M. Ejaz Ahmed

Orcid: 0000-0001-8033-0998

According to our database1, M. Ejaz Ahmed authored at least 41 papers between 2009 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
ST-DPGAN: A Privacy-preserving Framework for Spatiotemporal Data Generation.
CoRR, 2024

Malicious Package Detection using Metadata Information.
Proceedings of the ACM on Web Conference 2024, 2024

2023
LimitAccess: on-device TinyML based robust speech recognition and age classification.
Discov. Artif. Intell., 2023

model-based script synthesis for fuzzing.
CoRR, 2023

SemDiff: Binary Similarity Detection by Diffing Key-Semantics Graphs.
CoRR, 2023

Unraveling Threat Intelligence Through the Lens of Malicious URL Campaigns.
Proceedings of the 18th Asian Internet Engineering Conference, 2023

2022
Backdoor Attack on Machine Learning Based Android Malware Detectors.
IEEE Trans. Dependable Secur. Comput., 2022

Transformer-Based Language Models for Software Vulnerability Detection: Performance, Model's Security and Platforms.
CoRR, 2022

Towards Web Phishing Detection Limitations and Mitigation.
CoRR, 2022

Cross-language Android permission specification.
Proceedings of the 30th ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering, 2022

VulDeBERT: A Vulnerability Detection System Using BERT.
Proceedings of the IEEE International Symposium on Software Reliability Engineering Workshops, 2022

Transformer-Based Language Models for Software Vulnerability Detection.
Proceedings of the Annual Computer Security Applications Conference, 2022

2021
NatiDroid: Cross-Language Android Permission Specification.
CoRR, 2021

Characterizing Malicious URL Campaigns.
CoRR, 2021

Peeler: Profiling Kernel-Level Events to Detect Ransomware.
Proceedings of the Computer Security - ESORICS 2021, 2021

Decamouflage: A Framework to Detect Image-Scaling Attacks on CNN.
Proceedings of the 51st Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2021

2020
Decamouflage: A Framework to Detect Image-Scaling Attacks on Convolutional Neural Networks.
CoRR, 2020

Void: A fast and light voice liveness detection system.
Proceedings of the 29th USENIX Security Symposium, 2020

2019
Statistical Application Fingerprinting for DDoS Attack Mitigation.
IEEE Trans. Inf. Forensics Secur., 2019

NOn-parametric Bayesian channEls cLustering (NOBEL) Scheme for Wireless Multimedia Cognitive Radio Networks.
IEEE J. Sel. Areas Commun., 2019

2018
Optimal Spectrum Sensing Policy in RF-Powered Cognitive Radio Networks.
IEEE Trans. Veh. Technol., 2018

Traffic-Aware Optimal Spectral Access in Wireless Powered Cognitive Radio Networks.
IEEE Trans. Mob. Comput., 2018

Optimal Spectrum Sensing Policy with Traffic Classification in RF-Powered CRNs.
CoRR, 2018

Traffic-Aware Optimal Spectrum Sensing Policy in Wireless-Powered Cognitive Radio Networks.
Proceedings of the 12th International Conference on Ubiquitous Information Management and Communication, 2018

MEDUSA: Malware Detection Using Statistical Analysis of System's Behavior.
Proceedings of the 4th IEEE International Conference on Collaboration and Internet Computing, 2018

2017
Energy-Arrival-Aware Detection Threshold in Wireless-Powered Cognitive Radio Networks.
IEEE Trans. Veh. Technol., 2017

Mitigating DNS query-based DDoS attacks with machine learning on software-defined networking.
Proceedings of the 2017 IEEE Military Communications Conference, 2017

Traffic-pattern aware opportunistic wireless energy harvesting in cognitive radio networks.
Proceedings of the IEEE International Conference on Communications, 2017

Preventing DNS Amplification Attacks Using the History of DNS Queries with SDN.
Proceedings of the Computer Security - ESORICS 2017, 2017

Poster: Adversarial Examples for Classifiers in High-Dimensional Network Data.
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, 2017

DDoS Attack Mitigation in Internet of Things Using Software Defined Networking.
Proceedings of the Third IEEE International Conference on Big Data Computing Service and Applications, 2017

2016
Traffic and energy-aware access in wireless powered cognitive radio networks.
Proceedings of the IEEE Wireless Communications and Networking Conference, 2016

2015
Channel Allocation Based on Content Characteristics for Video Transmission in Time-Domain-Based Multichannel Cognitive Radio Networks.
Mob. Inf. Syst., 2015

2014
Sensing-Transmission Edifice Using Bayesian Nonparametric Traffic Clustering in Cognitive Radio Networks.
IEEE Trans. Mob. Comput., 2014

Resource Optimization Scheme for Multimedia-Enabled Wireless Mesh Networks.
Sensors, 2014

Mitigating malicious attacks using Bayesian nonparametric clustering in collaborative cognitive radio networks.
Proceedings of the IEEE Global Communications Conference, 2014

2013
Traffic pattern-based reward maximization for secondary user in dynamic spectrum access.
Proceedings of the 2013 IEEE Wireless Communications and Networking Conference (WCNC), 2013

2012
Non-Parametric Bayesian Human Motion Recognition Using a Single MEMS Tri-Axial Accelerometer.
Sensors, 2012

Channel allocation under uncertain primary users for delay sensitive secondary users.
Proceedings of the 2012 IEEE Wireless Communications and Networking Conference, 2012

Nonparametric Bayesian identification of primary users' payloads in cognitive radio networks.
Proceedings of IEEE International Conference on Communications, 2012

2009
Channel assignment in cognitive radio networks: comparison and analysis.
Proceedings of the FIT '09, 2009


  Loading...