default search action
David Mohaisen
Person information
- affiliation: University of Central Florida, Department of Computer Science, Orlando, FL, USA
- affiliation (former): State University of New York at Buffalo, Buffalo, NY, USA
- affiliation (former, PhD 2012): University of Minnesota, Minneapolis, MN, USA
- affiliation (former): Inha University, Information Security Research Laboratory, Incheon, South Korea
SPARQL queries
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j86]Kazi Abu Zubair, Rahaf Abdullah, David Mohaisen, Amro Awad:
RC-NVM: Recovery-Aware Reliability-Security Co-Design for Non-Volatile Memories. IEEE Trans. Dependable Secur. Comput. 21(4): 1817-1830 (2024) - [j85]Muhammad Saad, David Mohaisen:
Analyzing In-Browser Cryptojacking. IEEE Trans. Dependable Secur. Comput. 21(6): 5448-5460 (2024) - [j84]Ülkü Meteriz-Yildiran, Necip Fazil Yildiran, Joongheon Kim, David Mohaisen:
Learning Location From Shared Elevation Profiles in Fitness Apps: A Privacy Perspective. IEEE Trans. Mob. Comput. 23(1): 581-596 (2024) - [j83]Won Joon Yun, Myungjae Shin, David Mohaisen, Kangwook Lee, Joongheon Kim:
Hierarchical Deep Reinforcement Learning-Based Propofol Infusion Assistant Framework in Anesthesia. IEEE Trans. Neural Networks Learn. Syst. 35(2): 2510-2521 (2024) - [j82]Muhammad Saad, Afsah Anwar, Srivatsan Ravi, David Mohaisen:
Revisiting Nakamoto Consensus in Asynchronous Networks: A Comprehensive Analysis of Bitcoin Safety and Chain Quality. IEEE/ACM Trans. Netw. 32(1): 844-858 (2024) - [c180]Seyed Mohammad Mehdi Mirnajafizadeh, Ashwin Raam Sethuram, David Mohaisen, DaeHun Nyang, Rhongho Jang:
Enhancing Network Attack Detection with Distributed and In-Network Data Collection System. USENIX Security Symposium 2024 - [c179]Mohammed Alkinoon, Hattan Althebeiti, Ali Alkinoon, Manar Mohaisen, Saeed Salem, David Mohaisen:
Industry-Specific Vulnerability Assessment. WISE (5) 2024: 123-139 - [c178]Ahmed Abusnaina, Afsah Anwar, Muhammad Saad, Abdulrahman Alabduljabbar, Rhongho Jang, Saeed Salem, David Mohaisen:
Exposing the Limitations of Machine Learning for Malware Detection Under Concept Drift. WISE (2) 2024: 273-289 - [d2]Abdulaziz Alghamdi, Ali Alkinoon, Ahod Alghuried, David Mohaisen:
xr-droid: A Benchmark Dataset for AR/VR and Security Applications. IEEE DataPort, 2024 - [d1]Ali Al Kinoon, Abdulazi Alghamd, Ahod Alghuried, David Mohaisen:
Troid: Temporal and Cross-Sectional Android Dataset and Its Applications. IEEE DataPort, 2024 - [i76]Ayodeji Adeniran, Kieran Human, David Mohaisen:
Dissecting the Infrastructure Used in Web-based Cryptojacking: A Measurement Perspective. CoRR abs/2408.03426 (2024) - [i75]Ahod Alghuried, David Mohaisen:
Simple Perturbations Subvert Ethereum Phishing Transactions Detection: An Empirical Analysis. CoRR abs/2408.03441 (2024) - 2023
- [j81]Soyi Jung, Jae-Hyun Kim, David Mohaisen, Joongheon Kim:
Truthful and performance-optimal computation outsourcing for aerial surveillance platforms via learning-based auction. Comput. Networks 225: 109651 (2023) - [j80]Kyle Thomas, Muhammad Santriaji, David Mohaisen, Yan Solihin:
Exploration of Bitflip's Effect on Deep Neural Network Accuracy in Plaintext and Ciphertext. IEEE Micro 43(5): 24-34 (2023) - [j79]Manar Mohaisen, David Mohaisen:
Improving the Social Connectivity in Engineering Educational Networks and Implications. IEEE Trans. Educ. 66(1): 30-37 (2023) - [j78]Won Joon Yun, Soohyun Park, Joongheon Kim, David Mohaisen:
Self-Configurable Stabilized Real-Time Detection Learning for Autonomous Driving Applications. IEEE Trans. Intell. Transp. Syst. 24(1): 885-890 (2023) - [c177]Hattan Althebeiti, Brett Fazio, William Chen, David Mohaisen:
Poster: Mujaz: A Summarization-based Approach for Normalized Vulnerability Description. CCS 2023: 3537-3539 - [c176]Mohamed Alqadhi, Mohammed Alkinoon, Jie Lin, Ahmed Abdalaal, David Mohaisen:
Entangled Clouds: Measuring the Hosting Infrastructure of the Free Contents Web. CCSW@CCS 2023: 75-87 - [c175]Soohyeon Choi, Rhongho Jang, DaeHun Nyang, David Mohaisen:
Untargeted Code Authorship Evasion with Seq2Seq Transformation. CSoNet 2023: 83-92 - [c174]Mohamed Alqadhi, David Mohaisen:
The Infrastructure Utilization of Free Contents Websites Reveal Their Security Characteristics. CSoNet 2023: 255-267 - [c173]Ayodeji Adeniran, Mohammed Alkinoon, David Mohaisen:
Understanding the Utilization of Cryptocurrency in the Metaverse and Security Implications. CSoNet 2023: 268-281 - [c172]Mohamed Alqadhi, Ali Alkinoon, Saeed Salem, David Mohaisen:
Understanding the Country-Level Security of Free Content Websites and their Hosting Infrastructure. DSAA 2023: 1-10 - [c171]David Mohaisen:
Understanding the Privacy Dimension of Wearables through Machine Learning-enabled Inferences. SNTA@HPDC 2023: 1 - [c170]Mohammed Alkinoon, Abdulrahman Alabduljabbar, Hattan Althebeiti, Rhongho Jang, DaeHun Nyang, David Mohaisen:
Understanding the Security and Performance of the Web Presence of Hospitals: A Measurement Study. ICCCN 2023: 1-10 - [c169]Soohyeon Choi, Manar Mohaisen, Daehun Nyang, David Mohaisen:
Revisiting the Deep Learning-Based Eavesdropping Attacks via Facial Dynamics from VR Motion Sensors. ICICS 2023: 399-417 - [c168]Sian Kim, Changhun Jung, RhongHo Jang, David Mohaisen, DaeHun Nyang:
A Robust Counting Sketch for Data Plane Intrusion Detection. NDSS 2023 - [c167]Muhammad Saad, David Mohaisen:
Three Birds with One Stone: Efficient Partitioning Attacks on Interdependent Cryptocurrency Networks. SP 2023: 111-125 - [c166]Hattan Althebeiti, Ran Gedawy, Ahod Alghuried, Daehun Nyang, David Mohaisen:
Defending AirType Against Inference Attacks Using 3D In-Air Keyboard Layouts: Design and Evaluation. WISA 2023: 159-174 - [c165]Hattan Althebeiti, David Mohaisen:
Enriching Vulnerability Reports Through Automated and Augmented Description Summarization. WISA 2023: 213-227 - [e6]David Mohaisen, Thomas Wies:
Networked Systems - 11th International Conference, NETYS 2023, Benguerir, Morocco, May 22-24, 2023, Proceedings. Lecture Notes in Computer Science 14067, Springer 2023, ISBN 978-3-031-37764-8 [contents] - [i74]Muhammad Saad, David Mohaisen:
Analyzing In-browser Cryptojacking. CoRR abs/2304.13253 (2023) - [i73]Mohammed Abuhamad, Changhun Jung, David Mohaisen, DaeHun Nyang:
SHIELD: Thwarting Code Authorship Attribution. CoRR abs/2304.13255 (2023) - [i72]Mohammed Alkinoon, Abdulrahman Alabduljabbar, Hattan Althebeiti, Rhongho Jang, DaeHun Nyang, David Mohaisen:
Understanding the Security and Performance of the Web Presence of Hospitals: A Measurement Study. CoRR abs/2304.13278 (2023) - [i71]Abdulrahman Alabduljabbar, Runyu Ma, Ahmed Abusnaina, Rhongho Jang, Songqing Chen, DaeHun Nyang, David Mohaisen:
Measuring and Modeling the Free Content Web. CoRR abs/2304.14359 (2023) - [i70]Mohamed Alqadhi, Ali Alkinoon, Saeed Salem, David Mohaisen:
Understanding the Country-Level Security of Free Content Websites and their Hosting Infrastructure. CoRR abs/2305.14531 (2023) - [i69]Ahmed Abusnaina, Yizhen Wang, Sunpreet S. Arora, Ke Wang, Mihai Christodorescu, David Mohaisen:
Burning the Adversarial Bridges: Robust Windows Malware Detection Against Binary-level Mutations. CoRR abs/2310.03285 (2023) - [i68]Ayodeji Adeniran, Mohammed Alkinoon, David Mohaisen:
Understanding the Utilization of Cryptocurrency in the Metaverse and Security Implications. CoRR abs/2311.15360 (2023) - [i67]Mohamed Alqadhi, David Mohaisen:
The Infrastructure Utilization of Free Contents Websites Reveal their Security Characteristics. CoRR abs/2311.15363 (2023) - [i66]Soohyeon Choi, Rhongho Jang, DaeHun Nyang, David Mohaisen:
Untargeted Code Authorship Evasion with Seq2Seq Transformation. CoRR abs/2311.15366 (2023) - 2022
- [j77]Jumabek Alikhanov, Rhongho Jang, Mohammed Abuhamad, David Mohaisen, Daehun Nyang, Youngtae Noh:
Investigating the Effect of Traffic Sampling on Machine Learning-Based Network Intrusion Detection Approaches. IEEE Access 10: 5801-5823 (2022) - [j76]Marwan Omar, Soohyeon Choi, Daehun Nyang, David Mohaisen:
Robust Natural Language Processing: Recent Advances, Challenges, and Future Directions. IEEE Access 10: 86038-86056 (2022) - [j75]Changhun Jung, Mohammed Abuhamad, David Mohaisen, Kyungja Han, DaeHun Nyang:
