Aminollah Khormali
Aminollah Khormali
Ph.D. candidate, University of Central Florida (UCF)
Verified email at - Homepage
Cited by
Cited by
Control chart pattern recognition using RBF neural network with new training algorithm and practical features
A Addeh, A Khormali, NA Golilarz
ISA transactions 79, 202-216, 2018
A novel approach for recognition of control chart patterns: Type-2 fuzzy clustering optimized support vector machine
A Khormali, J Addeh
ISA transactions 63, 256-264, 2016
Dine and dash: Static, dynamic, and economic analysis of in-browser cryptojacking
M Saad, A Khormali, A Mohaisen
2019 APWG Symposium on Electronic Crime Research (eCrime), 1-12, 2019
Analyzing and detecting emerging internet of things malware: A graph-based approach
H Alasmary, A Khormali, A Anwar, J Park, J Choi, A Abusnaina, A Awad, ...
IEEE Internet of Things Journal 6 (5), 8977-8988, 2019
Adversarial learning attacks on graph-based IoT malware detection systems
A Abusnaina, A Khormali, H Alasmary, J Park, A Anwar, A Mohaisen
2019 IEEE 39th International Conference on Distributed Computing Systems …, 2019
Optimization of brushless direct current motor design using an intelligent technique
A Shabanian, AAP Tousiwas, M Pourmandi, A Khormali, A Ataei
ISA transactions 57, 311-321, 2015
Identification of an industrial gas turbine based on Rowen's model and using Multi-Objective Optimization method
A Khormali, I Yousefi, H Yahyaei, SM Aliyari
2015 3rd RSI International Conference on Robotics and Mechatronics (ICROM …, 2015
Gas turbine fault detection and identification by using fuzzy clustering methods
AO Khormali, MA Sh
2014 Second RSI/ISM International Conference on Robotics and Mechatronics …, 2014
COPYCAT: practical adversarial attacks on visualization-based malware detection
A Khormali, A Abusnaina, S Chen, DH Nyang, A Mohaisen
arXiv preprint arXiv:1909.09735, 2019
Where are you taking me? behavioral analysis of open dns resolvers
J Park, A Khormali, M Mohaisen, A Mohaisen
2019 49th Annual IEEE/IFIP International Conference on Dependable Systems …, 2019
Examining the robustness of learning-based ddos detection in software defined networks
A Abusnaina, A Khormali, DH Nyang, M Yuksel, A Mohaisen
2019 IEEE Conference on Dependable and Secure Computing (DSC), 1-8, 2019
Transcreen: transfer learning on graph-based anti-cancer virtual screening model
M Salem, A Khormali, AK Arshadi, J Webb, JS Yuan
Big Data and Cognitive Computing 4 (3), 16, 2020
Understanding the hidden cost of software vulnerabilities: Measurements and predictions
A Anwar, A Khormali, DH Nyang, A Mohaisen
International Conference on Security and Privacy in Communication Systems …, 2018
Domain name system security and privacy: A contemporary survey
A Khormali, J Park, H Alasmary, A Anwar, M Saad, D Mohaisen
Computer Networks, 107699, 2020
On-line full probability distribution identification of arx model parameters based on bayesian approach
AH Valadkhani, A Khormali, MA Shoorehdeli, H Khaloozadeh, A Fatehi
IFAC-PapersOnLine 49 (7), 508-513, 2016
Corrigendum to “Domain name system security and privacy: A contemporary survey” Computer Networks Volume 185 (2020) 107699
A Khormali, J Park, H Alasmary, A Anwar, M Saad, D Mohaisen
Computer Networks 188, 107814, 2021
From Blue-Sky to Practical Adversarial Learning
A Khormali, A Abusnaina, S Chen, DH Nyang, D Mohaisen
2020 Second IEEE International Conference on Trust, Privacy and Security in …, 2020
DFD: Adversarial Learning-based Approach to Defend Against Website Fingerprinting
A Abusnaina, R Jang, A Khormali, DH Nyang, D Mohaisen
IEEE INFOCOM 2020-IEEE Conference on Computer Communications, 2459-2468, 2020
Generating Adversarial Examples with an Optimized Quality
A Khormali, DH Nyang, D Mohaisen
arXiv preprint arXiv:2007.00146, 2020
Developing a Robust Defensive System against Adversarial Examples Using Generative Adversarial Networks
S Taheri, A Khormali, M Salem, JS Yuan
Big Data and Cognitive Computing 4 (2), 11, 2020
The system can't perform the operation now. Try again later.
Articles 1–20