Follow
Mohammed Abuhamad
Mohammed Abuhamad
Verified email at luc.edu - Homepage
Title
Cited by
Cited by
Year
Sensor-based Continuous Authentication of Smartphones' Users Using Behavioral Biometrics: A Contemporary Survey
M Abuhamad, A Abusnaina, DH Nyang, D Mohaisen
IEEE Internet of Things Journal 8 (1), 65 - 84, 2021
1542021
AUToSen: Deep Learning-based Implicit Continuous Authentication Using Smartphone Sensors
M Abuhamad, T Abuhmed, D Mohaisen, DH Nyang
IEEE Internet of Things Journal 7 (6), 5008-5020, 2020
1262020
Large-scale and language-oblivious code authorship identification
M Abuhamad, T AbuHmed, A Mohaisen, DH Nyang
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications …, 2018
1112018
Code authorship identification using convolutional neural networks
M Abuhamad, J Rhim, T AbuHmed, S Ullah, S Kang, DH Nyang
Future Generation Computer Systems 95, 104-115, 2019
562019
Soteria: Detecting adversarial examples in control flow graph-based malware classifiers
H Alasmary, A Abusnaina, R Jang, M Abuhamad, A Anwar, DH Nyang, ...
2020 IEEE 40th International Conference on Distributed Computing Systems …, 2020
472020
Dl-fhmc: Deep learning-based fine-grained hierarchical learning approach for robust malware classification
A Abusnaina, M Abuhamad, H Alasmary, A Anwar, R Jang, S Salem, ...
IEEE Transactions on Dependable and Secure Computing 19 (5), 3432-3447, 2021
352021
W-Net: A CNN-based Architecture for White Blood Cells Image Classification
C Jung, M Abuhamad, J Alikhanov, A Mohaisen, K Han, DH Nyang
The AAAI 2019 Symposium on AI for Social Good, 2019
332019
Hate, obscenity, and insults: Measuring the exposure of children to inappropriate comments in youtube
S Alshamrani, A Abusnaina, M Abuhamad, D Nyang, D Mohaisen
Companion proceedings of the web conference 2021, 508-515, 2021
262021
WBC image classification and generative models based on convolutional neural network
C Jung, M Abuhamad, D Mohaisen, K Han, DH Nyang
BMC Medical Imaging 22 (1), 94, 2022
242022
Investigating Online Toxicity in Users Interactions with the Mainstream Media Channels on YouTube.
S Alshamrani, M Abuhamad, A Abusnaina, D Mohaisen
CIKM (Workshops), 2020
232020
Event-driven business intelligence approach for real-time integration of technical and fundamental analysis in forex market
M AbuHamad, M Mohd, J Salim
Journal of Computer Science 9 (4), 488, 2013
232013
Multi-χ: Identifying multiple authors from source code files
M Abuhamad, T Abuhmed, DH Nyang, D Mohaisen
Proceedings on Privacy Enhancing Technologies, 2020
192020
Subgraph-based Adversarial Examples Against Graph-based IoT Malware Detection Systems
A Abusnaina, H Alasmary, M Abuhamad, S Salem, D Nyang, M Aziz
In Proceedings of the 8th International Conference on Computational Data and …, 2019
192019
Investigating the effect of traffic sampling on machine learning-based network intrusion detection approaches
J Alikhanov, R Jang, M Abuhamad, D Mohaisen, D Nyang, Y Noh
IEEE Access 10, 5801-5823, 2021
132021
Understanding the proxy ecosystem: A comparative analysis of residential and open proxies on the internet
J Choi, M Abuhamad, A Abusnaina, A Anwar, S Alshamrani, J Park, ...
IEEE Access 8, 111368-111380, 2020
132020
Advedge: Optimizing adversarial perturbations against interpretable deep learning
E Abdukhamidov, M Abuhamad, F Juraev, E Chan-Tin, T AbuHmed
Computational Data and Social Networks: 10th International Conference …, 2021
112021
Leveraging Spectral Representations of Control Flow Graphs for Efficient Analysis of Windows Malware
Q Sun, E Abdukhamidov, T Abuhmed, M Abuhamad
The 17th ACM ASIA Conference on Computer and Communications Security (ACM …, 2022
92022
Interpretations cannot be trusted: Stealthy and effective adversarial perturbations against interpretable deep learning
E Abdukhamidov, M Abuhamad, SS Woo, E Chan-Tin, T Abuhmed
arXiv preprint arXiv:2211.15926, 2022
72022
ShellCore: Automating Malicious IoT Software Detection Using Shell Commands Representation
H Alasmary, A Anwar, A Abusnaina, A Alabduljabbar, M Abuhamad, ...
IEEE Internet of Things Journal 9 (4), 2485 - 2496, 2022
72022
Black-box and Target-specific Attack Against Interpretable Deep Learning Systems
E Abdukhamidov, F Juraev, M Abuhamad, T Abuhmed
The 17th ACM ASIA Conference on Computer and Communications Security (ACM …, 2022
72022
The system can't perform the operation now. Try again later.
Articles 1–20