WBC image classification and generative models based on convolutional neural network. BMC Medical Imaging 22(1): 94 (2022) - [j74]Jinchun Choi, Afsah Anwar, Abdulrahman Alabduljabbar, Hisham Alasmary, Jeffrey Spaulding, An Wang, Songqing Chen, DaeHun Nyang, Amro Awad, David Mohaisen:
Understanding Internet of Things malware by analyzing endpoints in their static artifacts. Comput. Networks 206: 108768 (2022) - [j73]Muhammad Saad, Afsah Anwar, Ashar Ahmad, Hisham Alasmary, Murat Yuksel, David Mohaisen:
RouteChain: Towards Blockchain-based secure and efficient BGP routing. Comput. Networks 217: 109362 (2022) - [j72]Hisham Alasmary, Afsah Anwar, Ahmed Abusnaina, Abdulrahman Alabduljabbar, Mohammed Abuhamad, An Wang, Daehun Nyang, Amro Awad, David Mohaisen:
ShellCore: Automating Malicious IoT Software Detection Using Shell Commands Representation. IEEE Internet Things J. 9(4): 2485-2496 (2022) - [j71]Ashar Ahmad, Muhammad Saad, Mohammed A. AlGhamdi, DaeHun Nyang, David Mohaisen:
BlockTrail: A Service for Secure and Transparent Blockchain-Driven Audit Trails. IEEE Syst. J. 16(1): 1367-1378 (2022) - [j70]Mazen Al-Wadi, Kazi Abu Zubair, David Mohaisen, Amro Awad:
Phoenix: Towards Ultra-Low Overhead, Recoverable, and Persistently Secure NVM. IEEE Trans. Dependable Secur. Comput. 19(2): 1049-1063 (2022) - [j69]Ahmed Abusnaina, Mohammed Abuhamad, Hisham Alasmary, Afsah Anwar, Rhongho Jang, Saeed Salem, DaeHun Nyang, David Mohaisen:
DL-FHMC: Deep Learning-Based Fine-Grained Hierarchical Learning Approach for Robust Malware Classification. IEEE Trans. Dependable Secur. Comput. 19(5): 3432-3447 (2022) - [j68]Afsah Anwar, Ahmed Abusnaina, Songqing Chen, Frank Li, David Mohaisen:
Cleaning the NVD: Comprehensive Quality Assessment, Improvements, and Analyses. IEEE Trans. Dependable Secur. Comput. 19(6): 4255-4269 (2022) - [j67]Won Joon Yun, Soohyun Park, Joongheon Kim, Myungjae Shin, Soyi Jung, David A. Mohaisen, Jae-Hyun Kim:
Cooperative Multiagent Deep Reinforcement Learning for Reliable Surveillance via Autonomous Multi-UAV Control. IEEE Trans. Ind. Informatics 18(10): 7086-7096 (2022) - [j66]Minxin Du, Shuangke Wu, Qian Wang, Dian Chen, Peipei Jiang, Aziz Mohaisen:
GraphShield: Dynamic Large Graphs for Secure Queries With Forward Privacy. IEEE Trans. Knowl. Data Eng. 34(7): 3295-3308 (2022) - [j65]Rhongho Jang, Changhun Jung, David Mohaisen, KyungHee Lee, DaeHun Nyang:
A One-Page Text Entry Method Optimized for Rectangle Smartwatches. IEEE Trans. Mob. Comput. 21(10): 3443-3454 (2022) - [j64]Jeman Park, Rhongho Jang, Manar Mohaisen, David Mohaisen:
A Large-Scale Behavioral Analysis of the Open DNS Resolvers on the Internet. IEEE/ACM Trans. Netw. 30(1): 76-89 (2022) - [j63]Muhammad Saad, Victor Cook, Lan N. Nguyen, My T. Thai, David Mohaisen:
Exploring Partitioning Attacks on the Bitcoin Network. IEEE/ACM Trans. Netw. 30(1): 202-214 (2022) - [c164]Changhun Jung, Sian Kim, Rhongho Jang, David Mohaisen, DaeHun Nyang:
A Scalable and Dynamic ACL System for In-Network Defense. CCS 2022: 1679-1693 - [c163]Ülkü Meteriz-Yidiran, Necip Fazýl Yýldýran, David Mohaisen:
AcousticType: Smartwatch-Enabled Cross-Device Text Entry Method Using Keyboard Acoustics. CHI Extended Abstracts 2022: 352:1-352:7 - [c162]Won Joon Yun, David Mohaisen, Soyi Jung, Jong-Kook Kim, Joongheon Kim:
Hierarchical Reinforcement Learning using Gaussian Random Trajectory Generation in Autonomous Furniture Assembly. CIKM 2022: 3624-3633 - [c161]Yu Mi, David Mohaisen, An Wang:
AutoDefense: Reinforcement Learning Based Autoreactive Defense Against Network Attacks. CNS 2022: 163-171 - [c160]Ayodeji Adeniran, David Mohaisen:
Measuring Cryptocurrency Mining in Public Cloud Services: A Security Perspective. CSoNet 2022: 128-140 - [c159]Mohamed Alqadhi, Abdulrahman Alabduljabbar, Kyle Thomas, Saeed Salem, DaeHun Nyang, David Mohaisen:
Do Content Management Systems Impact the Security of Free Content Websites? CSoNet 2022: 141-154 - [c158]Marwan Omar, Soohyeon Choi, Daehun Nyang, David Mohaisen:
Quantifying the Performance of Adversarial Training on Language Models with Distribution Shifts. CySSS@AsiaCCS 2022: 3-9 - [c157]Abdulrahman Alabduljabbar, Runyu Ma, Soohyeon Choi, Rhongho Jang, Songqing Chen, David Mohaisen:
Understanding the Security of Free Content Websites by Analyzing their SSL Certificates: A Comparative Study. CySSS@AsiaCCS 2022: 19-25 - [c156]Dinhnguyen Dao, Rhongho Jang, Changhun Jung, David Mohaisen, DaeHun Nyang:
Minimizing Noise in HyperLogLog-Based Spread Estimation of Multiple Flows. DSN 2022: 331-342 - [c155]Kazi Abu Zubair, David Mohaisen, Amro Awad:
Filesystem Encryption or Direct-Access for NVM Filesystems? Let's Have Both! HPCA 2022: 490-502 - [c154]Mazen Al-Wadi, Rujia Wang, David Mohaisen, Clayton Hughes, Simon David Hammond, Amro Awad:
Minerva: Rethinking Secure Architectures for the Era of Fabric-Attached Memory Architectures. IPDPS 2022: 258-268 - [c153]Ahmed Abusnaina, Afsah Anwar, Sultan Alshamrani, Abdulrahman Alabduljabbar, RhongHo Jang, DaeHun Nyang, David Mohaisen:
Systematically Evaluating the Robustness of ML-based IoT Malware Detection Systems. RAID 2022: 308-320 - [c152]Necip Fazil Yildiran, Ülkü Meteriz-Yildiran, David Mohaisen:
AiRType: An Air-tapping Keyboard for Augmented Reality Environments. VR Workshops 2022: 676-677 - [c151]Ülkü Meteriz-Yildiran, Necip Fazil Yildiran, Amro Awad, David Mohaisen:
A Keylogging Inference Attack on Air-Tapping Keyboards in Virtual Environments. VR 2022: 765-774 - [c150]Abdulrahman Alabduljabbar, David Mohaisen:
Measuring the Privacy Dimension of Free Content Websites through Automated Privacy Policy Analysis and Annotation. WWW (Companion Volume) 2022: 860-867 - [c149]Marwan Omar, David Mohaisen:
Making Adversarially-Trained Language Models Forget with Model Retraining: A Case Study on Hate Speech Detection. WWW (Companion Volume) 2022: 887-893 - [i65]Marwan Omar, Soohyeon Choi, DaeHun Nyang, David Mohaisen:
Robust Natural Language Processing: Recent Advances, Challenges, and Future Directions. CoRR abs/2201.00768 (2022) - [i64]Won Joon Yun, Soohyun Park, Joongheon Kim, Myungjae Shin, Soyi Jung, David A. Mohaisen, Jae-Hyun Kim:
Cooperative Multi-Agent Deep Reinforcement Learning for Reliable Surveillance via Autonomous Multi-UAV Control. CoRR abs/2201.05843 (2022) - [i63]Kazi Abu Zubair, Sumit Kumar Jha, David Mohaisen, Clayton Hughes, Amro Awad:
FAT-PIM: Low-Cost Error Detection for Processing-In-Memory. CoRR abs/2207.12231 (2022) - [i62]Won Joon Yun, Soohyun Park, Joongheon Kim, David Mohaisen:
Self-Configurable Stabilized Real-Time Detection Learning for Autonomous Driving Applications. CoRR abs/2209.14525 (2022) - [i61]Hattan Althebeiti, David Mohaisen:
Enriching Vulnerability Reports Through Automated and Augmented Description Summarization. CoRR abs/2210.01260 (2022) - [i60]Ayodeji Adeniran, David Mohaisen:
Miners in the Cloud: Measuring and Analyzing Cryptocurrency Mining in Public Clouds. CoRR abs/2210.10512 (2022) - [i59]Mohamed Alqadhi, Abdulrahman Alabduljabbar, Kyle Thomas, Saeed Salem, DaeHun Nyang, David Mohaisen:
Do Content Management Systems Impact the Security of Free Content Websites? A Correlation Analysis. CoRR abs/2210.12083 (2022) - [i58]Ülkü Meteriz-Yildiran, Necip Fazil Yildiran, Joongheon Kim, David Mohaisen:
Learning Location from Shared Elevation Profiles in Fitness Apps: A Privacy Perspective. CoRR abs/2210.15529 (2022) - 2021
- [j62]Aminollah Khormali, Jeman Park, Hisham Alasmary, Afsah Anwar, Muhammad Saad, David Mohaisen:
Domain name system security and privacy: A contemporary survey. Comput. Networks 185: 107699 (2021) - [j61]Aminollah Khormali, Jeman Park, Hisham Alasmary, Afsah Anwar, Muhammad Saad, David Mohaisen:
Corrigendum to "Domain name system security and privacy: A contemporary survey" Computer Networks Volume 185 (2020) 107699. Comput. Networks 188: 107814 (2021) - [j60]Changhun Jung, Jinchun Choi, Rhongho Jang, David Mohaisen, DaeHun Nyang:
A network-independent tool-based usable authentication system for Internet of Things devices. Comput. Secur. 108: 102338 (2021) - [j59]Dongjie Wang, Kunpeng Liu, David Mohaisen, Pengyang Wang, Chang-Tien Lu, Yanjie Fu:
