关注
Ahmed Abusnaina
Ahmed Abusnaina
ML Research Scientist, Meta
在 fb.com 的电子邮件经过验证
标题
引用次数
引用次数
年份
Sensor-based continuous authentication of smartphones’ users using behavioral biometrics: A contemporary survey
M Abuhamad, A Abusnaina, DH Nyang, D Mohaisen
IEEE Internet of Things Journal 8 (1), 65-84, 2020
1122020
Analyzing and detecting emerging Internet of Things malware: A graph-based approach
H Alasmary, A Khormali, A Anwar, J Park, J Choi, A Abusnaina, A Awad, ...
IEEE Internet of Things Journal 6 (5), 8977-8988, 2019
1062019
Adversarial learning attacks on graph-based IoT malware detection systems
A Abusnaina, A Khormali, H Alasmary, J Park, A Anwar, A Mohaisen
2019 IEEE 39th international conference on distributed computing systems …, 2019
682019
Soteria: Detecting adversarial examples in control flow graph-based malware classifiers
H Alasmary, A Abusnaina, R Jang, M Abuhamad, A Anwar, DH Nyang, ...
2020 IEEE 40th International Conference on Distributed Computing Systems …, 2020
382020
Adversarial example detection using latent neighborhood graph
A Abusnaina, Y Wu, S Arora, Y Wang, F Wang, H Yang, D Mohaisen
Proceedings of the IEEE/CVF International Conference on Computer Vision …, 2021
292021
Dfd: Adversarial learning-based approach to defend against website fingerprinting
A Abusnaina, R Jang, A Khormali, DH Nyang, D Mohaisen
IEEE INFOCOM 2020-IEEE Conference on Computer Communications, 2459-2468, 2020
292020
Cleaning the NVD: Comprehensive quality assessment, improvements, and analyses
A Anwar, A Abusnaina, S Chen, F Li, D Mohaisen
IEEE Transactions on Dependable and Secure Computing 19 (6), 4255-4269, 2021
282021
From blue-sky to practical adversarial learning
A Khormali, A Abusnaina, S Chen, DH Nyang, D Mohaisen
2020 Second IEEE International Conference on Trust, Privacy and Security in …, 2020
24*2020
Dl-fhmc: Deep learning-based fine-grained hierarchical learning approach for robust malware classification
A Abusnaina, M Abuhamad, H Alasmary, A Anwar, R Jang, S Salem, ...
IEEE Transactions on Dependable and Secure Computing 19 (5), 3432-3447, 2021
17*2021
Hate, obscenity, and insults: Measuring the exposure of children to inappropriate comments in youtube
S Alshamrani, A Abusnaina, M Abuhamad, D Nyang, D Mohaisen
Companion Proceedings of the Web Conference 2021, 508-515, 2021
172021
Examining the robustness of learning-based ddos detection in software defined networks
A Abusnaina, A Khormali, DH Nyang, M Yuksel, A Mohaisen
2019 IEEE Conference on Dependable and Secure Computing (DSC), 1-8, 2019
162019
Investigating Online Toxicity in Users Interactions with the Mainstream Media Channels on YouTube.
S Alshamrani, M Abuhamad, A Abusnaina, D Mohaisen
CIKM (Workshops), 2020
142020
Subgraph-based adversarial examples against graph-based IoT malware detection systems
A Abusnaina, H Alasmary, M Abuhamad, S Salem, DH Nyang, ...
Computational Data and Social Networks: 8th International Conference, CSoNet …, 2019
142019
Hiding in plain sight: A measurement and analysis of kids’ exposure to malicious urls on youtube
S Alshamrani, A Abusnaina, D Mohaisen
2020 IEEE/ACM Symposium on Edge Computing (SEC), 321-326, 2020
112020
TLDR: Deep Learning-Based Automated Privacy Policy Annotation with Key Policy Highlights
A Alabduljabbar, A Abusnaina, Ü Meteriz-Yildiran, D Mohaisen
Proceedings of the 20th Workshop on Workshop on Privacy in the Electronic …, 2021
92021
Understanding the proxy ecosystem: A comparative analysis of residential and open proxies on the internet
J Choi, M Abuhamad, A Abusnaina, A Anwar, S Alshamrani, J Park, ...
IEEE Access 8, 111368-111380, 2020
92020
Poster: Examining Adversarial Learning against Graph-based IoT Malware Detection Systems
A Abusnaina, A Khormali, H Alasmary, J Park, A Anwar, U Meteriz, ...
9*
SHELLCORE: Automating malicious IoT software detection using shell commands representation
H Alasmary, A Anwar, A Abusnaina, A Alabduljabbar, M Abuhamad, ...
IEEE Internet of Things Journal 9 (4), 2485-2496, 2021
62021
Honor among thieves: Towards understanding the dynamics and interdependencies in iot botnets
J Choi, A Abusnaina, A Anwar, A Wang, S Chen, DH Nyang, A Mohaisen
2019 IEEE Conference on Dependable and Secure Computing (DSC), 1-8, 2019
62019
POSTER: Breaking Graph-based IoT Malware Detection Systems Using Adversarial Examples
A Abusnaina, A Khormali, H Alasmary, J Park, A Anwar, U Meteriz, ...
6*2019
系统目前无法执行此操作,请稍后再试。
文章 1–20