Sherif Saad

According to our database1, Sherif Saad authored at least 36 papers between 2010 and 2024.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Alpaca against Vicuna: Using LLMs to Uncover Memorization of LLMs.
CoRR, 2024

Finding a Needle in the Adversarial Haystack: A Targeted Paraphrasing Approach For Uncovering Edge Cases with Minimal Distribution Distortion.
Proceedings of the 18th Conference of the European Chapter of the Association for Computational Linguistics, 2024

2023
Evaluating the effectiveness of pseudonym changing strategies for location privacy in vehicular ad-hoc network.
Secur. Priv., 2023

Evaluating Permissioned Blockchain Using Stochastic Modeling and Chaos Engineering.
CoRR, 2023

Automated Feature Engineering for AutoML Using Genetic Algorithms.
Proceedings of the 20th International Conference on Security and Cryptography, 2023

Trustworthy Decentralized Last-Mile Delivery Framework Using Blockchain.
Proceedings of the 20th International Conference on Smart Business Technologies, 2023

Preserving Privacy Through Dememorization: An Unlearning Technique For Mitigating Memorization Risks In Language Models.
Proceedings of the 2023 Conference on Empirical Methods in Natural Language Processing, 2023

2022
A comprehensive pseudonym changing scheme for improving location privacy in vehicular networks.
Internet Things, 2022

iProfile: Collecting and Analyzing Keystroke Dynamics from Android Users.
Proceedings of the 8th International Conference on Information Systems Security and Privacy, 2022

Predicting the Outcome of Soccer Matches Using Machine Learning and Statistical Analysis.
Proceedings of the 12th IEEE Annual Computing and Communication Workshop and Conference, 2022

2021
Automated detection of unstructured context-dependent sensitive information using deep learning.
Internet Things, 2021

Spam review detection using self-organizing maps and convolutional neural networks.
Comput. Secur., 2021

Chaos Engineering For Understanding Consensus Algorithms Performance in Permissioned Blockchains.
Proceedings of the IEEE Intl Conf on Dependable, 2021

2020
Emerging Design Patterns for Blockchain Applications.
Proceedings of the 15th International Conference on Software Technologies, 2020

A Context Aware and Traffic Adaptive Privacy Scheme in VANETs.
Proceedings of the 3rd IEEE Connected and Automated Vehicles Symposium, 2020

2019
A Comprehensive Review of Pseudonym Changing Strategies in Vehicular Networks.
Int. J. Netw. Secur., 2019

JSLess: A Tale of a Fileless Javascript Memory-Resident Malware.
Proceedings of the Information Security Practice and Experience, 2019

The Curious Case of Machine Learning in Malware Detection.
Proceedings of the 5th International Conference on Information Systems Security and Privacy, 2019

Interpreting Machine Learning Malware Detectors Which Leverage N-gram Analysis.
Proceedings of the Foundations and Practice of Security - 12th International Symposium, 2019

Lightweight IoT Mutual Authentication Scheme Based on Transient Identities and Transactions History.
Proceedings of the Foundations and Practice of Security - 12th International Symposium, 2019

2018
Detecting opinion spams and fake news using text classification.
Secur. Priv., 2018

Identifying Vulnerabilities and Attacking Capabilities Against Pseudonym Changing Schemes in VANET.
Proceedings of the Intelligent, Secure, and Dependable Systems in Distributed and Cloud Environments, 2018

Identification of User Behavioral Biometrics for Authentication Using Keystroke Dynamics and Machine Learning.
Proceedings of the 2018 2nd International Conference on Biometric Engineering and Applications, 2018

Speed Based Attacker Placement for Evaluating Location Privacy in VANET.
Proceedings of the Ad Hoc Networks - 10th EAI International Conference, 2018

2017
Detection of Online Fake News Using N-Gram Analysis and Machine Learning Techniques.
Proceedings of the Intelligent, Secure, and Dependable Systems in Distributed and Cloud Environments, 2017

2014
Verifying Online User Identity using Stylometric Analysis for Short Messages.
J. Networks, 2014

Context-aware intrusion alerts verification approach.
Proceedings of the 10th International Conference on Information Assurance and Security, 2014

2013
Semantic aware attack scenarios reconstruction.
J. Inf. Secur. Appl., 2013

Botnet detection based on traffic behavior analysis and flow intervals.
Comput. Secur., 2013

Authorship verification for short messages using stylometry.
Proceedings of the International Conference on Computer, 2013

2012
Peer to Peer Botnet Detection Based on Flow Intervals.
Proceedings of the Information Security and Privacy Research, 2012

Extracting Attack Scenarios Using Intrusion Semantics.
Proceedings of the Foundations and Practice of Security - 5th International Symposium, 2012

2011
Detecting P2P botnets through network behavior analysis and machine learning.
Proceedings of the Ninth Annual Conference on Privacy, Security and Trust, 2011

A semantic analysis approach to manage IDS alerts flooding.
Proceedings of the 7th International Conference on Information Assurance and Security, 2011

2010
Ontology-based Intelligent Network-Forensics Investigation.
Proceedings of the ISCA 19th International Conference on Software Engineeringand Data Engineering (SEDE-2010) June 16-18, 2010

Method ontology for intelligent network forensics analysis.
Proceedings of the Eighth Annual Conference on Privacy, Security and Trust, 2010


  Loading...