Towards Semantically-Rich Spatial Network Representation Learning via Automated Feature Topic Pairing. Frontiers Big Data 4: 762899 (2021) - [j58]Ashar Ahmad, Abdulrahman Alabduljabbar, Muhammad Saad, Daehun Nyang, Joongheon Kim, David Mohaisen:
Empirically comparing the performance of blockchain's consensus algorithms. IET Blockchain 1(1): 56-64 (2021) - [j57]Mohammed Abuhamad, Ahmed Abusnaina, Daehun Nyang, David Mohaisen:
Sensor-Based Continuous Authentication of Smartphones' Users Using Behavioral Biometrics: A Contemporary Survey. IEEE Internet Things J. 8(1): 65-84 (2021) - [j56]Muhammad Saad, Joongheon Kim, DaeHun Nyang, David Mohaisen:
Contra-∗: Mechanisms for countering spam attacks on blockchain's memory pools. J. Netw. Comput. Appl. 179: 102971 (2021) - [j55]SungHa Baek, Youngdon Jung, David Mohaisen, Sungjin Lee, DaeHun Nyang:
SSD-Assisted Ransomware Detection and Data Recovery Techniques. IEEE Trans. Computers 70(10): 1762-1776 (2021) - [j54]Mao Ye, Kazi Abu Zubair, Aziz Mohaisen, Amro Awad:
Towards Low-Cost Mechanisms to Enable Restoration of Encrypted Non-Volatile Memories. IEEE Trans. Dependable Secur. Comput. 18(4): 1850-1867 (2021) - [j53]Mohammed Abuhamad, Tamer AbuHmed, David Mohaisen, Daehun Nyang:
Large-scale and Robust Code Authorship Identification with Deep Feature Learning. ACM Trans. Priv. Secur. 24(4): 23:1-23:35 (2021) - [j52]Muhammad Saad, Zhan Qin, Kui Ren, DaeHun Nyang, David Mohaisen:
e-PoS: Making Proof-of-Stake Decentralized and Fair. IEEE Trans. Parallel Distributed Syst. 32(8): 1961-1973 (2021) - [c148]Muhammad Saad, Afsah Anwar, Srivatsan Ravi, David Mohaisen:
Revisiting Nakamoto Consensus in Asynchronous Networks: A Comprehensive Analysis of Bitcoin Safety and ChainQuality. CCS 2021: 988-1005 - [c147]Muhammad Saad, Songqing Chen, David Mohaisen:
SyncAttack: Double-spending in Bitcoin Without Mining Power. CCS 2021: 1668-1685 - [c146]Abdulrahman Alabduljabbar, Ahmed Abusnaina, Ülkü Meteriz-Yildiran, David Mohaisen:
Automated Privacy Policy Annotation with Information Highlighting Made Practical Using Deep Representations. CCS 2021: 2378-2380 - [c145]Mohammed Alkinoon, Marwan Omar, Manar Mohaisen, David Mohaisen:
Security Breaches in the Healthcare Domain: A Spatiotemporal Analysis. CSoNet 2021: 171-183 - [c144]Afsah Anwar, Ahmed Abusnaina, Songqing Chen, Frank Li, David Mohaisen:
Cleaning the NVD: Comprehensive Quality Assessment, Improvements, and Analyses. DSN (Supplements) 2021: 1-2 - [c143]Ahmed Abusnaina, Afsah Anwar, Sultan Alshamrani, Abdulrahman Alabduljabbar, Rhongho Jang, DaeHun Nyang, David Mohaisen:
Systemically Evaluating the Robustness of ML-based IoT Malware Detectors. DSN (Supplements) 2021: 3-4 - [c142]Dongjie Wang, Kunpeng Liu, David Mohaisen, Pengyang Wang, Chang-Tien Lu, Yanjie Fu:
Automated Feature-Topic Pairing: Aligning Semantic and Embedding Spaces in Spatial Representation Learning. SIGSPATIAL/GIS 2021: 450-453 - [c141]Ahmed Abusnaina, Yuhang Wu, Sunpreet S. Arora, Yizhen Wang, Fei Wang, Hao Yang, David Mohaisen:
Adversarial Example Detection Using Latent Neighborhood Graph. ICCV 2021: 7667-7676 - [c140]Muhammad Saad, Songqing Chen, David Mohaisen:
Root Cause Analyses for the Deteriorating Bitcoin Network Synchronization. ICDCS 2021: 239-249 - [c139]Myungjae Shin, David Mohaisen, Joongheon Kim:
Bitcoin Price Forecasting via Ensemble-based LSTM Deep Learning Networks. ICOIN 2021: 603-608 - [c138]Ashar Ahmad, Muhammad Saad, Joongheon Kim, DaeHun Nyang, David Mohaisen:
Performance Evaluation of Consensus Protocols in Blockchain-based Audit Systems. ICOIN 2021: 654-656 - [c137]Mazen Al-Wadi, Aziz Mohaisen, Amro Awad:
ProMT: optimizing integrity tree updates for write-intensive pages in secure NVMs. ICS 2021: 479-490 - [c136]Mohammed Alkinoon, Sung J. Choi, David Mohaisen:
Measuring Healthcare Data Breaches. WISA 2021: 265-277 - [c135]Abdulrahman Alabduljabbar, Ahmed Abusnaina, Ülkü Meteriz-Yildiran, David Mohaisen:
TLDR: Deep Learning-Based Automated Privacy Policy Annotation with Key Policy Highlights. WPES@CCS 2021: 103-118 - [c134]Ülkü Meteriz-Yildiran, Necip Fazil Yildiran, David Mohaisen:
SIA: Smartwatch-Enabled Inference Attacks on Physical Keyboards Using Acoustic Signals. WPES@CCS 2021: 209-221 - [c133]Sultan Alshamrani, Ahmed Abusnaina, Mohammed Abuhamad, Daehun Nyang, David Mohaisen:
Hate, Obscenity, and Insults: Measuring the Exposure of Children to Inappropriate Comments in YouTube. WWW (Companion Volume) 2021: 508-515 - [e5]David Mohaisen, Ruoming Jin:
Computational Data and Social Networks - 10th International Conference, CSoNet 2021, Virtual Event, November 15-17, 2021, Proceedings. Lecture Notes in Computer Science 13116, Springer 2021, ISBN 978-3-030-91433-2 [contents] - [i57]Muhammad Saad, Zhan Qin, Kui Ren, DaeHun Nyang, David Mohaisen:
e-PoS: Making Proof-of-Stake Decentralized and Fair. CoRR abs/2101.00330 (2021) - [i56]Sultan Alshamrani, Ahmed Abusnaina, Mohammed Abuhamad, Daehun Nyang, David Mohaisen:
Hate, Obscenity, and Insults: Measuring the Exposure of Children to Inappropriate Comments in YouTube. CoRR abs/2103.09050 (2021) - [i55]Afsah Anwar, Jinchun Choi, Abdulrahman Alabduljabbar, Hisham Alasmary, Jeffrey Spaulding, An Wang, Songqing Chen, DaeHun Nyang, Amro Awad, David Mohaisen:
Understanding Internet of Things Malware by Analyzing Endpoints in their Static Artifacts. CoRR abs/2103.14217 (2021) - [i54]Hisham Alasmary, Afsah Anwar, Ahmed Abusnaina, Abdulrahman Alabduljabbar, Mohammad Abuhamad, An Wang, DaeHun Nyang, Amro Awad, David Mohaisen:
ShellCore: Automating Malicious IoT Software Detection by Using Shell Commands Representation. CoRR abs/2103.14221 (2021) - [i53]Ahmed Abusnaina, Afsah Anwar, Sultan Alshamrani, Abdulrahman Alabduljabbar, RhongHo Jang, Daehun Nyang, David Mohaisen:
ML-based IoT Malware Detection Under Adversarial Settings: A Systematic Evaluation. CoRR abs/2108.13373 (2021) - [i52]Dongjie Wang, Kunpeng Liu, David Mohaisen, Pengyang Wang, Chang-Tien Lu, Yanjie Fu:
Automated Feature-Topic Pairing: Aligning Semantic and Embedding Spaces in Spatial Representation Learning. CoRR abs/2109.11053 (2021) - [i51]Sunyoung Kim, Changhun Jung, RhongHo Jang, David Mohaisen, DaeHun Nyang:
Count-Less: A Counting Sketch for the Data Plane of High Speed Switches. CoRR abs/2111.02759 (2021) - [i50]Muhammad Saad, Afsah Anwar, Srivatsan Ravi, David Mohaisen:
HashSplit: Exploiting Bitcoin Asynchrony to Violate Common Prefix and Chain Quality. IACR Cryptol. ePrint Arch. 2021: 299 (2021) - 2020
- [j51]Jinchun Choi, Mohammed Abuhamad, Ahmed Abusnaina, Afsah Anwar, Sultan Alshamrani, Jeman Park, Daehun Nyang, David Mohaisen:
Understanding the Proxy Ecosystem: A Comparative Analysis of Residential and Open Proxies on the Internet. IEEE Access 8: 111368-111380 (2020) - [j50]Jeman Park, Manar Mohaisen, DaeHun Nyang, Aziz Mohaisen:
Assessing the effectiveness of pulsing denial of service attacks under realistic network synchronization assumptions. Comput. Networks 173: 107146 (2020) - [j49]Muhammad Saad, Jeffrey Spaulding, Laurent Njilla, Charles A. Kamhoua, Sachin Shetty, DaeHun Nyang, David Mohaisen:
Exploring the Attack Surface of Blockchain: A Comprehensive Survey. IEEE Commun. Surv. Tutorials 22(3): 1977-2008 (2020) - [j48]Mohammed Abuhamad, Tamer AbuHmed, David Mohaisen, DaeHun Nyang:
AUToSen: Deep-Learning-Based Implicit Continuous Authentication Using Smartphone Sensors. IEEE Internet Things J. 7(6): 5008-5020 (2020) - [j47]Dohyun Kwon, Joongheon Kim, David A. Mohaisen, Wonjun Lee:
Self-adaptive power control with deep reinforcement learning for millimeter-wave Internet-of-vehicles video caching. J. Commun. Networks 22(4): 326-337 (2020) - [j46]Mohammed Abuhamad, Tamer AbuHmed, DaeHun Nyang, David Mohaisen:
Multi-χ: Identifying Multiple Authors from Source Code Files. Proc. Priv. Enhancing Technol. 2020(3): 25-41 (2020) - [j45]David Mohaisen, Sencun Zhu:
Editorial. EAI Endorsed Trans. Security Safety 6(22): e1 (2020) - [j44]Afsah Anwar, Aminollah Khormali, Jinchun Choi, Hisham Alasmary, Saeed Salem, DaeHun Nyang, David Mohaisen:
