Sensor-based Continuous Authentication of Smartphones' Users Using Behavioral Biometrics: A Contemporary Survey M Abuhamad, A Abusnaina, DH Nyang, D Mohaisen IEEE Internet of Things Journal 8 (1), 65 - 84, 2021 | 156 | 2021 |
AUToSen: Deep Learning-based Implicit Continuous Authentication Using Smartphone Sensors M Abuhamad, T Abuhmed, D Mohaisen, DH Nyang IEEE Internet of Things Journal 7 (6), 5008-5020, 2020 | 127 | 2020 |
Large-scale and language-oblivious code authorship identification M Abuhamad, T AbuHmed, A Mohaisen, DH Nyang Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications …, 2018 | 111 | 2018 |
Code authorship identification using convolutional neural networks M Abuhamad, J Rhim, T AbuHmed, S Ullah, S Kang, DH Nyang Future Generation Computer Systems 95, 104-115, 2019 | 56 | 2019 |
Soteria: Detecting adversarial examples in control flow graph-based malware classifiers H Alasmary, A Abusnaina, R Jang, M Abuhamad, A Anwar, DH Nyang, ... 2020 IEEE 40th International Conference on Distributed Computing Systems …, 2020 | 47 | 2020 |
Dl-fhmc: Deep learning-based fine-grained hierarchical learning approach for robust malware classification A Abusnaina, M Abuhamad, H Alasmary, A Anwar, R Jang, S Salem, ... IEEE Transactions on Dependable and Secure Computing 19 (5), 3432-3447, 2021 | 35 | 2021 |
W-Net: A CNN-based Architecture for White Blood Cells Image Classification C Jung, M Abuhamad, J Alikhanov, A Mohaisen, K Han, DH Nyang The AAAI 2019 Symposium on AI for Social Good, 2019 | 33 | 2019 |
Hate, obscenity, and insults: Measuring the exposure of children to inappropriate comments in youtube S Alshamrani, A Abusnaina, M Abuhamad, D Nyang, D Mohaisen Companion proceedings of the web conference 2021, 508-515, 2021 | 26 | 2021 |
WBC image classification and generative models based on convolutional neural network C Jung, M Abuhamad, D Mohaisen, K Han, DH Nyang BMC Medical Imaging 22 (1), 94, 2022 | 25 | 2022 |
Investigating Online Toxicity in Users Interactions with the Mainstream Media Channels on YouTube. S Alshamrani, M Abuhamad, A Abusnaina, D Mohaisen CIKM (Workshops), 2020 | 23 | 2020 |
Event-driven business intelligence approach for real-time integration of technical and fundamental analysis in forex market M AbuHamad, M Mohd, J Salim Journal of Computer Science 9 (4), 488, 2013 | 23 | 2013 |
Multi-χ: Identifying multiple authors from source code files M Abuhamad, T Abuhmed, DH Nyang, D Mohaisen Proceedings on Privacy Enhancing Technologies, 2020 | 19 | 2020 |
Subgraph-based Adversarial Examples Against Graph-based IoT Malware Detection Systems A Abusnaina, H Alasmary, M Abuhamad, S Salem, D Nyang, M Aziz In Proceedings of the 8th International Conference on Computational Data and …, 2019 | 19 | 2019 |
Understanding the proxy ecosystem: A comparative analysis of residential and open proxies on the internet J Choi, M Abuhamad, A Abusnaina, A Anwar, S Alshamrani, J Park, ... IEEE Access 8, 111368-111380, 2020 | 14 | 2020 |
Investigating the effect of traffic sampling on machine learning-based network intrusion detection approaches J Alikhanov, R Jang, M Abuhamad, D Mohaisen, D Nyang, Y Noh IEEE Access 10, 5801-5823, 2021 | 13 | 2021 |
Advedge: Optimizing adversarial perturbations against interpretable deep learning E Abdukhamidov, M Abuhamad, F Juraev, E Chan-Tin, T AbuHmed Computational Data and Social Networks: 10th International Conference …, 2021 | 11 | 2021 |
Leveraging Spectral Representations of Control Flow Graphs for Efficient Analysis of Windows Malware Q Sun, E Abdukhamidov, T Abuhmed, M Abuhamad The 17th ACM ASIA Conference on Computer and Communications Security (ACM …, 2022 | 9 | 2022 |
Interpretations cannot be trusted: Stealthy and effective adversarial perturbations against interpretable deep learning E Abdukhamidov, M Abuhamad, SS Woo, E Chan-Tin, T Abuhmed arXiv preprint arXiv:2211.15926, 2022 | 7 | 2022 |
Sentiment analysis of users’ reactions on social media during the pandemic E Abdukhamidov, F Juraev, M Abuhamad, S El-Sappagh, T AbuHmed Electronics 11 (10), 1648, 2022 | 7 | 2022 |
ShellCore: Automating Malicious IoT Software Detection Using Shell Commands Representation H Alasmary, A Anwar, A Abusnaina, A Alabduljabbar, M Abuhamad, ... IEEE Internet of Things Journal 9 (4), 2485 - 2496, 2022 | 7 | 2022 |