Alsharif Abuadbba
Orcid: 0000-0001-9695-7947
According to our database1,
Alsharif Abuadbba
authored at least 93 papers
between 2015 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
IEEE Trans. Intell. Transp. Syst., October, 2024
IEEE Internet Things J., October, 2024
Can differential privacy practically protect collaborative deep learning inference for IoT?
Wirel. Networks, August, 2024
Multi-aspect rule-based AI: Methods, taxonomy, challenges and directions towards automation, intelligence and transparent cybersecurity modeling for critical infrastructures.
Internet Things, April, 2024
Toward a Critical Evaluation of Robustness for Deep Learning Backdoor Countermeasures.
IEEE Trans. Inf. Forensics Secur., 2024
IEEE Trans. Inf. Forensics Secur., 2024
IEEE Trans. Dependable Secur. Comput., 2024
Proc. Priv. Enhancing Technol., 2024
One-to-Multiple Clean-Label Image Camouflage (OmClic) based backdoor attack on deep learning.
Knowl. Based Syst., 2024
CoRR, 2024
From Solitary Directives to Interactive Encouragement! LLM Secure Code Generation by Natural Language Prompting.
CoRR, 2024
Systematic Literature Review of AI-enabled Spectrum Management in 6G and Future Networks.
CoRR, 2024
DeepiSign-G: Generic Watermark to Stamp Hidden DNN Parameters for Self-contained Tracking.
CoRR, 2024
CoRR, 2024
CoRR, 2024
CoRR, 2024
AI Commun., 2024
Proceedings of the 33rd USENIX Security Symposium, 2024
Proceedings of the IEEE Symposium on Security and Privacy, 2024
Proceedings of the 2024 Joint International Conference on Computational Linguistics, 2024
Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security, 2024
Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security, 2024
Proceedings of the 19th ACM Asia Conference on Computer and Communications Security, 2024
Proceedings of the Information Security and Privacy - 29th Australasian Conference, 2024
2023
A Security-Enhanced Certificateless Conditional Privacy-Preserving Authentication Scheme for Vehicular Ad Hoc Networks.
IEEE Trans. Intell. Transp. Syst., October, 2023
Authenticated Data Sharing With Privacy Protection and Batch Verification for Healthcare IoT.
IEEE Trans. Sustain. Comput., 2023
IEEE Trans. Inf. Forensics Secur., 2023
Interpretability and Transparency-Driven Detection and Transformation of Textual Adversarial Examples (IT-DT).
CoRR, 2023
Concurr. Comput. Pract. Exp., 2023
Deepfake in the Metaverse: Security Implications for Virtual Gaming, Meetings, and Offices.
Proceedings of the 2nd Workshop on Security Implications of Deepfakes and Cheapfakes, 2023
Proceedings of the 2nd Workshop on Security Implications of Deepfakes and Cheapfakes, 2023
TransCAB: Transferable Clean-Annotation Backdoor to Object Detection with Natural Trigger in Real-World.
Proceedings of the 42nd International Symposium on Reliable Distributed Systems, 2023
Proceedings of the 44th IEEE Symposium on Security and Privacy, 2023
Proceedings of the 30th Annual Network and Distributed System Security Symposium, 2023
Proceedings of the 32nd ACM International Conference on Information and Knowledge Management, 2023
Proceedings of the 18th Asian Internet Engineering Conference, 2023
DeepTaster: Adversarial Perturbation-Based Fingerprinting to Identify Proprietary Dataset Use in Deep Neural Networks.
Proceedings of the Annual Computer Security Applications Conference, 2023
2022
OCTOPUS: Overcoming Performance and Privatization Bottlenecks in Distributed Learning.
IEEE Trans. Parallel Distributed Syst., 2022
IEEE Trans. Inf. Forensics Secur., 2022
Evaluation and Optimization of Distributed Machine Learning Techniques for Internet of Things.
IEEE Trans. Computers, 2022
Cryptanalysis and improvements of an efficient certificate-based proxy signature scheme for IIoT environments.
Inf. Process. Lett., 2022
Certificate-Based Anonymous Authentication With Efficient Aggregation for Wireless Medical Sensor Networks.
IEEE Internet Things J., 2022
Future Gener. Comput. Syst., 2022
CoRR, 2022
MACAB: Model-Agnostic Clean-Annotation Backdoor to Object Detection with Natural Trigger in Real-World.
CoRR, 2022
Towards A Critical Evaluation of Robustness for Deep Learning Backdoor Countermeasures.
CoRR, 2022
CoRR, 2022
Dangerous Cloaking: Natural Trigger based Backdoor Attacks on Object Detectors in the Physical World.
CoRR, 2022
Proceedings of the Network and System Security - 16th International Conference, 2022
Proceedings of the 42nd IEEE International Conference on Distributed Computing Systems, 2022
Proceedings of the Computer Security - ESORICS 2022, 2022
Proceedings of the ASIA CCS '22: ACM Asia Conference on Computer and Communications Security, Nagasaki, Japan, 30 May 2022, 2022
Proceedings of the Annual Computer Security Applications Conference, 2022
2021
Energy-Efficient Hybrid Routing Protocol for IoT Communication Systems in 5G and Beyond.
Sensors, 2021
IEEE Internet Things J., 2021
OCTOPUS: Overcoming Performance andPrivatization Bottlenecks in Distributed Learning.
CoRR, 2021
Can Differential Privacy Practically Protect Collaborative Deep Learning Inference for the Internet of Things?
CoRR, 2021
DeepiSign: Invisible Fragile Watermark to Protect the Integrityand Authenticity of CNN.
CoRR, 2021
Comput. Commun., 2021
DeepiSign: invisible fragile watermark to protect the integrity and authenticity of CNN.
Proceedings of the SAC '21: The 36th ACM/SIGAPP Symposium on Applied Computing, 2021
Proceedings of the 51st Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2021
2020
Decamouflage: A Framework to Detect Image-Scaling Attacks on Convolutional Neural Networks.
CoRR, 2020
FedEmail: Performance Measurement of Privacy-friendly Phishing Detection Enabled by Federated Learning.
CoRR, 2020
Proceedings of the Second IEEE International Conference on Trust, 2020
Proceedings of the Second IEEE International Conference on Trust, 2020
End-to-End Evaluation of Federated Learning and Split Learning for Internet of Things.
Proceedings of the International Symposium on Reliable Distributed Systems, 2020
Privacy-Preserving Authentication for Tree-Structured Data with Designated Verification in Outsourced Environments.
Proceedings of the Provable and Practical Security - 14th International Conference, ProvSec 2020, Singapore, November 29, 2020
Proceedings of the ASIA CCS '20: The 15th ACM Asia Conference on Computer and Communications Security, 2020
Proceedings of the Information Security and Privacy - 25th Australasian Conference, 2020
2019
IoTSign: Protecting Privacy and Authenticity of IoT using Discrete Cosine Based Steganography.
CoRR, 2019
2018
IEEE Trans. Smart Grid, 2018
2017
Walsh-Hadamard-Based 3-D Steganography for Protecting Sensitive Information in Point-of-Care.
IEEE Trans. Biomed. Eng., 2017
2016
IEEE Cloud Comput., 2016
Resilient to shared spectrum noise scheme for protecting cognitive radio smart grid readings - BCH based steganographic approach.
Ad Hoc Networks, 2016
2015
Robust privacy preservation and authenticity of the collected data in cognitive radio network - Walsh-Hadamard based steganographic approach.
Pervasive Mob. Comput., 2015
Wavelet based steganographic technique to protect household confidential information and seal the transmitted smart grid readings.
Inf. Syst., 2015