Mohammed Al-Naeem

Orcid: 0000-0002-5682-6237

Affiliations:
  • King Faisal University, Department of Computer Networks & Communications, CCSIT, Saudi Arabia
  • Monash University, Clayton School of IT, VIC, Australia (PhD 2015)


According to our database1, Mohammed Al-Naeem authored at least 18 papers between 2010 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Deep learning adversarial attacks and defenses on license plate recognition system.
Clust. Comput., November, 2024

Investigating the Factors Impacting Adversarial Attack and Defense Performances in Federated Learning.
IEEE Trans. Engineering Management, 2024

ZFort: A scalable zero-trust approach for trust management and traffic engineering in SDN based IoTs.
Internet Things, 2024

Ransomware Attacks in Cyber-Physical Systems: Countermeasure of Attack Vectors Through Automated Web Defenses.
IEEE Access, 2024

A Literature Review on Cybersecurity Risks and Challenges Assessments in Virtual Power Plants: Current Landscape and Future Research Directions.
IEEE Access, 2024

Enhancing DoS Detection in WSNs Using Enhanced Ant Colony Optimization Algorithm.
IEEE Access, 2024

2023
Genetic Algorithm-Based Dynamic Backdoor Attack on Federated Learning-Based Network Traffic Classification.
Proceedings of the Eighth International Conference on Fog and Mobile Edge Computing, 2023

2022
Threats From Unintentional Insiders: An Assessment of an Organization's Readiness Using Machine Learning.
IEEE Access, 2022

Adversarial Machine Learning in Text Processing: A Literature Survey.
IEEE Access, 2022

A High Static Performance Hierarchical Three-Dimensional Shifted Completely Connected Network.
IEEE Access, 2022

2021
Reliable and QoS aware routing metrics for wireless Neighborhood Area Networking in smart grids.
Comput. Networks, 2021

Towards an Unsupervised Feature Selection Method for Effective Dynamic Features.
IEEE Access, 2021

Prediction of Re-Occurrences of Spoofed ACK Packets Sent to Deflate a Target Wireless Sensor Network Node by DDOS.
IEEE Access, 2021

2020
Dealing With Well-Formed and Malformed Packets, Associated With Point of Failure That Cause Network Security Breach.
IEEE Access, 2020

ManiGen: A Manifold Aided Black-Box Generator of Adversarial Examples.
IEEE Access, 2020

2015
Pattern transformation-invariant schemes for wireless sensor networks based on an edge detection gradient-based mechanism.
PhD thesis, 2015

2012
A novel target recognition scheme for WSNs.
Proceedings of the 2012 International Joint Conference on Neural Networks (IJCNN), 2012

2010
MOHA: A Novel Target Recognition Scheme for WSNs.
Proceedings of the Mobile and Ubiquitous Systems: Computing, Networking, and Services, 2010


  Loading...