Aminollah Khormali

Orcid: 0000-0002-4171-8479

According to our database1, Aminollah Khormali authored at least 24 papers between 2018 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Self-Supervised Graph Transformer for Deepfake Detection.
IEEE Access, 2024

2023
Deep Biological Pathway Informed Pathology-Genomic Multimodal Survival Prediction.
CoRR, 2023

2021
Corrigendum to "Domain name system security and privacy: A contemporary survey" Computer Networks Volume 185 (2020) 107699.
Comput. Networks, 2021

Domain name system security and privacy: A contemporary survey.
Comput. Networks, 2021

ADD: Attention-Based DeepFake Detection Approach.
Big Data Cogn. Comput., 2021

2020
Measuring the Cost of Software Vulnerabilities.
EAI Endorsed Trans. Security Safety, 2020

Generating Adversarial Examples with an Optimized Quality.
CoRR, 2020

Domain Name System Security and Privacy: A Contemporary Survey.
CoRR, 2020

Developing a Robust Defensive System against Adversarial Examples Using Generative Adversarial Networks.
Big Data Cogn. Comput., 2020

TranScreen: Transfer Learning on Graph-Based Anti-Cancer Virtual Screening Model.
Big Data Cogn. Comput., 2020

From Blue-Sky to Practical Adversarial Learning.
Proceedings of the Second IEEE International Conference on Trust, 2020

DFD: Adversarial Learning-based Approach to Defend Against Website Fingerprinting.
Proceedings of the 39th IEEE Conference on Computer Communications, 2020

2019
Analyzing and Detecting Emerging Internet of Things Malware: A Graph-Based Approach.
IEEE Internet Things J., 2019

COPYCAT: Practical Adversarial Attacks on Visualization-Based Malware Detection.
CoRR, 2019

Examining Adversarial Learning against Graph-based IoT Malware Detection Systems.
CoRR, 2019

Analyzing, Comparing, and Detecting Emerging Malware: A Graph-based Approach.
CoRR, 2019

Breaking graph-based IoT malware detection systems using adversarial examples: poster.
Proceedings of the 12th Conference on Security and Privacy in Wireless and Mobile Networks, 2019

Adversarial Learning Attacks on Graph-based IoT Malware Detection Systems.
Proceedings of the 39th IEEE International Conference on Distributed Computing Systems, 2019

Dine and Dash: Static, Dynamic, and Economic Analysis of In-Browser Cryptojacking.
Proceedings of the 2019 APWG Symposium on Electronic Crime Research, 2019

Where Are You Taking Me? Behavioral Analysis of Open DNS Resolvers.
Proceedings of the 49th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2019

Examining the Robustness of Learning-Based DDoS Detection in Software Defined Networks.
Proceedings of the 2019 IEEE Conference on Dependable and Secure Computing, 2019

2018
End-to-End Analysis of In-Browser Cryptojacking.
CoRR, 2018

Understanding the Hidden Cost of Software Vulnerabilities: Measurements and Predictions.
Proceedings of the Security and Privacy in Communication Networks, 2018

POSTER: Understanding the Hidden Cost of Software Vulnerabilities: Measurements and Predictions.
Proceedings of the 2018 on Asia Conference on Computer and Communications Security, 2018


  Loading...