Alsharif Abuadbba

Orcid: 0000-0001-9695-7947

According to our database1, Alsharif Abuadbba authored at least 75 papers between 2015 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Multi-aspect rule-based AI: Methods, taxonomy, challenges and directions towards automation, intelligence and transparent cybersecurity modeling for critical infrastructures.
Internet Things, April, 2024

Toward a Critical Evaluation of Robustness for Deep Learning Backdoor Countermeasures.
IEEE Trans. Inf. Forensics Secur., 2024

NTD: Non-Transferability Enabled Deep Learning Backdoor Detection.
IEEE Trans. Inf. Forensics Secur., 2024

SoK: Can Trajectory Generation Combine Privacy and Utility?
CoRR, 2024

A Generative Adversarial Attack for Multilingual Text Classifiers.
CoRR, 2024

SoK: Facial Deepfake Detectors.
CoRR, 2024

2023
A Security-Enhanced Certificateless Conditional Privacy-Preserving Authentication Scheme for Vehicular Ad Hoc Networks.
IEEE Trans. Intell. Transp. Syst., October, 2023

Authenticated Data Sharing With Privacy Protection and Batch Verification for Healthcare IoT.
IEEE Trans. Sustain. Comput., 2023

Binarizing Split Learning for Data Privacy Enhancement and Computation Reduction.
IEEE Trans. Inf. Forensics Secur., 2023

Evaluation of Federated Learning in Phishing Email Detection.
Sensors, 2023

DeepTheft: Stealing DNN Model Architectures through Power Side Channel.
CoRR, 2023

One-to-Multiple Clean-Label Image Camouflage (OmClic) based Backdoor Attack on Deep Learning.
CoRR, 2023

Interpretability and Transparency-Driven Detection and Transformation of Textual Adversarial Examples (IT-DT).
CoRR, 2023

Detecting Misuses of Security APIs: A Systematic Review.
CoRR, 2023

Cybersecurity Challenges of Power Transformers.
CoRR, 2023

Why Do Deepfake Detectors Fail?
CoRR, 2023

ECG compression technique using fast fractals in the Internet of medical things.
Concurr. Comput. Pract. Exp., 2023

Deepfake in the Metaverse: Security Implications for Virtual Gaming, Meetings, and Offices.
Proceedings of the 2nd Workshop on Security Implications of Deepfakes and Cheapfakes, 2023

Why Do Facial Deepfake Detectors Fail?
Proceedings of the 2nd Workshop on Security Implications of Deepfakes and Cheapfakes, 2023

TransCAB: Transferable Clean-Annotation Backdoor to Object Detection with Natural Trigger in Real-World.
Proceedings of the 42nd International Symposium on Reliable Distributed Systems, 2023

PublicCheck: Public Integrity Verification for Services of Run-time Deep Models.
Proceedings of the 44th IEEE Symposium on Security and Privacy, 2023

DOITRUST: Dissecting On-chain Compromised Internet Domains via Graph Learning.
Proceedings of the 30th Annual Network and Distributed System Security Symposium, 2023

Towards Understanding of Deepfake Videos in the Wild.
Proceedings of the 32nd ACM International Conference on Information and Knowledge Management, 2023

Unraveling Threat Intelligence Through the Lens of Malicious URL Campaigns.
Proceedings of the 18th Asian Internet Engineering Conference, 2023

DeepTaster: Adversarial Perturbation-Based Fingerprinting to Identify Proprietary Dataset Use in Deep Neural Networks.
Proceedings of the Annual Computer Security Applications Conference, 2023

2022
OCTOPUS: Overcoming Performance and Privatization Bottlenecks in Distributed Learning.
IEEE Trans. Parallel Distributed Syst., 2022

Adversarial Detection by Latent Style Transformations.
IEEE Trans. Inf. Forensics Secur., 2022

Evaluation and Optimization of Distributed Machine Learning Techniques for Internet of Things.
IEEE Trans. Computers, 2022

Cryptanalysis and improvements of an efficient certificate-based proxy signature scheme for IIoT environments.
Inf. Process. Lett., 2022

Certificate-Based Anonymous Authentication With Efficient Aggregation for Wireless Medical Sensor Networks.
IEEE Internet Things J., 2022

Radial Basis Function Network with Differential Privacy.
Future Gener. Comput. Syst., 2022

Split Learning without Local Weight Sharing to Enhance Client-side Data Privacy.
CoRR, 2022

Tracking Dataset IP Use in Deep Neural Networks.
CoRR, 2022

MACAB: Model-Agnostic Clean-Annotation Backdoor to Object Detection with Natural Trigger in Real-World.
CoRR, 2022

PhishClone: Measuring the Efficacy of Cloning Evasion Attacks.
CoRR, 2022

Profiler: Profile-Based Model to Detect Phishing Emails.
CoRR, 2022

Towards A Critical Evaluation of Robustness for Deep Learning Backdoor Countermeasures.
CoRR, 2022

