Mohammad Nauman

Orcid: 0000-0003-0941-2549

According to our database1, Mohammad Nauman authored at least 45 papers between 2007 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Interpretable Detection of Malicious Behavior in Windows Portable Executables Using Multi-Head 2D Transformers.
Big Data Min. Anal., 2024

2022
Gene Ontology GAN (GOGAN): a novel architecture for protein function prediction.
Soft Comput., 2022

Gene Ontology Capsule GAN: an improved architecture for protein function prediction.
PeerJ Comput. Sci., 2022

2021
Integrity verification and behavioral classification of a large dataset applications pertaining smart OS via blockchain and generative models.
Expert Syst. J. Knowl. Eng., 2021

Op2Vec: An Opcode Embedding Technique and Dataset Design for End-to-End Detection of Android Malware.
CoRR, 2021

2019
DeepMoney: counterfeit money detection using generative adversarial networks.
PeerJ Comput. Sci., 2019

Beyond Homology Transfer: Deep Learning for Automated Annotation of Proteins.
J. Grid Comput., 2019

Function Identification in Android Binaries with Deep Learning.
Proceedings of the 2019 Seventh International Symposium on Computing and Networking, 2019

2018
Design and implementation of an attestation protocol for measured dynamic behavior.
J. Supercomput., 2018

Trust in IoT: dynamic remote attestation through efficient behavior capture.
Clust. Comput., 2018

Deep neural architectures for large scale android malware analysis.
Clust. Comput., 2018

2017
LUNA: Quantifying and Leveraging Uncertainty in Android Malware Analysis through Bayesian Machine Learning.
Proceedings of the 2017 IEEE European Symposium on Security and Privacy, 2017

2016
TSSDroid: realization of an efficient and usable TSS API for the Android software stack.
Secur. Commun. Networks, 2016

A three-way decision making approach to malware analysis using probabilistic rough sets.
Inf. Sci., 2016

Efficient, Scalable and Privacy Preserving Application Attestation in a Multi Stakeholder Scenario.
Proceedings of the Computational Science and Its Applications - ICCSA 2016, 2016

2015
Realization of a user-centric, privacy preserving permission framework for Android.
Secur. Commun. Networks, 2015

A Three-Way Decision Making Approach to Malware Analysis.
Proceedings of the Rough Sets and Knowledge Technology - 10th International Conference, 2015

2014
Transforming high-level requirements to executable policies for Android.
Proceedings of the 8th International Conference on Ubiquitous Information Management and Communication, 2014

2013
Using trusted computing for privacy preserving keystroke-based authentication in smartphones.
Telecommun. Syst., 2013

Behavioral Attestation for Web Services using access policies.
Multim. Tools Appl., 2013

Towards a high-level trusted computing API for Android software stack.
Proceedings of the 7th International Conference on Ubiquitous Information Management and Communication, 2013

Realization of dynamic behavior using remotely verifiable n-call slides in Unix process execution trace.
Proceedings of the 7th International Conference on Ubiquitous Information Management and Communication, 2013

2012
Specification and Standardization of a Java Trusted Computing API.
Softw. Pract. Exp., 2012

Analysis of existing remote attestation techniques.
Secur. Commun. Networks, 2012

A sense of others: behavioral attestation of UNIX processes on remote platforms.
Proceedings of the 6th International Conference on Ubiquitous Information Management and Communication, 2012

POAuth: privacy-aware open authorization for native apps on smartphone platforms.
Proceedings of the 6th International Conference on Ubiquitous Information Management and Communication, 2012

How secure is your smartphone: An analysis of smartphone security mechanisms.
Proceedings of the 2012 International Conference on Cyber Security, 2012

2011
Design and implementation of a fine-grained resource usage model for the android platform.
Int. Arab J. Inf. Technol., 2011

2010
Behavioral Attestation for Web Services Based Business Processes.
Int. J. Web Serv. Res., 2010

Beyond Kernel-Level Integrity Measurement: Enabling Remote Attestation for the Android Platform.
Proceedings of the Trust and Trustworthy Computing, Third International Conference, 2010

MAuth: A Fine-Grained and User-centric Permission Delegation Framework for Multi-mashup Web Services.
Proceedings of the 6th World Congress on Services, 2010

TOKEN: Trustable Keystroke-Based Authentication for Web-Based Applications on Smartphones.
Proceedings of the Information Security and Assurance - 4th International Conference, 2010

On Leveraging Stochastic Models for Remote Attestation.
Proceedings of the Trusted Systems - Second International Conference, 2010

Apex: extending Android permission model and enforcement with user-defined runtime constraints.
Proceedings of the 5th ACM Symposium on Information, 2010

2009
Remote Attestation of Attribute Updates and Information Flows in a UCON System.
Proceedings of the Trusted Computing, 2009

Scalable Remote Attestation with Privacy Protection.
Proceedings of the Trusted Systems, First International Conference, 2009

Behavioral Attestation for Business Processes.
Proceedings of the IEEE International Conference on Web Services, 2009

SAuthMash: mobile agent based self authorization in mashups.
Proceedings of the FIT '09, 2009

Realizing dynamic behavior attestation for mobile platforms.
Proceedings of the FIT '09, 2009

Towards platform-independent trusted computing.
Proceedings of the 4th ACM Workshop on Scalable Trusted Computing, 2009

2008
Behavioral attestation for web services (BA4WS).
Proceedings of the 5th ACM Workshop On Secure Web Services, 2008

Model-based behavioral attestation.
Proceedings of the 13th ACM Symposium on Access Control Models and Technologies, 2008

Resolving Lexical Ambiguities in Folksonomy Based Search Systems through Common Sense and Personalization.
Proceedings of the Workshop on Semantic Search (SemSearch 2008) at the 5th European Semantic Web Conference (ESWC 2008), 2008

2007
Using PersonalizedWeb Search for Enhancing Common Sense and Folksonomy Based Intelligent Search Systems.
Proceedings of the 2007 IEEE / WIC / ACM International Conference on Web Intelligence, 2007

SE and CS Collaboration: Training Students for Engineering Large, Complex Systems.
Proceedings of the 20th Conference on Software Engineering Education and Training (CSEE&T 2007), 2007


  Loading...