Large-scale and language-oblivious code authorship identification M Abuhamad, T AbuHmed, A Mohaisen, DH Nyang Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications ¡¦, 2018 | 27 | 2018 |
Code authorship identification using convolutional neural networks M Abuhamad, J Rhim, T AbuHmed, S Ullah, S Kang, DH Nyang Future Generation Computer Systems 95, 104-115, 2019 | 14 | 2019 |
Event-driven business intelligence approach for real-time integration of technical and fundamental analysis in forex market M AbuHamad, M Mohd, J Salim Journal of Computer Science 9 (4), 488, 2013 | 12 | 2013 |
Sensor-based Continuous Authentication of Smartphones' Users Using Behavioral Biometrics: A Contemporary Survey M Abuhamad, A Abusnaina, DH Nyang, D Mohaisen IEEE Internet of Things Journal 8 (1), 65 - 84, 2021 | 7 | 2021 |
AUToSen: Deep Learning-based Implicit Continuous Authentication Using Smartphone Sensors M Abuhamad, T Abuhmed, D Mohaisen, DH Nyang IEEE Internet of Things Journal 7 (6), 5008-5020, 2020 | 7 | 2020 |
Chemical Rings Handwritten Recognition Based On Neural Network N Hewahi, MN Nounou, MS Nassar, M AbuHamad, H AbuHamad Ubiquitous Computing and Communication Journal 3 (3), 2008 | 5 | 2008 |
Investigating online toxicity in users interactions with the mainstream media channels on YouTube S Alshamrani, M Abuhamad, A Abusnaina, D Mohaisen The 5th International Workshop on Mining Actionable Insights from Social ¡¦, 2020 | 4 | 2020 |
W-Net: A CNN-based Architecture for White Blood Cells Image Classification C Jung, M Abuhamad, J Alikhanov, A Mohaisen, K Han, DH Nyang The AAAI 2019 Symposium on AI for Social Good, 2019 | 4 | 2019 |
Subgraph-based Adversarial Examples Against Graph-based IoT Malware Detection Systems A Abusnaina, H Alasmary, M Abuhamad, S Salem, D Nyang, M Aziz In Proceedings of the 8th International Conference on Computational Data and ¡¦, 2019 | 3 | 2019 |
Soteria: Detecting adversarial examples in control flow graph-based malware classifiers H Alasmary, A Abusnaina, R Jang, M Abuhamad, A Anwar, D NYANG, ... 40th IEEE International Conference on Distributed Computing Systems, ICDCS ¡¦, 2020 | 2 | 2020 |
Multi-¥ö: Identifying Multiple Authors from Source Code Files M Abuhamad, T Abuhmed, DH Nyang, D Mohaisen Proceedings on Privacy Enhancing Technologies 2020 (3), 25-41, 2020 | 1 | 2020 |
Sensor-Based Continuous Authentication of Smartphones' Users Using Behavioral Biometrics: A Contemporary Survey A Abusnaina, D Nyang, D Mohaisen, M Abuhamad IEEE INTERNET OF THINGS JOURNAL 8 (1), 65, 2021 | | 2021 |
An Analysis of Users Engagement on Twitter During the COVID-19 Pandemic: Topical Trends and Sentiments S Alshamrani, A Abusnaina, M Abuhamad, A Lee, DH Nyang, ... International Conference on Computational Data and Social Networks, 73-86, 2020 | | 2020 |
Understanding the Proxy Ecosystem: A Comparative Analysis of Residential and Open Proxies on the Internet J Choi, M Abuhamad, A Abusnaina, A Anwar, S Alshamrani, J Park, ... IEEE Access 8, 111368-111380, 2020 | | 2020 |
Deep Learning-based Fine-grained Hierarchical Learning Approach for Robust Malware Classification A Abusnaina, M Abuhamad, H Alasmary, A Anwar, R Jang, S Salem, ... arXiv preprint arXiv:2005.07145, 2020 | | 2020 |
Insights into Attacks¡¯ Progression: Prediction of Spatio-Temporal Behavior of DDoS Attacks A Abusnaina, M Abuhamad, DH Nyang, S Chen, A Wang, D Mohaisen The 21st World Conference on Information Security Applications (WISA), 2020 | | 2020 |
DL-CAIS: Deep Learning-based Code Authorship Identification System. M Abuhamad, T AbuHmed, A Mohaisen, DH Nyang In Proceedings of Network and Distributed System Security Symposium, NDSS 2019, 2019 | | 2019 |
Data Categorization and Model Weighting Approach for Language Model Adaptation in Statistical Machine Translation M Abuhamad, M Mohd International Journal of Advanced Computer Science and Applications 10 (1), 2019 | | 2019 |