Mohammed Al-Naeem

Orcid: 0000-0002-5682-6237

Affiliations:
  • King Faisal University, Department of Computer Networks & Communications, CCSIT, Saudi Arabia
  • Monash University, Clayton School of IT, VIC, Australia (PhD 2015)


According to our database1, Mohammed Al-Naeem authored at least 12 papers between 2010 and 2023.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
Genetic Algorithm-Based Dynamic Backdoor Attack on Federated Learning-Based Network Traffic Classification.
Proceedings of the Eighth International Conference on Fog and Mobile Edge Computing, 2023

2022
Threats From Unintentional Insiders: An Assessment of an Organization's Readiness Using Machine Learning.
IEEE Access, 2022

Adversarial Machine Learning in Text Processing: A Literature Survey.
IEEE Access, 2022

A High Static Performance Hierarchical Three-Dimensional Shifted Completely Connected Network.
IEEE Access, 2022

2021
Reliable and QoS aware routing metrics for wireless Neighborhood Area Networking in smart grids.
Comput. Networks, 2021

Towards an Unsupervised Feature Selection Method for Effective Dynamic Features.
IEEE Access, 2021

Prediction of Re-Occurrences of Spoofed ACK Packets Sent to Deflate a Target Wireless Sensor Network Node by DDOS.
IEEE Access, 2021

2020
Dealing With Well-Formed and Malformed Packets, Associated With Point of Failure That Cause Network Security Breach.
IEEE Access, 2020

ManiGen: A Manifold Aided Black-Box Generator of Adversarial Examples.
IEEE Access, 2020

2015
Pattern transformation-invariant schemes for wireless sensor networks based on an edge detection gradient-based mechanism.
PhD thesis, 2015

2012
A novel target recognition scheme for WSNs.
Proceedings of the 2012 International Joint Conference on Neural Networks (IJCNN), 2012

2010
MOHA: A Novel Target Recognition Scheme for WSNs.
Proceedings of the Mobile and Ubiquitous Systems: Computing, Networking, and Services, 2010


  Loading...