Towards Web Phishing Detection Limitations and Mitigation.
CoRR, 2022

Integrity Fingerprinting of DNN with Double Black-box Design and Verification.
CoRR, 2022

Dangerous Cloaking: Natural Trigger based Backdoor Attacks on Object Detectors in the Physical World.
CoRR, 2022

Forward-Secure Edge Authentication for Graphs.
Comput. J., 2022

RAIDER: Reinforcement-Aided Spear Phishing Detector.
Proceedings of the Network and System Security - 16th International Conference, 2022

Profiler: Distributed Model to Detect Phishing.
Proceedings of the 42nd IEEE International Conference on Distributed Computing Systems, 2022

Efficient Hash-Based Redactable Signature for Smart Grid Applications.
Proceedings of the Computer Security - ESORICS 2022, 2022

Email Summarization to Assist Users in Phishing Identification.
Proceedings of the ASIA CCS '22: ACM Asia Conference on Computer and Communications Security, Nagasaki, Japan, 30 May 2022, 2022

Reconstruction Attack on Differential Private Trajectory Protection Mechanisms.
Proceedings of the Annual Computer Security Applications Conference, 2022

2021
Energy-Efficient Hybrid Routing Protocol for IoT Communication Systems in 5G and Beyond.
Sensors, 2021

Cost-Effective Authenticated Data Redaction With Privacy Protection in IoT.
IEEE Internet Things J., 2021

NTD: Non-Transferability Enabled Backdoor Detection.
CoRR, 2021

Characterizing Malicious URL Campaigns.
CoRR, 2021

Quantization Backdoors to Deep Learning Models.
CoRR, 2021

RAIDER: Reinforcement-aided Spear Phishing Detector.
CoRR, 2021

OCTOPUS: Overcoming Performance andPrivatization Bottlenecks in Distributed Learning.
CoRR, 2021

Can Differential Privacy Practically Protect Collaborative Deep Learning Inference for the Internet of Things?
CoRR, 2021

Token-Modification Adversarial Attacks for Natural Language Processing: A Survey.
CoRR, 2021

DeepiSign: Invisible Fragile Watermark to Protect the Integrityand Authenticity of CNN.
CoRR, 2021

Privacy-preserving compression model for efficient IoMT ECG sharing.
Comput. Commun., 2021

DeepiSign: invisible fragile watermark to protect the integrity and authenticity of CNN.
Proceedings of the SAC '21: The 36th ACM/SIGAPP Symposium on Applied Computing, 2021

Decamouflage: A Framework to Detect Image-Scaling Attacks on CNN.
Proceedings of the 51st Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2021

2020
Decamouflage: A Framework to Detect Image-Scaling Attacks on Convolutional Neural Networks.
CoRR, 2020

FedEmail: Performance Measurement of Privacy-friendly Phishing Detection Enabled by Federated Learning.
CoRR, 2020

Can the Multi-Incoming Smart Meter Compressed Streams be Re-Compressed?
CoRR, 2020

Towards IoT Security Automation and Orchestration.
Proceedings of the Second IEEE International Conference on Trust, 2020

Security and Privacy for a Sustainable Internet of Things.
Proceedings of the Second IEEE International Conference on Trust, 2020

End-to-End Evaluation of Federated Learning and Split Learning for Internet of Things.
Proceedings of the International Symposium on Reliable Distributed Systems, 2020

Privacy-Preserving Authentication for Tree-Structured Data with Designated Verification in Outsourced Environments.
Proceedings of the Provable and Practical Security - 14th International Conference, ProvSec 2020, Singapore, November 29, 2020

Can We Use Split Learning on 1D CNN Models for Privacy Preserving Training?
Proceedings of the ASIA CCS '20: The 15th ACM Asia Conference on Computer and Communications Security, 2020

DeepCapture: Image Spam Detection Using Deep Learning and Data Augmentation.
Proceedings of the Information Security and Privacy - 25th Australasian Conference, 2020

2019
IoTSign: Protecting Privacy and Authenticity of IoT using Discrete Cosine Based Steganography.
CoRR, 2019

2018
Gaussian Approximation-Based Lossless Compression of Smart Meter Readings.
IEEE Trans. Smart Grid, 2018

2017
Walsh-Hadamard-Based 3-D Steganography for Protecting Sensitive Information in Point-of-Care.
IEEE Trans. Biomed. Eng., 2017

2016
Hybrid Cryptographic Access Control for Cloud-Based EHR Systems.
IEEE Cloud Comput., 2016

Resilient to shared spectrum noise scheme for protecting cognitive radio smart grid readings - BCH based steganographic approach.
Ad Hoc Networks, 2016

2015
Robust privacy preservation and authenticity of the collected data in cognitive radio network - Walsh-Hadamard based steganographic approach.
Pervasive Mob. Comput., 2015

Wavelet based steganographic technique to protect household confidential information and seal the transmitted smart grid readings.
Inf. Syst., 2015


  Loading...