Sensor-based continuous authentication of smartphones’ users using behavioral biometrics: A contemporary survey M Abuhamad, A Abusnaina, DH Nyang, D Mohaisen IEEE Internet of Things Journal 8 (1), 65-84, 2020 | 166 | 2020 |
Analyzing and detecting emerging Internet of Things malware: A graph-based approach H Alasmary, A Khormali, A Anwar, J Park, J Choi, A Abusnaina, A Awad, ... IEEE Internet of Things Journal 6 (5), 8977-8988, 2019 | 140 | 2019 |
Adversarial learning attacks on graph-based IoT malware detection systems A Abusnaina, A Khormali, H Alasmary, J Park, A Anwar, A Mohaisen 2019 IEEE 39th international conference on distributed computing systems …, 2019 | 92 | 2019 |
Cleaning the NVD: Comprehensive quality assessment, improvements, and analyses A Anwar, A Abusnaina, S Chen, F Li, D Mohaisen IEEE Transactions on Dependable and Secure Computing 19 (6), 4255-4269, 2021 | 62 | 2021 |
Adversarial example detection using latent neighborhood graph A Abusnaina, Y Wu, S Arora, Y Wang, F Wang, H Yang, D Mohaisen Proceedings of the IEEE/CVF International Conference on Computer Vision …, 2021 | 53 | 2021 |
Soteria: Detecting adversarial examples in control flow graph-based malware classifiers H Alasmary, A Abusnaina, R Jang, M Abuhamad, A Anwar, DH Nyang, ... 2020 IEEE 40th International Conference on Distributed Computing Systems …, 2020 | 49 | 2020 |
Dl-fhmc: Deep learning-based fine-grained hierarchical learning approach for robust malware classification A Abusnaina, M Abuhamad, H Alasmary, A Anwar, R Jang, S Salem, ... IEEE Transactions on Dependable and Secure Computing 19 (5), 3432-3447, 2021 | 42 | 2021 |
Dfd: Adversarial learning-based approach to defend against website fingerprinting A Abusnaina, R Jang, A Khormali, DH Nyang, D Mohaisen IEEE INFOCOM 2020-IEEE Conference on Computer Communications, 2459-2468, 2020 | 42 | 2020 |
From blue-sky to practical adversarial learning A Khormali, A Abusnaina, S Chen, DH Nyang, D Mohaisen 2020 Second IEEE International Conference on Trust, Privacy and Security in …, 2020 | 37* | 2020 |
Hate, obscenity, and insults: Measuring the exposure of children to inappropriate comments in youtube S Alshamrani, A Abusnaina, M Abuhamad, D Nyang, D Mohaisen Companion proceedings of the web conference 2021, 508-515, 2021 | 31 | 2021 |
Investigating Online Toxicity in Users Interactions with the Mainstream Media Channels on YouTube. S Alshamrani, M Abuhamad, A Abusnaina, D Mohaisen CIKM (Workshops), 2020 | 26 | 2020 |
Subgraph-based adversarial examples against graph-based IoT malware detection systems A Abusnaina, H Alasmary, M Abuhamad, S Salem, DH Nyang, ... Computational Data and Social Networks: 8th International Conference, CSoNet …, 2019 | 21 | 2019 |
TLDR: deep learning-based automated privacy policy annotation with key policy highlights A Alabduljabbar, A Abusnaina, Ü Meteriz-Yildiran, D Mohaisen Proceedings of the 20th Workshop on Workshop on Privacy in the Electronic …, 2021 | 19 | 2021 |
Examining the robustness of learning-based ddos detection in software defined networks A Abusnaina, A Khormali, DH Nyang, M Yuksel, A Mohaisen 2019 IEEE Conference on Dependable and Secure Computing (DSC), 1-8, 2019 | 18 | 2019 |
Hiding in plain sight: A measurement and analysis of kids’ exposure to malicious urls on youtube S Alshamrani, A Abusnaina, D Mohaisen 2020 IEEE/ACM Symposium on Edge Computing (SEC), 321-326, 2020 | 16 | 2020 |
Understanding the proxy ecosystem: A comparative analysis of residential and open proxies on the internet J Choi, M Abuhamad, A Abusnaina, A Anwar, S Alshamrani, J Park, ... IEEE Access 8, 111368-111380, 2020 | 14 | 2020 |
Self-adaptive mussels wandering optimization algorithm with application for artificial neural network training AA Abusnaina, R Abdullah, A Kattan Journal of Intelligent Systems 29 (1), 345-363, 2019 | 11 | 2019 |
Poster: Examining Adversarial Learning against Graph-based IoT Malware Detection Systems A Abusnaina, A Khormali, H Alasmary, J Park, A Anwar, U Meteriz, ... | 10* | |
Automated privacy policy annotation with information highlighting made practical using deep representations A Alabduljabbar, A Abusnaina, Ü Meteriz-Yildiran, D Mohaisen Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications …, 2021 | 9 | 2021 |
SHELLCORE: Automating malicious IoT software detection using shell commands representation H Alasmary, A Anwar, A Abusnaina, A Alabduljabbar, M Abuhamad, ... IEEE Internet of Things Journal 9 (4), 2485-2496, 2021 | 9 | 2021 |