Mohammed Abuhamad
Orcid: 0000-0002-3368-6024
According to our database1,
Mohammed Abuhamad
authored at least 44 papers
between 2013 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2024
SingleADV: Single-Class Target-Specific Attack Against Interpretable Deep Learning Systems.
IEEE Trans. Inf. Forensics Secur., 2024
Hardening Interpretable Deep Learning Systems: Investigating Adversarial Threats and Defenses.
IEEE Trans. Dependable Secur. Comput., 2024
MotionID: Towards practical behavioral biometrics-based implicit user authentication on smartphones.
Pervasive Mob. Comput., 2024
From Attack to Defense: Insights into Deep Learning Security Measures in Black-Box Settings.
CoRR, 2024
CoRR, 2024
The Impact of Model Variations on the Robustness of Deep Learning Models in Adversarial Settings.
Proceedings of the Silicon Valley Cybersecurity Conference, 2024
Unmasking the Vulnerabilities of Deep Learning Models: A Multi-Dimensional Analysis of Adversarial Attacks and Defenses.
Proceedings of the Silicon Valley Cybersecurity Conference, 2024
2023
Unveiling Vulnerabilities in Interpretable Deep Learning Systems with Query-Efficient Black-box Attacks.
CoRR, 2023
Microbial Genetic Algorithm-based Black-box Attack against Interpretable Deep Learning Systems.
CoRR, 2023
CoRR, 2023
Proceedings of the Silicon Valley Cybersecurity Conference, 2023
Proceedings of the Silicon Valley Cybersecurity Conference, 2023
Proceedings of the Computational Data and Social Networks - 12th International Conference, 2023
2022
DL-FHMC: Deep Learning-Based Fine-Grained Hierarchical Learning Approach for Robust Malware Classification.
IEEE Trans. Dependable Secur. Comput., 2022
ShellCore: Automating Malicious IoT Software Detection Using Shell Commands Representation.
IEEE Internet Things J., 2022
Interpretations Cannot Be Trusted: Stealthy and Effective Adversarial Perturbations against Interpretable Deep Learning.
CoRR, 2022
WBC image classification and generative models based on convolutional neural network.
BMC Medical Imaging, 2022
Investigating the Effect of Traffic Sampling on Machine Learning-Based Network Intrusion Detection Approaches.
IEEE Access, 2022
MLxPack: Investigating the Effects of Packers on ML-based Malware Detection Systems Using Static and Dynamic Traits.
Proceedings of the CySSS@AsiaCCS'22: Proceedings of the 1st Workshop on Cybersecurity and Social Sciences, 2022
Leveraging Spectral Representations of Control Flow Graphs for Efficient Analysis of Windows Malware.
Proceedings of the ASIA CCS '22: ACM Asia Conference on Computer and Communications Security, Nagasaki, Japan, 30 May 2022, 2022
Proceedings of the ASIA CCS '22: ACM Asia Conference on Computer and Communications Security, Nagasaki, Japan, 30 May 2022, 2022
Proceedings of the ASIA CCS '22: ACM Asia Conference on Computer and Communications Security, Nagasaki, Japan, 30 May 2022, 2022
2021
ACM Trans. Priv. Secur., 2021
Sensor-Based Continuous Authentication of Smartphones' Users Using Behavioral Biometrics: A Contemporary Survey.
IEEE Internet Things J., 2021
ShellCore: Automating Malicious IoT Software Detection by Using Shell Commands Representation.
CoRR, 2021
An Exploration of Geo-temporal Characteristics of Users' Reactions on Social Media During the Pandemic.
CoRR, 2021
Hate, Obscenity, and Insults: Measuring the Exposure of Children to Inappropriate Comments in YouTube.
Proceedings of the Companion of The Web Conference 2021, 2021
Proceedings of the Computational Data and Social Networks - 10th International Conference, 2021
2020
Proc. Priv. Enhancing Technol., 2020
AUToSen: Deep-Learning-Based Implicit Continuous Authentication Using Smartphone Sensors.
IEEE Internet Things J., 2020
A Deep Learning-based Fine-grained Hierarchical Learning Approach for Robust Malware Classification.
CoRR, 2020
Sensor-based Continuous Authentication of Smartphones' Users Using Behavioral Biometrics: A Survey.
CoRR, 2020
Understanding the Proxy Ecosystem: A Comparative Analysis of Residential and Open Proxies on the Internet.
IEEE Access, 2020
Insights into Attacks' Progression: Prediction of Spatio-Temporal Behavior of DDoS Attacks.
Proceedings of the Information Security Applications - 21st International Conference, 2020
Soteria: Detecting Adversarial Examples in Control Flow Graph-based Malware Classifiers.
Proceedings of the 40th IEEE International Conference on Distributed Computing Systems, 2020
An Analysis of Users Engagement on Twitter During the COVID-19 Pandemic: Topical Trends and Sentiments.
Proceedings of the Computational Data and Social Networks - 9th International Conference, 2020
Investigating Online Toxicity in Users Interactions with the Mainstream Media Channels on YouTube.
Proceedings of the CIKM 2020 Workshops co-located with 29th ACM International Conference on Information and Knowledge Management (CIKM 2020), 2020
2019
Future Gener. Comput. Syst., 2019
CoRR, 2019
Subgraph-Based Adversarial Examples Against Graph-Based IoT Malware Detection Systems.
Proceedings of the Computational Data and Social Networks - 8th International Conference, 2019
2018
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018
2013
Event-Driven Business Intelligence Approach for Real-Time Integration of Technical and fundamental Analysis in Forex Market.
J. Comput. Sci., 2013