Measuring the Cost of Software Vulnerabilities. EAI Endorsed Trans. Security Safety 7(23): e1 (2020) - [j43]Muhammad Saad, Jinchun Choi, DaeHun Nyang, Joongheon Kim, Aziz Mohaisen:
Toward Characterizing Blockchain-Based Cryptocurrencies for Highly Accurate Predictions. IEEE Syst. J. 14(1): 321-332 (2020) - [j42]An Wang, Wentao Chang, Songqing Chen, Aziz Mohaisen:
A Data-Driven Study of DDoS Attacks and Their Dynamics. IEEE Trans. Dependable Secur. Comput. 17(3): 648-661 (2020) - [j41]Aziz Mohaisen, Zhongshu Gu, Kui Ren, Zhenhua Li, Charles A. Kamhoua, Laurent L. Njilla, DaeHun Nyang:
Look-Aside at Your Own Risk: Privacy Implications of DNSSEC Look-Aside Validation. IEEE Trans. Dependable Secur. Comput. 17(4): 745-759 (2020) - [j40]Rhongho Jang, Jeonil Kang, Aziz Mohaisen, DaeHun Nyang:
Catch Me If You Can: Rogue Access Point Detection Using Intentional Channel Interference. IEEE Trans. Mob. Comput. 19(5): 1056-1071 (2020) - [c132]Sultan Alshamrani, Mohammed Abuhamad, Ahmed Abusnaina, David Mohaisen:
Investigating Online Toxicity in Users Interactions with the Mainstream Media Channels on YouTube. CIKM (Workshops) 2020 - [c131]Sultan Alshamrani, Ahmed Abusnaina, Mohammed Abuhamad, Anho Lee, DaeHun Nyang, David Mohaisen:
An Analysis of Users Engagement on Twitter During the COVID-19 Pandemic: Topical Trends and Sentiments. CSoNet 2020: 73-86 - [c130]Ülkü Meteriz, Necip Fazil Yildiran, Joongheon Kim, David Mohaisen:
Understanding the Potential Risks of Sharing Elevation Information on Fitness Applications. ICDCS 2020: 464-473 - [c129]Hisham Alasmary, Ahmed Abusnaina, Rhongho Jang, Mohammed Abuhamad, Afsah Anwar, DaeHun Nyang, David Mohaisen:
Soteria: Detecting Adversarial Examples in Control Flow Graph-based Malware Classifiers. ICDCS 2020: 888-898 - [c128]Afsah Anwar, Hisham Alasmary, Jeman Park, An Wang, Songqing Chen, David Mohaisen:
Statically Dissecting Internet of Things Malware: Analysis, Characterization, and Detection. ICICS 2020: 443-461 - [c127]Soohyun Park, Jeman Park, David Mohaisen, Joongheon Kim:
Reinforced Edge Selection using Deep Learning for Robust Surveillance in Unmanned Aerial Vehicles. ICTC 2020: 96-99 - [c126]Jaesung Yoo, Jeman Park, An Wang, David Mohaisen, Joongheon Kim:
On the Performance of Generative Adversarial Network (GAN) Variants: A Clinical Data Study. ICTC 2020: 100-104 - [c125]Sultan Alshamrani, Ahmed Abusnaina, David Mohaisen:
Hiding in Plain Sight: A Measurement and Analysis of Kids' Exposure to Malicious URLs on YouTube. SEC 2020: 321-326 - [c124]Rhongho Jang, DaeHong Min, Seongkwang Moon, David Mohaisen, DaeHun Nyang:
SketchFlow: Per-Flow Systematic Sampling Using Sketch Saturation Event. INFOCOM 2020: 1339-1348 - [c123]Ahmed Abusnaina, Rhongho Jang, Aminollah Khormali, DaeHun Nyang, David Mohaisen:
DFD: Adversarial Learning-based Approach to Defend Against Website Fingerprinting. INFOCOM 2020: 2459-2468 - [c122]Aminollah Khormali, Ahmed Abusnaina, Songqing Chen, DaeHun Nyang, David Mohaisen:
From Blue-Sky to Practical Adversarial Learning. TPS-ISA 2020: 118-127 - [c121]Ahmed Abusnaina, Mohammed Abuhamad, DaeHun Nyang, Songqing Chen, An Wang, David Mohaisen:
Insights into Attacks' Progression: Prediction of Spatio-Temporal Behavior of DDoS Attacks. WISA 2020: 362-374 - [i49]Joohyung Jeon, Junhui Kim, Joongheon Kim, Kwangsoo Kim, Aziz Mohaisen, Jong-Kook Kim:
Privacy-Preserving Deep Learning Computation for Geo-Distributed Medical Big-Data Platforms. CoRR abs/2001.02932 (2020) - [i48]Mohammed Abuhamad, Ahmed Abusnaina, DaeHun Nyang, David Mohaisen:
Sensor-based Continuous Authentication of Smartphones' Users Using Behavioral Biometrics: A Survey. CoRR abs/2001.08578 (2020) - [i47]Muhammad Saad, Joongheon Kim, DaeHun Nyang, David Mohaisen:
Contra-*: Mechanisms for Countering Spam Attacks on Blockchain Memory Pools. CoRR abs/2005.04842 (2020) - [i46]Ahmed Abusnaina, Mohammed Abuhamad, Hisham Alasmary, Afsah Anwar, Rhongho Jang, Saeed Salem, DaeHun Nyang, David Mohaisen:
A Deep Learning-based Fine-grained Hierarchical Learning Approach for Robust Malware Classification. CoRR abs/2005.07145 (2020) - [i45]Afsah Anwar, Ahmed Abusnaina, Songqing Chen, Frank Li, David Mohaisen:
Cleaning the NVD: Comprehensive Quality Assessment, Improvements, and Analyses. CoRR abs/2006.15074 (2020) - [i44]Aminollah Khormali, Jeman Park, Hisham Alasmary, Afsah Anwar, David Mohaisen:
Domain Name System Security and Privacy: A Contemporary Survey. CoRR abs/2006.15277 (2020) - [i43]Aminollah Khormali, DaeHun Nyang, David Mohaisen:
Generating Adversarial Examples with an Optimized Quality. CoRR abs/2007.00146 (2020) - [i42]Sultan Alshamrani, Ahmed Abusnaina, David Mohaisen:
Hiding in Plain Sight: A Measurement and Analysis of Kids' Exposure to Malicious URLs on YouTube. CoRR abs/2009.07923 (2020) - [i41]Jaesung Yoo, Jeman Park, An Wang, David Mohaisen, Joongheon Kim:
On the Performance of Generative Adversarial Network (GAN) Variants: A Clinical Data Study. CoRR abs/2009.09579 (2020) - [i40]SooHyun Park, Jeman Park, David Mohaisen, Joongheon Kim:
Reinforced Edge Selection using Deep Learning for Robust Surveillance in Unmanned Aerial Vehicles. CoRR abs/2009.09647 (2020)
2010 – 2019
- 2019
- [j39]Jeffrey Spaulding, Jeman Park, Joongheon Kim, DaeHun Nyang, Aziz Mohaisen:
Thriving on chaos: Proactive detection of command and control domains in internet of things-scale botnets using DRIFT. Trans. Emerg. Telecommun. Technol. 30(4) (2019) - [j38]Laihyuk Park, Chunghyun Lee, Joongheon Kim, Aziz Mohaisen, Sungrae Cho:
Two-Stage IoT Device Scheduling With Dynamic Programming for Energy Internet Systems. IEEE Internet Things J. 6(5): 8782-8791 (2019) - [j37]Hisham Alasmary, Aminollah Khormali, Afsah Anwar, Jeman Park, Jinchun Choi, Ahmed Abusnaina, Amro Awad, DaeHun Nyang, Aziz Mohaisen:
Analyzing and Detecting Emerging Internet of Things Malware: A Graph-Based Approach. IEEE Internet Things J. 6(5): 8977-8988 (2019) - [j36]Ashar Ahmad, Muhammad Saad, Aziz Mohaisen:
Secure and transparent audit logs with BlockAudit. J. Netw. Comput. Appl. 145 (2019) - [j35]Fan Dang, Ennan Zhai, Zhenhua Li, Pengfei Zhou, Aziz Mohaisen, Kaigui Bian, Qingfu Wen, Mo Li:
Pricing Data Tampering in Automated Fare Collection with NFC-Equipped Smartphones. IEEE Trans. Mob. Comput. 18(5): 1159-1173 (2019) - [j34]Feng Shen, Justin Del Vecchio, Aziz Mohaisen, Steven Y. Ko, Lukasz Ziarek:
Android Malware Detection Using Complex-Flows. IEEE Trans. Mob. Comput. 18(6): 1231-1245 (2019) - [j33]Jeman Park, Jinchun Choi, DaeHun Nyang, Aziz Mohaisen:
Transparency in the New gTLD Era: Evaluating the DNS Centralized Zone Data Service. IEEE Trans. Netw. Serv. Manag. 16(4): 1782-1796 (2019) - [c120]Muhammad Saad, Ashar Ahmad, Aziz Mohaisen:
Fighting Fake News Propagation with Blockchains. CNS 2019: 1-4 - [c119]Jeman Park, Manar Mohaisen, Aziz Mohaisen:
Investigating DNS Manipulation by Open DNS Resolvers. CoNEXT Companion 2019: 45-46 - [c118]Ahmed Abusnaina, DaeHun Nyang, Murat Yuksel, Aziz Mohaisen:
Examining the Security of DDoS Detection Systems in Software Defined Networks. CoNEXT Companion 2019: 49-50 - [c117]Ahmed Abusnaina, Hisham Alasmary, Mohammed Abuhamad, Saeed Salem, DaeHun Nyang, Aziz Mohaisen:
Subgraph-Based Adversarial Examples Against Graph-Based IoT Malware Detection Systems. CSoNet 2019: 268-281 - [c116]Ahmed Abusnaina, Aminollah Khormali, DaeHun Nyang, Murat Yuksel, Aziz Mohaisen:
Examining the Robustness of Learning-Based DDoS Detection in Software Defined Networks. DSC 2019: 1-8 - [c115]Jinchun Choi, Ahmed Abusnaina, Afsah Anwar, An Wang, Songqing Chen, DaeHun Nyang, Aziz Mohaisen:
Honor among Thieves: Towards Understanding the Dynamics and Interdependencies in IoT Botnets. DSC 2019: 1-8 - [c114]Joohyung Jeon, Junhui Kim, Joongheon Kim, Kwangsoo Kim, Aziz Mohaisen, Jong-Kook Kim:
Privacy-Preserving Deep Learning Computation for Geo-Distributed Medical Big-Data Platforms. DSN (Supplements) 2019: 3-4 - [c113]Jeman Park, Aminollah Khormali, Manar Mohaisen, Aziz Mohaisen:
Where Are You Taking Me? Behavioral Analysis of Open DNS Resolvers. DSN 2019: 493-504 - [c112]Muhammad Saad, Aminollah Khormali, Aziz Mohaisen:
