Ahmed Aleroud
Orcid: 0000-0003-4337-1488Affiliations:
- Augusta University, Augusta, GA, USA
According to our database1,
Ahmed Aleroud
authored at least 48 papers
between 2011 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on augusta.edu
-
on orcid.org
On csauthors.net:
Bibliography
2024
Constraining Adversarial Attacks on Network Intrusion Detection Systems: Transferability and Defense Analysis.
IEEE Trans. Netw. Serv. Manag., June, 2024
A privacy-enhanced human activity recognition using GAN & entropy ranking of microaggregated data.
Clust. Comput., April, 2024
The Role of Emotions in Informational Support Question-Response Pairs in Online Health Communities: A Multimodal Deep Learning Approach.
CoRR, 2024
Optimizing Pregnancy Online Health Communities for Decision-Making with Information Quality Heuristics.
Proceedings of the 2024 Computers and People Research Conference, 2024
Privacy-preserving, Lightweight, and Decentralized Load Forecasting in Smart Grid AMI Networks.
Proceedings of the IEEE International Conference on Communications, 2024
AI Vs Human: Evaluating AI's Proficiency in Detecting and Responding to Informational and Emotional Health Queries.
Proceedings of the 30th Americas Conference on Information Systems: Elevating Life through Digital Social Entrepreneurship, 2024
2023
Detecting science-based health disinformation: a stylometric machine learning approach.
J. Comput. Soc. Sci., October, 2023
Socio-Emotional Computational Analysis of Propaganda Campaigns on Social Media Users in the Middle East.
Proceedings of the Companion Proceedings of the ACM Web Conference 2023, 2023
Proceedings of the NOMS 2023, 2023
AI-based MultiModal to Identify State-linked Social Media Accounts in the Middle East: A Study on Twitter.
Proceedings of the IEEE International Conference on Intelligence and Security Informatics, 2023
Target-X: An Efficient Algorithm for Generating Targeted Adversarial Images to Fool Neural Networks.
Proceedings of the 47th IEEE Annual Computers, Software, and Applications Conference, 2023
sPAN-pROP: Combatting Contextualized Social Media State-Linked Propaganda in the Middle East.
Proceedings of the 29th Americas Conference on Information Systems, 2023
2022
From Theory to Practice: Towards an OSINT Framework to Mitigate Arabic Social Cyber Attacks.
Proceedings of the 3rd International Conference on Intelligent Data Science Technologies and Applications, 2022
Privacy Preserving Human Activity Recognition Using Microaggregated Generative Deep Learning.
Proceedings of the IEEE International Conference on Cyber Security and Resilience, 2022
Triggerability of Backdoor Attacks in Multi-Source Transfer Learning-based Intrusion Detection.
Proceedings of the IEEE/ACM International Conference on Big Data Computing, 2022
Proceedings of the 28th Americas Conference on Information Systems, 2022
2021
Fault-based testing for discovering SQL injection vulnerabilities in web applications.
Int. J. Inf. Comput. Secur., 2021
Anonymization of Network Traces Data through Condensation-based Differential Privacy.
DTRAP, 2021
Generative Adverserial Analysis of Phishing Attacks on Static and Dynamic Content of Webpages.
Proceedings of the 2021 IEEE Intl Conf on Parallel & Distributed Processing with Applications, Big Data & Cloud Computing, Sustainable Computing & Communications, Social Computing & Networking (ISPA/BDCloud/SocialCom/SustainCom), New York City, NY, USA, September 30, 2021
Identifying GDPR Privacy Violations Using an Augmented LSTM: Toward an AI-based Violation Alert Systems.
Proceedings of the 2021 IEEE Intl Conf on Parallel & Distributed Processing with Applications, Big Data & Cloud Computing, Sustainable Computing & Communications, Social Computing & Networking (ISPA/BDCloud/SocialCom/SustainCom), New York City, NY, USA, September 30, 2021
Proceedings of the IEEE International Conference on Intelligence and Security Informatics, 2021
2020
Automatic Bug Triage in Software Systems Using Graph Neighborhood Relations for Feature Augmentation.
IEEE Trans. Comput. Soc. Syst., 2020
An examination of susceptibility to spear phishing cyber attacks in non-English speaking communities.
J. Inf. Secur. Appl., 2020
A graph proximity feature augmentation approach for identifying accounts of terrorists on twitter.
Comput. Secur., 2020
Bypassing Detection of URL-based Phishing Attacks Using Generative Adversarial Deep Neural Networks.
Proceedings of the IWSPA@CODASPY '20: Proceedings ofthe Sixth International Workshop on Security and Privacy Analytics, 2020
2019
A Hybrid Pre-Post Constraint-Based Framework for Discovering Multi-Dimensional Association Rules Using Ontologies.
Int. J. Inf. Technol. Web Eng., 2019
Int. J. Comput. Appl. Technol., 2019
SDN-GAN: Generative Adversarial Deep NNs for Synthesizing Cyber Attacks on Software Defined Networks.
Proceedings of the On the Move to Meaningful Internet Systems: OTM 2019 Workshops, 2019
2018
IEEE Trans. Syst. Man Cybern. Syst., 2018
2017
Knowl. Inf. Syst., 2017
Identifying cyber-attacks on software defined networks: An inference-based intrusion detection approach.
J. Netw. Comput. Appl., 2017
Comput. Secur., 2017
An Efficient Activity Recognition Framework: Toward Privacy-Sensitive Health Data Sensing.
IEEE Access, 2017
Methods and techniques to identify security incidents using domain knowledge and contextual information.
Proceedings of the 2017 IFIP/IEEE Symposium on Integrated Network and Service Management (IM), 2017
2016
Proceedings of the 31st Annual ACM Symposium on Applied Computing, 2016
Network Trace Anonymization Using a Prefix-Preserving Condensation-Based Technique (Short paper).
Proceedings of the On the Move to Meaningful Internet Systems: OTM 2016 Conferences, 2016
2015
Proceedings of the 2015 IEEE International Conference on Intelligence and Security Informatics, 2015
2014
Int. J. Inf. Comput. Secur., 2014
Context Infusion in Semantic Link Networks to Detect Cyber-attacks: A Flow-Based Detection Approach.
Proceedings of the 2014 IEEE International Conference on Semantic Computing, 2014
Proceedings of the Knowledge Management in Organizations - 9th International Conference, 2014
2013
Proceedings of the IEEE 7th International Conference on Software Security and Reliability, 2013
2012
Evaluating Rule-Based and Statistical Filters to Detecting Arabic E-Mail Alert Messages.
Int. J. Comput. Process. Orient. Lang., 2012
Proceedings of the 7th International Conference on Knowledge Management in Organizations: Service and Cloud Computing, 2012
Proceedings of the 2012 ASE International Conference on Cyber Security, 2012
2011