Ahmed Aleroud

Orcid: 0000-0003-4337-1488

Affiliations:
  • Augusta University, Augusta, GA, USA


According to our database1, Ahmed Aleroud authored at least 48 papers between 2011 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Constraining Adversarial Attacks on Network Intrusion Detection Systems: Transferability and Defense Analysis.
IEEE Trans. Netw. Serv. Manag., June, 2024

A privacy-enhanced human activity recognition using GAN & entropy ranking of microaggregated data.
Clust. Comput., April, 2024

The Role of Emotions in Informational Support Question-Response Pairs in Online Health Communities: A Multimodal Deep Learning Approach.
CoRR, 2024

Optimizing Pregnancy Online Health Communities for Decision-Making with Information Quality Heuristics.
Proceedings of the 2024 Computers and People Research Conference, 2024

Privacy-preserving, Lightweight, and Decentralized Load Forecasting in Smart Grid AMI Networks.
Proceedings of the IEEE International Conference on Communications, 2024

AI Vs Human: Evaluating AI's Proficiency in Detecting and Responding to Informational and Emotional Health Queries.
Proceedings of the 30th Americas Conference on Information Systems: Elevating Life through Digital Social Entrepreneurship, 2024

2023
Detecting science-based health disinformation: a stylometric machine learning approach.
J. Comput. Soc. Sci., October, 2023

A Self-adaptive and Secure Approach to Share Network Trace Data.
DTRAP, 2023

Socio-Emotional Computational Analysis of Propaganda Campaigns on Social Media Users in the Middle East.
Proceedings of the Companion Proceedings of the ACM Web Conference 2023, 2023

A Novel Poisoning Attack on Few-Shot based Network Intrusion Detection.
Proceedings of the NOMS 2023, 2023

AI-based MultiModal to Identify State-linked Social Media Accounts in the Middle East: A Study on Twitter.
Proceedings of the IEEE International Conference on Intelligence and Security Informatics, 2023

Target-X: An Efficient Algorithm for Generating Targeted Adversarial Images to Fool Neural Networks.
Proceedings of the 47th IEEE Annual Computers, Software, and Applications Conference, 2023

sPAN-pROP: Combatting Contextualized Social Media State-Linked Propaganda in the Middle East.
Proceedings of the 29th Americas Conference on Information Systems, 2023

2022
From Theory to Practice: Towards an OSINT Framework to Mitigate Arabic Social Cyber Attacks.
Proceedings of the 3rd International Conference on Intelligent Data Science Technologies and Applications, 2022

Privacy Preserving Human Activity Recognition Using Microaggregated Generative Deep Learning.
Proceedings of the IEEE International Conference on Cyber Security and Resilience, 2022

Triggerability of Backdoor Attacks in Multi-Source Transfer Learning-based Intrusion Detection.
Proceedings of the IEEE/ACM International Conference on Big Data Computing, 2022

Conceptualizing Information Quality in Online Health Forums.
Proceedings of the 28th Americas Conference on Information Systems, 2022

2021
Fault-based testing for discovering SQL injection vulnerabilities in web applications.
Int. J. Inf. Comput. Secur., 2021

Anonymization of Network Traces Data through Condensation-based Differential Privacy.
DTRAP, 2021

Generative Adverserial Analysis of Phishing Attacks on Static and Dynamic Content of Webpages.
Proceedings of the 2021 IEEE Intl Conf on Parallel & Distributed Processing with Applications, Big Data & Cloud Computing, Sustainable Computing & Communications, Social Computing & Networking (ISPA/BDCloud/SocialCom/SustainCom), New York City, NY, USA, September 30, 2021

Identifying GDPR Privacy Violations Using an Augmented LSTM: Toward an AI-based Violation Alert Systems.
Proceedings of the 2021 IEEE Intl Conf on Parallel & Distributed Processing with Applications, Big Data & Cloud Computing, Sustainable Computing & Communications, Social Computing & Networking (ISPA/BDCloud/SocialCom/SustainCom), New York City, NY, USA, September 30, 2021