Dine and Dash: Static, Dynamic, and Economic Analysis of In-Browser Cryptojacking. eCrime 2019: 1-12 - [c111]Jinchun Choi, Afsah Anwar, Hisham Alasmary, Jeffrey Spaulding, DaeHun Nyang, Aziz Mohaisen:
IoT malware ecosystem in the wild: a glimpse into analysis and exposures. SEC 2019: 413-418 - [c110]Muhammad Saad, Afsah Anwar, Ashar Ahmad, Hisham Alasmary, Murat Yuksel, Aziz Mohaisen:
RouteChain: Towards Blockchain-based Secure and Efficient BGP Routing. IEEE ICBC 2019: 210-218 - [c109]Muhammad Saad, Laurent Njilla, Charles A. Kamhoua, Joongheon Kim, DaeHun Nyang, Aziz Mohaisen:
Mempool optimization for Defending Against DDoS Attacks in PoW-based Blockchain Systems. IEEE ICBC 2019: 285-292 - [c108]Ashar Ahmad, Muhammad Saad, Laurent Njilla, Charles A. Kamhoua, Mostafa A. Bassiouni, Aziz Mohaisen:
BlockTrail: A Scalable Multichain Solution for Blockchain-Based Audit Trails. ICC 2019: 1-6 - [c107]Muhammad Saad, Laurent Njilla, Charles A. Kamhoua, Aziz Mohaisen:
Countering Selfish Mining in Blockchains. ICNC 2019: 360-364 - [c106]Muhammad Saad, Victor Cook, Lan N. Nguyen, My T. Thai, Aziz Mohaisen:
Partitioning Attacks on Bitcoin: Colliding Space, Time, and Logic. ICDCS 2019: 1175-1187 - [c105]Ahmed Abusnaina, Aminollah Khormali, Hisham Alasmary, Jeman Park, Afsah Anwar, Aziz Mohaisen:
Adversarial Learning Attacks on Graph-based IoT Malware Detection Systems. ICDCS 2019: 1296-1305 - [c104]An Wang, Aziz Mohaisen, Songqing Chen:
XLF: A Cross-layer Framework to Secure the Internet of Things (IoT). ICDCS 2019: 1830-1839 - [c103]Rhongho Jang, Seongkwang Moon, Youngtae Noh, Aziz Mohaisen, DaeHun Nyang:
InstaMeasure: Instant Per-flow Detection Using Large In-DRAM Working Set of Active Flows. ICDCS 2019: 2047-2056 - [c102]David Mohaisen, Songqing Chen:
Computer Systems Have 99 Problems, Let's Not Make Machine Learning Another One. TPS-ISA 2019: 255-259 - [c101]Jeman Park, Aziz Mohaisen, Charles A. Kamhoua, Michael J. Weisman, Nandi O. Leslie, Laurent Njilla:
Cyber Deception in the Internet of Battlefield Things: Techniques, Instances, and Assessments. WISA 2019: 299-312 - [c100]Rhongho Jang, Seongkwang Moon, Youngtae Noh, Aziz Mohaisen, DaeHun Nyang:
A cost-effective anomaly detection system using in-DRAM working set of active flows table: poster. WiSec 2019: 286-287 - [c99]Jinchun Choi, Afsah Anwar, Hisham Alasmary, Jeffrey Spaulding, DaeHun Nyang, Aziz Mohaisen:
Analyzing endpoints in the internet of things malware: poster. WiSec 2019: 288-289 - [c98]Ahmed Abusnaina, Aminollah Khormali, Hisham Alasmary, Jeman Park, Afsah Anwar, Ulku Meteriz, Aziz Mohaisen:
Breaking graph-based IoT malware detection systems using adversarial examples: poster. WiSec 2019: 290-291 - [e4]Aziz Mohaisen, Zhi-Li Zhang:
Proceedings of the 15th International Conference on Emerging Networking Experiments And Technologies, CoNEXT 2019, Orlando, FL, USA, December 09-12, 2019. ACM 2019, ISBN 978-1-4503-6998-5 [contents] - [e3]Songqing Chen, Kim-Kwang Raymond Choo, Xinwen Fu, Wenjing Lou, Aziz Mohaisen:
Security and Privacy in Communication Networks - 15th EAI International Conference, SecureComm 2019, Orlando, FL, USA, October 23-25, 2019, Proceedings, Part I. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering 304, Springer 2019, ISBN 978-3-030-37227-9 [contents] - [e2]Songqing Chen, Kim-Kwang Raymond Choo, Xinwen Fu, Wenjing Lou, Aziz Mohaisen:
Security and Privacy in Communication Networks - 15th EAI International Conference, SecureComm 2019, Orlando, FL, USA, October 23-25, 2019, Proceedings, Part II. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering 305, Springer 2019, ISBN 978-3-030-37230-9 [contents] - [i39]Aziz Mohaisen, Omar Alrawi, Jeman Park, Joongheon Kim, DaeHun Nyang, Manar Mohaisen:
Network-based Analysis and Classification of Malware using Behavioral Artifacts Ordering. CoRR abs/1901.01185 (2019) - [i38]Jinchun Choi, Afsah Anwar, Hisham Alasmary, Jeffrey Spaulding, DaeHun Nyang, Aziz Mohaisen:
Analyzing Endpoints in the Internet of Things Malware. CoRR abs/1902.03531 (2019) - [i37]Muhammad Saad, Victor Cook, Lan N. Nguyen, My T. Thai, Aziz Mohaisen:
Exploring Spatial, Temporal, and Logical Attacks on the Bitcoin Network. CoRR abs/1902.03636 (2019) - [i36]Hisham Alasmary, Aminollah Khormali, Afsah Anwar, Jeman Park, Jinchun Choi, DaeHun Nyang, Aziz Mohaisen:
Analyzing, Comparing, and Detecting Emerging Malware: A Graph-based Approach. CoRR abs/1902.03955 (2019) - [i35]RhongHo Jang, Seongkwang Moon, Youngtae Noh, Aziz Mohaisen, DaeHun Nyang:
Scaling Up Anomaly Detection Using In-DRAM Working Set of Active Flows Table. CoRR abs/1902.04143 (2019) - [i34]Ahmed Abusnaina, Aminollah Khormali, Hisham Alasmary, Jeman Park, Afsah Anwar, Ulku Meteriz, Aziz Mohaisen:
Examining Adversarial Learning against Graph-based IoT Malware Detection Systems. CoRR abs/1902.04416 (2019) - [i33]Hyun-Jae Kang, Jae-wook Jang, Aziz Mohaisen, Huy Kang Kim:
Detecting and Classifying Android Malware using Static Analysis along with Creator Information. CoRR abs/1903.01618 (2019) - [i32]Muhammad Saad, Jeffrey Spaulding, Laurent Njilla, Charles A. Kamhoua, Sachin Shetty, DaeHun Nyang, Aziz Mohaisen:
Exploring the Attack Surface of Blockchain: A Systematic Overview. CoRR abs/1904.03487 (2019) - [i31]Ashar Ahmad, Muhammad Saad, Aziz Mohaisen:
Secure and Transparent Audit Logs with BlockAudit. CoRR abs/1907.10484 (2019) - [i30]Amirali Sanatinia, Jeman Park, Erik-Oliver Blass, Aziz Mohaisen, Guevara Noubir:
A Privacy-Preserving Longevity Study of Tor's Hidden Services. CoRR abs/1909.03576 (2019) - [i29]Aminollah Khormali, Ahmed Abusnaina, Songqing Chen, DaeHun Nyang, Aziz Mohaisen:
COPYCAT: Practical Adversarial Attacks on Visualization-Based Malware Detection. CoRR abs/1909.09735 (2019) - [i28]Changhun Jung, Mohammed Abuhamad, Jumabek Alikhanov, Aziz Mohaisen, Kyungja Han, DaeHun Nyang:
W-Net: A CNN-based Architecture for White Blood Cells Image Classification. CoRR abs/1910.01091 (2019) - [i27]Ülkü Meteriz, Necip Fazil Yildiran, Aziz Mohaisen:
You Can Run, But You Cannot Hide: Using Elevation Profiles to Breach Location Privacy through Trajectory Prediction. CoRR abs/1910.09041 (2019) - [i26]Mazen Al-Wadi, Aziz Mohaisen, Amro Awad:
Phoenix: Towards Persistently Secure, Recoverable, and NVM Friendly Tree of Counters. CoRR abs/1911.01922 (2019) - [i25]David Mohaisen, Songqing Chen:
Computer Systems Have 99 Problems, Let's Not Make Machine Learning Another One. CoRR abs/1911.12593 (2019) - 2018
- [j32]DaeHun Nyang, Hyoungshick Kim, Woojoo Lee, Sung-bae Kang, Geumhwan Cho, Mun-Kyu Lee, Aziz Mohaisen:
Two-Thumbs-Up: Physical protection for PIN entry secure against recording attacks. Comput. Secur. 78: 1-15 (2018) - [j31]Dohyun Kwon, Sang-Wook Kim, Joongheon Kim, Aziz Mohaisen:
Interference-Aware Adaptive Beam Alignment for Hyper-Dense IEEE 802.11ax Internet-of-Things Networks. Sensors 18(10): 3364 (2018) - [j30]Aziz Mohaisen, Omar Alrawi, Jeman Park, Joongheon Kim, DaeHun Nyang, Manar Mohaisen:
Network-based Analysis and Classification of Malware using Behavioral Artifacts Ordering. EAI Endorsed Trans. Security Safety 5(16): e2 (2018) - [j29]An Wang, Wentao Chang, Songqing Chen, Aziz Mohaisen:
Delving Into Internet DDoS Attacks by Botnets: Characterization and Analysis. IEEE/ACM Trans. Netw. 26(6): 2843-2855 (2018) - [c97]Mohammed Abuhamad, Tamer AbuHmed, Aziz Mohaisen, DaeHun Nyang:
Large-Scale and Language-Oblivious Code Authorship Identification. CCS 2018: 101-114 - [c96]Afsah Anwar, Aminollah Khormali, Aziz Mohaisen:
POSTER: Understanding the Hidden Cost of Software Vulnerabilities: Measurements and Predictions. AsiaCCS 2018: 793-795 - [c95]Muhammad Saad, My T. Thai, Aziz Mohaisen:
POSTER: Deterring DDoS Attacks on Blockchain-based Cryptocurrencies through Mempool Optimization. AsiaCCS 2018: 809-811 - [c94]Hisham Alasmary, Afsah Anwar, Jeman Park, Jinchun Choi, DaeHun Nyang, Aziz Mohaisen:
Graph-Based Comparison of IoT and Android Malware. CSoNet 2018: 259-272 - [c93]Jeffrey Spaulding, Aziz Mohaisen:
Defending Internet of Things Against Malicious Domain Names using D-FENS. SEC 2018: 387-392 - [c92]Jeman Park, Hisham Alasmary, Omar Al-Ibrahim, Charles A. Kamhoua, Kevin A. Kwiat, Laurent Njilla, Aziz Mohaisen:
