Mohammed Abuhamad

Orcid: 0000-0002-3368-6024

According to our database1, Mohammed Abuhamad authored at least 36 papers between 2013 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
Unveiling Vulnerabilities in Interpretable Deep Learning Systems with Query-Efficient Black-box Attacks.
CoRR, 2023

Microbial Genetic Algorithm-based Black-box Attack against Interpretable Deep Learning Systems.
CoRR, 2023

Single-Class Target-Specific Attack against Interpretable Deep Learning Systems.
CoRR, 2023

SHIELD: Thwarting Code Authorship Attribution.
CoRR, 2023

Lightweight and Effective Website Fingerprinting Over Encrypted DNS.
Proceedings of the Silicon Valley Cybersecurity Conference, 2023

WebTracker: Real Webbrowsing Behaviors.
Proceedings of the Silicon Valley Cybersecurity Conference, 2023

Identification and Analysis of the Spread of {Mis}information on Social Media.
Proceedings of the Computational Data and Social Networks - 12th International Conference, 2023

2022
DL-FHMC: Deep Learning-Based Fine-Grained Hierarchical Learning Approach for Robust Malware Classification.
IEEE Trans. Dependable Secur. Comput., 2022

ShellCore: Automating Malicious IoT Software Detection Using Shell Commands Representation.
IEEE Internet Things J., 2022

Interpretations Cannot Be Trusted: Stealthy and Effective Adversarial Perturbations against Interpretable Deep Learning.
CoRR, 2022

WBC image classification and generative models based on convolutional neural network.
BMC Medical Imaging, 2022

Investigating the Effect of Traffic Sampling on Machine Learning-Based Network Intrusion Detection Approaches.
IEEE Access, 2022

MLxPack: Investigating the Effects of Packers on ML-based Malware Detection Systems Using Static and Dynamic Traits.
Proceedings of the CySSS@AsiaCCS'22: Proceedings of the 1st Workshop on Cybersecurity and Social Sciences, 2022

Leveraging Spectral Representations of Control Flow Graphs for Efficient Analysis of Windows Malware.
Proceedings of the ASIA CCS '22: ACM Asia Conference on Computer and Communications Security, Nagasaki, Japan, 30 May 2022, 2022

Depth, Breadth, and Complexity: Ways to Attack and Defend Deep Learning Models.
Proceedings of the ASIA CCS '22: ACM Asia Conference on Computer and Communications Security, Nagasaki, Japan, 30 May 2022, 2022

Black-box and Target-specific Attack Against Interpretable Deep Learning Systems.
Proceedings of the ASIA CCS '22: ACM Asia Conference on Computer and Communications Security, Nagasaki, Japan, 30 May 2022, 2022

2021
Large-scale and Robust Code Authorship Identification with Deep Feature Learning.
ACM Trans. Priv. Secur., 2021

Sensor-Based Continuous Authentication of Smartphones' Users Using Behavioral Biometrics: A Contemporary Survey.
IEEE Internet Things J., 2021

ShellCore: Automating Malicious IoT Software Detection by Using Shell Commands Representation.
CoRR, 2021

An Exploration of Geo-temporal Characteristics of Users' Reactions on Social Media During the Pandemic.
CoRR, 2021

Hate, Obscenity, and Insults: Measuring the Exposure of Children to Inappropriate Comments in YouTube.
Proceedings of the Companion of The Web Conference 2021, 2021

AdvEdge: Optimizing Adversarial Perturbations Against Interpretable Deep Learning.
Proceedings of the Computational Data and Social Networks - 10th International Conference, 2021

2020
Multi-χ: Identifying Multiple Authors from Source Code Files.
Proc. Priv. Enhancing Technol., 2020

AUToSen: Deep-Learning-Based Implicit Continuous Authentication Using Smartphone Sensors.
IEEE Internet Things J., 2020

A Deep Learning-based Fine-grained Hierarchical Learning Approach for Robust Malware Classification.
CoRR, 2020

Sensor-based Continuous Authentication of Smartphones' Users Using Behavioral Biometrics: A Survey.
CoRR, 2020

Understanding the Proxy Ecosystem: A Comparative Analysis of Residential and Open Proxies on the Internet.
IEEE Access, 2020

Insights into Attacks' Progression: Prediction of Spatio-Temporal Behavior of DDoS Attacks.
Proceedings of the Information Security Applications - 21st International Conference, 2020

Soteria: Detecting Adversarial Examples in Control Flow Graph-based Malware Classifiers.
Proceedings of the 40th IEEE International Conference on Distributed Computing Systems, 2020

An Analysis of Users Engagement on Twitter During the COVID-19 Pandemic: Topical Trends and Sentiments.
Proceedings of the Computational Data and Social Networks - 9th International Conference, 2020

Investigating Online Toxicity in Users Interactions with the Mainstream Media Channels on YouTube.
Proceedings of the CIKM 2020 Workshops co-located with 29th ACM International Conference on Information and Knowledge Management (CIKM 2020), 2020

2019
Code authorship identification using convolutional neural networks.
Future Gener. Comput. Syst., 2019

W-Net: A CNN-based Architecture for White Blood Cells Image Classification.
CoRR, 2019

Subgraph-Based Adversarial Examples Against Graph-Based IoT Malware Detection Systems.
Proceedings of the Computational Data and Social Networks - 8th International Conference, 2019

2018
Large-Scale and Language-Oblivious Code Authorship Identification.
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018

2013
Event-Driven Business Intelligence Approach for Real-Time Integration of Technical and fundamental Analysis in Forex Market.
J. Comput. Sci., 2013


  Loading...