Generating Optimal Attack Paths in Generative Adversarial Phishing.
Proceedings of the IEEE International Conference on Intelligence and Security Informatics, 2021

2020
Automatic Bug Triage in Software Systems Using Graph Neighborhood Relations for Feature Augmentation.
IEEE Trans. Comput. Soc. Syst., 2020

An examination of susceptibility to spear phishing cyber attacks in non-English speaking communities.
J. Inf. Secur. Appl., 2020

A graph proximity feature augmentation approach for identifying accounts of terrorists on twitter.
Comput. Secur., 2020

Bypassing Detection of URL-based Phishing Attacks Using Generative Adversarial Deep Neural Networks.
Proceedings of the IWSPA@CODASPY '20: Proceedings ofthe Sixth International Workshop on Security and Privacy Analytics, 2020

2019
A Hybrid Pre-Post Constraint-Based Framework for Discovering Multi-Dimensional Association Rules Using Ontologies.
Int. J. Inf. Technol. Web Eng., 2019

A reliable route repairing scheme for internet of vehicles.
Int. J. Comput. Appl. Technol., 2019

SDN-GAN: Generative Adversarial Deep NNs for Synthesizing Cyber Attacks on Software Defined Networks.
Proceedings of the On the Move to Meaningful Internet Systems: OTM 2019 Workshops, 2019

2018
Queryable Semantics to Detect Cyber-Attacks: A Flow-Based Detection Approach.
IEEE Trans. Syst. Man Cybern. Syst., 2018

Multimode co-clustering for analyzing terrorist networks.
Inf. Syst. Frontiers, 2018

2017
Contextual information fusion for intrusion detection: a survey and taxonomy.
Knowl. Inf. Syst., 2017

Identifying cyber-attacks on software defined networks: An inference-based intrusion detection approach.
J. Netw. Comput. Appl., 2017

Phishing environments, techniques, and countermeasures: A survey.
Comput. Secur., 2017

An Efficient Activity Recognition Framework: Toward Privacy-Sensitive Health Data Sensing.
IEEE Access, 2017

Methods and techniques to identify security incidents using domain knowledge and contextual information.
Proceedings of the 2017 IFIP/IEEE Symposium on Integrated Network and Service Management (IM), 2017

2016
Beyond data: contextual information fusion for cyber security analytics.
Proceedings of the 31st Annual ACM Symposium on Applied Computing, 2016

Network Trace Anonymization Using a Prefix-Preserving Condensation-Based Technique (Short paper).
Proceedings of the On the Move to Meaningful Internet Systems: OTM 2016 Conferences, 2016

2015
Multi-granular aggregation of network flows for security analysis.
Proceedings of the 2015 IEEE International Conference on Intelligence and Security Informatics, 2015

2014
Context and semantics for detection of cyber attacks.
Int. J. Inf. Comput. Secur., 2014

Context Infusion in Semantic Link Networks to Detect Cyber-attacks: A Flow-Based Detection Approach.
Proceedings of the 2014 IEEE International Conference on Semantic Computing, 2014

Detecting Zero-Day Attacks Using Contextual Relations.
Proceedings of the Knowledge Management in Organizations - 9th International Conference, 2014

2013
Toward Zero-Day Attack Identification Using Linear Data Transformation Techniques.
Proceedings of the IEEE 7th International Conference on Software Security and Reliability, 2013

2012
A hybrid approach to detecting alerts in Arabic e-mail messages.
J. Inf. Sci., 2012

Evaluating Rule-Based and Statistical Filters to Detecting Arabic E-Mail Alert Messages.
Int. J. Comput. Process. Orient. Lang., 2012

A System for Cyber Attack Detection Using Contextual Semantics.
Proceedings of the 7th International Conference on Knowledge Management in Organizations: Service and Cloud Computing, 2012

A Contextual Anomaly Detection Approach to Discover Zero-Day Attacks.
Proceedings of the 2012 ASE International Conference on Cyber Security, 2012

2011
Evaluating Google queries based on language preferences.
J. Inf. Sci., 2011


  Loading...