QOI: Assessing Participation in Threat Information Sharing. ICASSP 2018: 6951-6955 - [c91]Changhun Jung, Jeonil Kang, Aziz Mohaisen, DaeHun Nyang:
Digitalseal: a Transaction Authentication Tool for Online and Offline Transactions. ICASSP 2018: 6956-6960 - [c90]SungHa Baek, Youngdon Jung, Aziz Mohaisen, Sungjin Lee, DaeHun Nyang:
SSD-Insider: Internal Defense of Solid-State Drive against Ransomware with Perfect Data Recovery. ICDCS 2018: 875-884 - [c89]Shin-Young Ahn, Joongheon Kim, Eunji Lim, Wan Choi, Aziz Mohaisen, Sungwon Kang:
ShmCaffe: A Distributed Deep Learning Platform with Shared Memory Buffer for HPC Architecture. ICDCS 2018: 1118-1128 - [c88]Jeffrey Spaulding, Jeman Park, Joongheon Kim, Aziz Mohaisen:
Proactive detection of algorithmically generated malicious domains. ICOIN 2018: 21-24 - [c87]Muhammad Saad, Aziz Mohaisen:
Towards characterizing blockchain-based cryptocurrencies for highly-accurate predictions. INFOCOM Workshops 2018: 704-709 - [c86]Ashar Ahmad, Muhammad Saad, Mostafa A. Bassiouni, Aziz Mohaisen:
Towards Blockchain-Driven, Secure and Transparent Audit Logs. MobiQuitous 2018: 443-448 - [c85]Myungjae Shin, Joongheon Kim, Aziz Mohaisen, Jaebok Park, KyungHee Lee:
Neural Network Syntax Analyzer for Embedded Standardized Deep Learning. EMDL@MobiSys 2018: 37-41 - [c84]Zhongjie Ba, Sixu Piao, Xinwen Fu, Dimitrios Koutsonikolas, Aziz Mohaisen, Kui Ren:
ABC: Enabling Smartphone Authentication with Built-in Camera. NDSS 2018 - [c83]Jeman Park, DaeHun Nyang, Aziz Mohaisen:
Timing is Almost Everything: Realistic Evaluation of the Very Short Intermittent DDoS Attacks. PST 2018: 1-10 - [c82]Afsah Anwar, Aminollah Khormali, DaeHun Nyang, Aziz Mohaisen:
Understanding the Hidden Cost of Software Vulnerabilities: Measurements and Predictions. SecureComm (1) 2018: 377-395 - [e1]Aziz Mohaisen, Qian Wang:
Proceedings of the 6th International Workshop on Security in Cloud Computing, SCC@AsiaCCS 2018, Incheon, Republic of Korea, June 04-08, 2018. ACM 2018 [contents] - [i24]Muhammad Saad, Aminollah Khormali, Aziz Mohaisen:
End-to-End Analysis of In-Browser Cryptojacking. CoRR abs/1809.02152 (2018) - [i23]Muhammad Saad, Laurent Njilla, Charles A. Kamhoua, Aziz Mohaisen:
Countering Selfish Mining in Blockchains. CoRR abs/1811.09943 (2018) - [i22]Ashar Ahmad, Muhammad Saad, Mostafa A. Bassiouni, Aziz Mohaisen:
Towards Blockchain-Driven, Secure and Transparent Audit Logs. CoRR abs/1811.09944 (2018) - [i21]Andreas Hülsing, Denis Butin, Stefan-Lukas Gazdag, Joost Rijneveld, Aziz Mohaisen:
XMSS: eXtended Merkle Signature Scheme. RFC 8391: 1-74 (2018) - 2017
- [j28]Joongheon Kim, Aziz Mohaisen:
Distributed and reliable decision-making for cloud-enabled mobile service platforms. Int. J. Distributed Sens. Networks 13(8) (2017) - [j27]Hyukmin Kwon, Aziz Mohaisen, Jiyoung Woo, Yongdae Kim, Eunjo Lee, Huy Kang Kim:
Crime Scene Reconstruction: Online Gold Farming Network Analysis. IEEE Trans. Inf. Forensics Secur. 12(3): 544-556 (2017) - [j26]Aziz Mohaisen, Kui Ren:
Leakage of .onion at the DNS Root: Measurements, Causes, and Countermeasures. IEEE/ACM Trans. Netw. 25(5): 3059-3072 (2017) - [c81]Qian Wang, Kui Ren, Minxin Du, Qi Li, Aziz Mohaisen:
SecGDB: Graph Encryption for Exact Shortest Distance Queries with Efficient Updates. Financial Cryptography 2017: 79-97 - [c80]Aziz Mohaisen, Omar Al-Ibrahim, Charles A. Kamhoua, Kevin A. Kwiat, Laurent Njilla:
Rethinking information sharing for threat intelligence. HotWeb 2017: 6:1-6:7 - [c79]Jeffrey Spaulding, DaeHun Nyang, Aziz Mohaisen:
Understanding the effectiveness of typosquatting techniques. HotWeb 2017: 9:1-9:8 - [c78]Si Chen, Kui Ren, Sixu Piao, Cong Wang, Qian Wang, Jian Weng, Lu Su, Aziz Mohaisen:
You Can Hear But You Cannot Steal: Defending Against Voice Impersonation Attacks on Smartphones. ICDCS 2017: 183-195 - [c77]Chaowen Guan, Aziz Mohaisen, Zhi Sun, Lu Su, Kui Ren, Yaling Yang:
When Smart TV Meets CRN: Privacy-Preserving Fine-Grained Spectrum Access. ICDCS 2017: 1105-1115 - [c76]An Wang, Aziz Mohaisen, Songqing Chen:
An Adversary-Centric Behavior Modeling of DDoS Attacks. ICDCS 2017: 1126-1136 - [c75]Feng Shen, Justin Del Vecchio, Aziz Mohaisen, Steven Y. Ko, Lukasz Ziarek:
Android Malware Detection Using Complex-Flows. ICDCS 2017: 2430-2437 - [c74]Aziz Mohaisen, Zhongshu Gu, Kui Ren:
Privacy Implications of DNSSEC Look-Aside Validation. ICDCS 2017: 2438-2443 - [c73]RhongHo Jang, Jeonil Kang, Aziz Mohaisen, DaeHun Nyang:
Rogue Access Point Detector Using Characteristics of Channel Overlapping in 802.11n. ICDCS 2017: 2515-2520 - [c72]Jeffrey Spaulding, Shambhu J. Upadhyaya, Aziz Mohaisen:
You've Been Tricked! A User Study of the Effectiveness of Typosquatting Techniques. ICDCS 2017: 2593-2596 - [c71]Young Jong Mo, Joongheon Kim, Jong-Kook Kim, Aziz Mohaisen, Woojoo Lee:
Performance of deep learning computation with TensorFlow software library in GPU-capable multi-core computing platforms. ICUFN 2017: 240-242 - [c70]Fan Dang, Pengfei Zhou, Zhenhua Li, Ennan Zhai, Aziz Mohaisen, Qingfu Wen, Mo Li:
Large-scale invisible attack on AFC systems with NFC-equipped smartphones. INFOCOM 2017: 1-9 - [c69]Feng Shen, Justin Del Vecchio, Aziz Mohaisen, Steven Y. Ko, Lukasz Ziarek:
Poster: Android Malware Detection using Multi-Flows and API Patterns. MobiSys 2017: 171 - [c68]Aziz Mohaisen, Omar Al-Ibrahim, Charles A. Kamhoua, Kevin A. Kwiat, Laurent Njilla:
Assessing Quality of Contribution in Information Sharing for Threat Intelligence. PAC 2017: 182-183 - [c67]Aziz Mohaisen, Zhongshu Gu, Kui Ren, Laurent Njilla, Charles A. Kamhoua, DaeHun Nyang:
Understanding the Privacy Implications of DNSSEC Look-Aside Validation. PAC 2017: 208-209 - [c66]Wentao Chang, Aziz Mohaisen, An Wang, Songqing Chen:
Understanding Adversarial Strategies from Bot Recruitment to Scheduling. SecureComm 2017: 397-417 - [c65]RhongHo Jang, Jeonil Kang, Aziz Mohaisen, DaeHun Nyang:
Highly-accurate rogue access point detection using intentional channel interference: poster. WISEC 2017: 277-278 - [c64]RhongHo Jang, DongGyu Cho, Aziz Mohaisen, Youngtae Noh, DaeHun Nyang:
Two-level network monitoring and management in WLAN using software-defined networking: poster. WISEC 2017: 279-280 - [i20]Aziz Mohaisen, Omar Al-Ibrahim, Charles A. Kamhoua, Kevin A. Kwiat, Laurent Njilla:
Rethinking Information Sharing for Actionable Threat Intelligence. CoRR abs/1702.00548 (2017) - [i19]Omar Al-Ibrahim, Aziz Mohaisen, Charles A. Kamhoua, Kevin A. Kwiat, Laurent Njilla:
Beyond Free Riding: Quality of Indicators for Assessing Participation in Information Sharing for Threat Intelligence. CoRR abs/1702.00552 (2017) - 2016
- [j25]Jae-wook Jang, Hyun-Jae Kang, Jiyoung Woo, Aziz Mohaisen, Huy Kang Kim:
Andro-Dumpsys: Anti-malware system based on the similarity of malware creator and malware centric information. Comput. Secur. 58: 125-138 (2016) - [j24]Manar Mohaisen, Aziz Mohaisen:
Characterizing Collaboration in Social Network-enabled Routing. KSII Trans. Internet Inf. Syst. 10(4): 1643-1660 (2016) - [j23]Jeong Hyun Yi, Aziz Mohaisen, Sean Yang, Ching-Hsien Hsu:
Advances in Mobile Security Technologies. Mob. Inf. Syst. 2016: 9501918:1-9501918:2 (2016) - [j22]Myungsun Kim, Aziz Mohaisen, Jung Hee Cheon, Yongdae Kim:
Private Over-Threshold Aggregation Protocols over Distributed Datasets. IEEE Trans. Knowl. Data Eng. 28(9): 2467-2479 (2016) - [c63]Jeffrey Spaulding, Shambhu J. Upadhyaya, Aziz Mohaisen:
The Landscape of Domain Name Typosquatting: Techniques and Countermeasures. ARES 2016: 284-289 - [c62]Mee Lan Han, Hee Chan Han, Ah Reum Kang, Byung Il Kwak, Aziz Mohaisen, Huy Kang Kim:
WHAP: Web-hacking profiling using Case-Based Reasoning. CNS 2016: 344-345 - [c61]Ah Reum Kang, Aziz Mohaisen:
Transparency of the new gTLD's centralized zone data service: A measurement study. CNS 2016: 354-355 - [c60]Ah Reum Kang, Aziz Mohaisen:
Assessing DNS privacy under partial deployment of special-use Domain Names. CNS 2016: 358-359 - [c59]Jeffrey Spaulding, Ah Reum Kang, Shambhu J. Upadhyaya, Aziz Mohaisen:
