensors
M Abuhamad, T Abuhmed, D Mohaisen, DH Nyang
IEEE Internet of Things Journal 7 (6), 5008-5020, 2020
1282020
Large-scale and language-oblivious code authorship identification
M Abuhamad, T AbuHmed, A Mohaisen, DH Nyang
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications …, 2018
1112018
Code authorship identification using convolutional neural networks
M Abuhamad, J Rhim, T AbuHmed, S Ullah, S Kang, DH Nyang
Future Generation Computer Systems 95, 104-115, 2019
562019
Soteria: Detecting adversarial examples in control flow graph-based malware classifiers
H Alasmary, A Abusnaina, R Jang, M Abuhamad, A Anwar, DH Nyang, ...
2020 IEEE 40th International Conference on Distributed Computing Systems …, 2020
482020
Dl-fhmc: Deep learning-based fine-grained hierarchical learning approach for robust malware classification
A Abusnaina, M Abuhamad, H Alasmary, A Anwar, R Jang, S Salem, ...
IEEE Transactions on Dependable and Secure Computing 19 (5), 3432-3447, 2021
362021
W-Net: A CNN-based Architecture for White Blood Cells Image Classification
C Jung, M Abuhamad, J Alikhanov, A Mohaisen, K Han, DH Nyang
The AAAI 2019 Symposium on AI for Social Good, 2019
342019
WBC image classification and generative models based on convolutional neural network
C Jung, M Abuhamad, D Mohaisen, K Han, DH Nyang
BMC Medical Imaging 22 (1), 94, 2022
262022
Hate, obscenity, and insults: Measuring the exposure of children to inappropriate comments in youtube
S Alshamrani, A Abusnaina, M Abuhamad, D Nyang, D Mohaisen
Companion proceedings of the web conference 2021, 508-515, 2021
262021
Investigating Online Toxicity in Users Interactions with the Mainstream Media Channels on YouTube.
S Alshamrani, M Abuhamad, A Abusnaina, D Mohaisen
CIKM (Workshops), 2020
242020
Event-driven business intelligence approach for real-time integration of technical and fundamental analysis in forex market
M AbuHamad, M Mohd, J Salim
Journal of Computer Science 9 (4), 488, 2013
232013
Subgraph-based Adversarial Examples Against Graph-based IoT Malware Detection Systems
A Abusnaina, H Alasmary, M Abuhamad, S Salem, D Nyang, M Aziz
In Proceedings of the 8th International Conference on Computational Data and …, 2019
202019
Multi-χ: Identifying multiple authors from source code files
M Abuhamad, T Abuhmed, DH Nyang, D Mohaisen
Proceedings on Privacy Enhancing Technologies, 2020
192020
Understanding the proxy ecosystem: A comparative analysis of residential and open proxies on the internet
J Choi, M Abuhamad, A Abusnaina, A Anwar, S Alshamrani, J Park, ...
IEEE Access 8, 111368-111380, 2020
142020
Investigating the effect of traffic sampling on machine learning-based network intrusion detection approaches
J Alikhanov, R Jang, M Abuhamad, D Mohaisen, D Nyang, Y Noh
IEEE Access 10, 5801-5823, 2021
132021
Advedge: Optimizing adversarial perturbations against interpretable deep learning
E Abdukhamidov, M Abuhamad, F Juraev, E Chan-Tin, T AbuHmed
Computational Data and Social Networks: 10th International Conference …, 2021
132021
Leveraging Spectral Representations of Control Flow Graphs for Efficient Analysis of Windows Malware
Q Sun, E Abdukhamidov, T Abuhmed, M Abuhamad
The 17th ACM ASIA Conference on Computer and Communications Security (ACM …, 2022
102022
Large-scale and Robust Code Authorship Identification with Deep Feature Learning
M Abuhamad, T Abuhmed, D Mohaisen, D Nyang
ACM Transactions on Privacy and Security (TOPS) 24 (4), 1-35, 2021
92021
Interpretations cannot be trusted: Stealthy and effective adversarial perturbations against interpretable deep learning
E Abdukhamidov, M Abuhamad, SS Woo, E Chan-Tin, T Abuhmed
arXiv preprint arXiv:2211.15926, 2022
82022
Black-box and Target-specific Attack Against Interpretable Deep Learning Systems
E Abdukhamidov, F Juraev, M Abuhamad, T Abuhmed
The 17th ACM ASIA Conference on Computer and Communications Security (ACM …, 2022
82022
El sistema no puede realizar la operación en estos momentos. Inténtalo de nuevo más tarde.
Artículos 1–20