A user study of the effectiveness of typosquatting techniques. CNS 2016: 360-361 - [c58]Ah Reum Kang, Aziz Mohaisen:
Automatic alerts annotation for improving DDoS mitigation systems. CNS 2016: 362-363 - [c57]Ah Reum Kang, Seong Hoon Jeong, Steven Y. Ko, Kui Ren, Aziz Mohaisen:
Transparency in the New gTLD Era: Evaluating the DNS Centralized Zone Data Service. HotWeb 2016: 54-59 - [c56]Eunjo Lee, Jiyoung Woo, Hyoungshick Kim, Aziz Mohaisen, Huy Kang Kim:
You are a Game Bot!: Uncovering Game Bots in MMORPGs via Self-similarity in the Wild. NDSS 2016 - [c55]Seong Hoon Jeong, Ah Reum Kang, Joongheon Kim, Huy Kang Kim, Aziz Mohaisen:
A Longitudinal Analysis of .i2p Leakage in the Public DNS Infrastructure. SIGCOMM 2016: 557-558 - [c54]Aziz Mohaisen, Ah Reum Kang, Kui Ren:
Does Query Blocking Improve DNS Privacy? - Quantifying Privacy Under Partial Blocking Deployment. WISA 2016: 1-14 - [c53]An Wang, Aziz Mohaisen, Wentao Chang, Songqing Chen:
Measuring and Analyzing Trends in Recent Distributed Denial of Service Attacks. WISA 2016: 15-28 - [c52]Omar Alrawi, Aziz Mohaisen:
Chains of Distrust: Towards Understanding Certificates Used for Signing Malicious Applications. WWW (Companion Volume) 2016: 451-456 - [i18]Jeffrey Spaulding, Shambhu J. Upadhyaya, Aziz Mohaisen:
The Landscape of Domain Name Typosquatting: Techniques and Countermeasures. CoRR abs/1603.02767 (2016) - [i17]Jae-wook Jang, Jaesung Yun, Aziz Mohaisen, Jiyoung Woo, Huy Kang Kim:
Andro-profiler: Detecting and Classifying Android Malware based on Behavioral Profiles. CoRR abs/1606.01403 (2016) - [i16]Ah Reum Kang, Seong Hoon Jeong, Aziz Mohaisen, Huy Kang Kim:
Multimodal Game Bot Detection using User Behavioral Characteristics. CoRR abs/1606.01426 (2016) - [i15]Jae-wook Jang, Jiyoung Woo, Aziz Mohaisen, Jaesung Yun, Huy Kang Kim:
Mal-Netminer: Malware Classification Approach based on Social Network Analysis of System Call Graph. CoRR abs/1606.01971 (2016) - [i14]Ah Reum Kang, Jeffrey Spaulding, Aziz Mohaisen:
Domain Name System Security and Privacy: Old Problems and New Challenges. CoRR abs/1606.07080 (2016) - 2015
- [j21]YoungJae Maeng, Aziz Mohaisen, Mun-Kyu Lee, DaeHun Nyang:
Transaction authentication using complementary colors. Comput. Secur. 48: 167-181 (2015) - [j20]Aziz Mohaisen, Omar Alrawi, Manar Mohaisen:
AMAL: High-fidelity, behavior-based automated malware analysis and classification. Comput. Secur. 52: 251-266 (2015) - [j19]Jae-wook Jang, Hyunjae Kang, Jiyoung Woo, Aziz Mohaisen, Huy Kang Kim:
Andro-AutoPsy: Anti-malware system based on similarity matching of malware and malware creator-centric information. Digit. Investig. 14: 17-35 (2015) - [j18]Hyun-Jae Kang, Jae-wook Jang, Aziz Mohaisen, Huy Kang Kim:
Detecting and Classifying Android Malware Using Static Analysis along with Creator Information. Int. J. Distributed Sens. Networks 11: 479174:1-479174:9 (2015) - [j17]Joongheon Kim, Aziz Mohaisen, Song-Nam Hong:
Interference impacts on 60 ghz real-time online video streaming in wireless smart tv platforms. Multim. Tools Appl. 74(19): 8613-8629 (2015) - [j16]Aziz Mohaisen, Manar Mohaisen:
HTTP-based Smart Transportation of DNS Queries and Applications. Smart Comput. Rev. 5(4): 238-247 (2015) - [j15]Aziz Mohaisen, Hesham Mekky, Xinwen Zhang, Haiyong Xie, Yongdae Kim:
Timing Attacks on Access Privacy in Information Centric Networks and Countermeasures. IEEE Trans. Dependable Secur. Comput. 12(6): 675-687 (2015) - [c51]Wentao Chang, Aziz Mohaisen, An Wang, Songqing Chen:
Measuring Botnets in the Wild: Some New Trends. AsiaCCS 2015: 645-650 - [c50]Hesham Mekky, Aziz Mohaisen, Zhi-Li Zhang:
Separation of benign and malicious network events for accurate malware family classification. CNS 2015: 125-133 - [c49]An Wang, Aziz Mohaisen, Wentao Chang, Songqing Chen:
Capturing DDoS Attack Dynamics Behind the Scenes. DIMVA 2015: 205-215 - [c48]An Wang, Aziz Mohaisen, Wentao Chang, Songqing Chen:
Delving into Internet DDoS Attacks by Botnets: Characterization and Analysis. DSN 2015: 379-390 - [c47]Aziz Mohaisen:
Towards Automatic and Lightweight Detection and Classification of Malicious Web Contents. HotWeb 2015: 67-72 - 2014
- [j14]Joongheon Kim, Aziz Mohaisen, Jong-Kook Kim:
Fast and Low-Power Link Setup for IEEE 802.15.3c Multi-Gigabit/s Wireless Sensor Networks. IEEE Commun. Lett. 18(3): 455-458 (2014) - [j13]Manar Mohaisen, Abedelaziz Mohaisen, Mérouane Debbah:
Parallel QRD-M encoder for multi-user MIMO systems. Telecommun. Syst. 57(3): 261-270 (2014) - [j12]DaeHun Nyang, Aziz Mohaisen, Jeonil Kang:
Keylogging-Resistant Visual Authentication Protocols. IEEE Trans. Mob. Comput. 13(11): 2566-2579 (2014) - [j11]Aziz Mohaisen, Huy Tran, Abhishek Chandra, Yongdae Kim:
Trustworthy Distributed Computing on Social Networks. IEEE Trans. Serv. Comput. 7(3): 333-345 (2014) - [c46]Hesham Mekky, Aziz Mohaisen, Zhi-Li Zhang:
POSTER: Blind Separation of Benign and Malicious Events to Enable Accurate Malware Family Classification. CCS 2014: 1478-1480 - [c45]An Wang, Wentao Chang, Aziz Mohaisen, Songqing Chen:
POSTER: How Distributed Are Today's DDoS Attacks? CCS 2014: 1511-1513 - [c44]Aziz Mohaisen, Andrew G. West, Allison Mankin, Omar Alrawi:
Chatter: Classifying malware families using system event ordering. CNS 2014: 283-291 - [c43]Aziz Mohaisen, Omar Alrawi:
AV-Meter: An Evaluation of Antivirus Scans and Labels. DIMVA 2014: 112-131 - [c42]Andrew G. West, Aziz Mohaisen:
Metadata-Driven Threat Classification of Network Endpoints Appearing in Malware. DIMVA 2014: 152-171 - [c41]Wentao Chang, An Wang, Aziz Mohaisen, Songqing Chen:
Characterizing botnets-as-a-service. SIGCOMM 2014: 585-586 - [c40]Youngbae Song, Hyoungshick Kim, Aziz Mohaisen:
A Private Walk in the Clouds: Using End-to-End Encryption between Cloud Applications in a Personal Domain. TrustBus 2014: 72-82 - [c39]Ahmed E. Kosba, Aziz Mohaisen, Andrew G. West, Trevor Tonn, Huy Kang Kim:
ADAM: Automated Detection and Attribution of Malicious Webpages. WISA 2014: 3-16 - [c38]Aziz Mohaisen, Omar Alrawi:
AMAL: High-Fidelity, Behavior-Based Automated Malware Analysis and Classification. WISA 2014: 107-121 - [c37]Aziz Mohaisen, Mansurul Bhuiyan, Yannis Labrou:
Name Server Switching: Anomaly Signatures, Usage, Clustering, and Prediction. WISA 2014: 202-215 - [c36]Matthew Thomas, Aziz Mohaisen:
Measuring the Leakage of Onion at the Root: A measurement of Tor's .onion pseudo-TLD in the global domain name system. WPES 2014: 173-180 - [c35]Matthew Thomas, Aziz Mohaisen:
Kindred domains: detecting and clustering botnet domains using DNS traffic. WWW (Companion Volume) 2014: 707-712 - 2013
- [j10]Aziz Mohaisen, Joongheon Kim:
The Sybil Attacks and Defenses: A Survey. Smart Comput. Rev. 3(6): 480-489 (2013) - [j9]Abedelaziz Mohaisen, Denis Foo Kune, Eugene Y. Vasserman, Myungsun Kim, Yongdae Kim:
Secure Encounter-Based Mobile Social Networks: Requirements, Designs, and Tradeoffs. IEEE Trans. Dependable Secur. Comput. 10(6): 380-393 (2013) - [j8]Yanhua Li, Abedelaziz Mohaisen, Zhi-Li Zhang:
Trading Optimality for Scalability in Large-Scale Opportunistic Routing. IEEE Trans. Veh. Technol. 62(5): 2253-2263 (2013) - [c34]Abedelaziz Mohaisen, Huy Tran, Abhishek Chandra, Yongdae Kim:
Trustworthy distributed computing on social networks. AsiaCCS 2013: 155-160 - [c33]Abedelaziz Mohaisen, Yongdae Kim:
Dynamix: anonymity on dynamic social structures. AsiaCCS 2013: 167-172 - [c32]Abedelaziz Mohaisen, Xinwen Zhang, Max Schuchard, Haiyong Xie, Yongdae Kim:
Protecting access privacy of cached contents in information centric networks. AsiaCCS 2013: 173-178 - [c31]Mansurul Bhuiyan, Aziz Mohaisen, Yannis Labrou, Mohammad Al Hasan:
Characterization of the dynamics and interactions of domain names and name server. CNS 2013: 387-388 - [c30]Ahmed E. Kosba, Aziz Mohaisen, Andrew G. West, Trevor Tonn:
ADAM: Automated detection and attribution of malicious webpages. CNS 2013: 399-400 - [c29]Aziz Mohaisen, Omar Alrawi, Andrew G. West, Allison Mankin:
Babble: Identifying malware by its dialects. CNS 2013: 407-408 - [c28]Aziz Mohaisen, Scott Hollenbeck:
Improving Social Network-Based Sybil Defenses by Rewiring and Augmenting Social Graphs. WISA 2013: 65-80 - [c27]Aziz Mohaisen, Omar Alrawi, Matt Larson, Danny McPherson:
Towards a Methodical Evaluation of Antivirus Scans and Labels - "If You're Not Confused, You're Not Paying Attention". WISA 2013: 231-241 - [c26]Abedelaziz Mohaisen, Omar Alrawi:
Unveiling Zeus: automated classification of malware samples. WWW (Companion Volume) 2013: 829-832 - [i13]Abedelaziz Mohaisen, Omar Alrawi:
Unveiling Zeus. CoRR abs/1303.7012 (2013) - [i12]Aziz Mohaisen, Joongheon Kim:
The Sybil Attacks and Defenses: A Survey. CoRR abs/1312.6349 (2013) - [i11]Myungsun Kim, Abedelaziz Mohaisen, Jung Hee Cheon, Yongdae Kim:
Private Over-threshold Aggregation Protocols over Distributed Databases. IACR Cryptol. ePrint Arch. 2013: 545 (2013) - 2012
- [c25]Abedelaziz Mohaisen, Huy Tran, Nicholas Hopper, Yongdae Kim:
On the mixing time of directed social graphs and security implications. AsiaCCS 2012: 36-37 - [c24]Abedelaziz Mohaisen, Xinwen Zhang, Max Schuchard, Haiyong Xie, Yongdae Kim:
Protecting access privacy of cached contents in information centric networks. CCS 2012: 1001-1003 - [c23]Abedelaziz Mohaisen, Tamer AbuHmed, Ting Zhu, Manar Mohaisen:
Collaboration in social network-based information dissemination. ICC 2012: 2103-2107 - [c22]Myungsun Kim, Abedelaziz Mohaisen, Jung Hee Cheon, Yongdae Kim:
Private Over-Threshold Aggregation Protocols. ICISC 2012: 472-486 - [c21]Ting Zhu, Abedelaziz Mohaisen, Yi Ping, Don Towsley:
DEOS: Dynamic energy-oriented scheduling for sustainable wireless sensor networks. INFOCOM 2012: 2363-2371 - [c20]Abedelaziz Mohaisen, Pengkui Luo, Yanhua Li, Yongdae Kim, Zhi-Li Zhang:
Measuring bias in the mixing time of social graphs due to graph sampling. MILCOM 2012: 1-6 - [i10]Myungsun Kim, Abedelaziz Mohaisen, Jung Hee Cheon, Yongdae Kim:
Private Top-k Aggregation Protocols. IACR Cryptol. ePrint Arch. 2012: 538 (2012) - 2011
- [j7]Abedelaziz Mohaisen, Ku-Young Chang, Dowon Hong:
Attacks and Countermeasures for RFID Mutual Authentication Scheme in Pervasive Computing Environmen. KSII Trans. Internet Inf. Syst. 5(9): 1684-1697 (2011) - [c19]Manar Mohaisen, Abedelaziz Mohaisen, Yanhua Li, Pengkui Luo:
Parallel QRD-M Encoder for Decentralized Multi-User MIMO Systems. ICC 2011: 1-5 - [c18]Abedelaziz Mohaisen, Huy Tran, Nicholas Hopper, Yongdae Kim:
Understanding Social Networks Properties for Trustworthy Computing. ICDCS Workshops 2011: 154-159 - [c17]Abedelaziz Mohaisen, Tamer AbuHmed, Hun Jeong Kang, Yongdae Kim, DaeHun Nyang:
Mistaking friends for foes: an analysis of a social network-based Sybil defense in mobile networks. ICUIMC 2011: 28 - [c16]Abedelaziz Mohaisen, Nicholas Hopper, Yongdae Kim:
Keep your friends close: Incorporating trust into social network-based Sybil defenses. INFOCOM 2011: 1943-1951 - [c15]Max Schuchard, Abedelaziz Mohaisen, Denis Foo Kune, Nicholas Hopper, Yongdae Kim, Eugene Y. Vasserman:
Losing Control of the Internet: Using the Data Plane to Attack the Control Plane. NDSS 2011 - [i9]DaeHun Nyang, Abedelaziz Mohaisen, Taekyoung Kwon, Brent ByungHoon Kang, Angelos Stavrou:
Decryptable to Your Eyes: Visualization of Security Protocols at the User Interface. CoRR abs/1112.2245 (2011) - [i8]Abedelaziz Mohaisen, Huy Tran, Abhishek Chandra, Yongdae Kim:
SocialCloud: Using Social Networks for Building Distributed Computing Services. CoRR abs/1112.2254 (2011) - 2010
- [j6]Abedelaziz Mohaisen, Nam-Su Jho, Dowon Hong, DaeHun Nyang:
Privacy Preserving Association Rule Mining Revisited: Privacy Enhancement and Resources Efficiency. IEICE Trans. Inf. Syst. 93-D(2): 315-325 (2010) - [j5]Abedelaziz Mohaisen, DaeHun Nyang:
On the Inefficiency of the Resources Optimal Key Pre-Distribution Scheme for Wireless Sensor Network. J. Commun. 5(2): 164-168 (2010) - [c14]Abedelaziz Mohaisen, Nicholas Hopper, Yongdae Kim:
Designs to account for trust in social network-based sybil defenses. CCS 2010: 714-716 - [c13]Abedelaziz Mohaisen, Eugene Y. Vasserman, Max Schuchard, Denis Foo Kune, Yongdae Kim:
Secure encounter-based social networks: requirements, challenges, and designs. CCS 2010: 717-719 - [c12]Max Schuchard, Abedelaziz Mohaisen, Denis Foo Kune, Nicholas Hopper, Yongdae Kim, Eugene Y. Vasserman:
Losing control of the internet: using the data plane to attack the control plane. CCS 2010: 726-728 - [c11]Abedelaziz Mohaisen, Aaram Yun, Yongdae Kim:
Measuring the mixing time of social graphs. Internet Measurement Conference 2010: 383-389 - [i7]Dowon Hong, Abedelaziz Mohaisen:
Augmented Rotation-Based Transformation for Privacy-Preserving Data Clustering. CoRR abs/1006.1948 (2010)
2000 – 2009
- 2009
- [j4]Abedelaziz Mohaisen, DaeHun Nyang, KyungHee Lee:
Hierarchical Grid-based Pairwise Key Pre-distribution in Wireless Sensor Networks. Int. J. Netw. Secur. 8(3): 282-292 (2009) - [j3]Abedelaziz Mohaisen, DaeHun Nyang, YoungJae Maeng, KyungHee Lee, Dowon Hong:
Grid-Based Key Pre-Distribution in Wireless Sensor Networks. KSII Trans. Internet Inf. Syst. 3(2): 195-208 (2009) - [j2]Abedelaziz Mohaisen, Jeong Woon Choi, Dowon Hong:
On the Insecurity of Asymmetric Key-based Architecture in Wireless Sensor Networks. KSII Trans. Internet Inf. Syst. 3(4): 376-384 (2009) - [c10]Abedelaziz Mohaisen, Nam-Su Jho, Dowon Hong:
A Computationally-Efficient Construction for the Matrix-Based Key Distribution in Sensor Network. ISA 2009: 190-199 - [i6]Abedelaziz Mohaisen, Dowon Hong, DaeHun Nyang:
Privacy in Location Based Services: Primitives Toward the Solution. CoRR abs/0903.2682 (2009) - [i5]Abedelaziz Mohaisen, Dowon Hong:
Mitigating the ICA Attack against Rotation Based Transformation for Privacy Preserving Clustering. CoRR abs/0906.0202 (2009) - 2008
- [j1]Abedelaziz Mohaisen, DaeHun Nyang, Tamer AbuHmed:
Two-level Key Pool Design-based Random Key Pre-distribution in Wireless Sensor Networks. KSII Trans. Internet Inf. Syst. 2(5): 222-238 (2008) - [c9]Abedelaziz Mohaisen, Dowon Hong, DaeHun Nyang:
Privacy in Location Based Services: Primitives Toward the Solution. NCM (1) 2008: 572-579 - [c8]Abedelaziz Mohaisen, Ik Rae Jeong, Dowon Hong, Nam-Su Jho, DaeHun Nyang:
Data Randomization for Lightweight Secure Data Aggregation in Sensor Network. UIC 2008: 338-351 - [c7]Abedelaziz Mohaisen, YoungJae Maeng, Jeonil Kang, DaeHun Nyang, KyungHee Lee, Dowon Hong, Jong Wook Han:
Protection Techniques of Secret Information in Non-tamper Proof Devices of Smart Home Network. UIC 2008: 548-562 - [i4]Tamer AbuHmed, Abedelaziz Mohaisen, DaeHun Nyang:
A Survey on Deep Packet Inspection for Intrusion Detection Systems. CoRR abs/0803.0037 (2008) - [i3]Abedelaziz Mohaisen, DaeHun Nyang, KyungHee Lee:
Hierarchical Grid-Based Pairwise Key Pre-distribution in Wireless Sensor Networks. CoRR abs/0803.1111 (2008) - [i2]Abedelaziz Mohaisen, Dowon Hong:
Privacy Preserving Association Rule Mining Revisited. CoRR abs/0808.3166 (2008) - [i1]Abedelaziz Mohaisen:
A computationally-efficient construction for the matrix-based key distribution in sensor network. CoRR abs/0812.4485 (2008) - 2007
- [c6]Jeonil Kang, DaeHun Nyang, Abedelaziz Mohaisen, Young-Geun Choi, KoonSoon Kim:
Certificate Issuing Using Proxy and Threshold Signatures in Self-initialized Ad Hoc Network. ICCSA (3) 2007: 886-899 - [c5]Abedelaziz Mohaisen, DaeHun Nyang, YoungJae Maeng, KyungHee Lee:
Structures for Communication-Efficient Public Key Revocation in Ubiquitous Sensor Network. MSN 2007: 822-833 - [c4]Abedelaziz Mohaisen, YoungJae Maeng, DaeHun Nyang:
On Grid-Based Key Pre-distribution: Toward a Better Connectivity in Wireless Sensor Network. PAKDD Workshops 2007: 527-537 - [c3]YoungJae Maeng, Abedelaziz Mohaisen, DaeHun Nyang:
Secret Key Revocation in Sensor Networks. UIC 2007: 1222-1232 - 2006
- [c2]Abedelaziz Mohaisen, DaeHun Nyang:
Hierarchical Grid-Based Pairwise Key Predistribution Scheme for Wireless Sensor Networks. EWSN 2006: 83-98 - [c1]DaeHun Nyang, Abedelaziz Mohaisen:
Cooperative Public Key Authentication Protocol in Wireless Sensor Network. UIC 2006: 864-873
Coauthor Index
aka: Mohammad Abuhamad
aka: Sultan Alshamrani
aka: Rhongho Jang
aka: Laurent L. Njilla
aka: Daehun Nyang
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-12 20:56 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint