Aminollah Khormali
Aminollah Khormali
Ph.D. candidate, University of Central Florida (UCF)
knights.ucf.edu의 이메일 확인됨 - 홈페이지
Control chart pattern recognition using RBF neural network with new training algorithm and practical features
A Addeh, A Khormali, NA Golilarz
ISA transactions 79, 202-216, 2018
A novel approach for recognition of control chart patterns: Type-2 fuzzy clustering optimized support vector machine
A Khormali, J Addeh
ISA transactions 63, 256-264, 2016
Dine and dash: Static, dynamic, and economic analysis of in-browser cryptojacking
M Saad, A Khormali, A Mohaisen
2019 APWG Symposium on Electronic Crime Research (eCrime), 1-12, 2019
Analyzing and detecting emerging internet of things malware: A graph-based approach
H Alasmary, A Khormali, A Anwar, J Park, J Choi, A Abusnaina, A Awad, ...
IEEE Internet of Things Journal 6 (5), 8977-8988, 2019
Adversarial learning attacks on graph-based IoT malware detection systems
A Abusnaina, A Khormali, H Alasmary, J Park, A Anwar, A Mohaisen
2019 IEEE 39th International Conference on Distributed Computing Systems …, 2019
Optimization of brushless direct current motor design using an intelligent technique
A Shabanian, AAP Tousiwas, M Pourmandi, A Khormali, A Ataei
ISA transactions 57, 311-321, 2015
Identification of an industrial gas turbine based on Rowen's model and using Multi-Objective Optimization method
A Khormali, I Yousefi, H Yahyaei, SM Aliyari
2015 3rd RSI International Conference on Robotics and Mechatronics (ICROM …, 2015
COPYCAT: practical adversarial attacks on visualization-based malware detection
A Khormali, A Abusnaina, S Chen, DH Nyang, A Mohaisen
arXiv preprint arXiv:1909.09735, 2019
Where are you taking me? behavioral analysis of open dns resolvers
J Park, A Khormali, M Mohaisen, A Mohaisen
2019 49th Annual IEEE/IFIP International Conference on Dependable Systems …, 2019
Gas turbine fault detection and identification by using fuzzy clustering methods
AO Khormali, MA Sh
2014 Second RSI/ISM International Conference on Robotics and Mechatronics …, 2014
Examining the robustness of learning-based ddos detection in software defined networks
A Abusnaina, A Khormali, DH Nyang, M Yuksel, A Mohaisen
2019 IEEE Conference on Dependable and Secure Computing (DSC), 1-8, 2019
Understanding the hidden cost of software vulnerabilities: Measurements and predictions
A Anwar, A Khormali, DH Nyang, A Mohaisen
International Conference on Security and Privacy in Communication Systems …, 2018
Transcreen: transfer learning on graph-based anti-cancer virtual screening model
M Salem, A Khormali, AK Arshadi, J Webb, JS Yuan
Big Data and Cognitive Computing 4 (3), 16, 2020
Domain name system security and privacy: A contemporary survey
A Khormali, J Park, H Alasmary, A Anwar, M Saad, D Mohaisen
Computer Networks, 107699, 2020
On-line full probability distribution identification of arx model parameters based on bayesian approach
AH Valadkhani, A Khormali, MA Shoorehdeli, H Khaloozadeh, A Fatehi
IFAC-PapersOnLine 49 (7), 508-513, 2016
From Blue-Sky to Practical Adversarial Learning
A Khormali, A Abusnaina, S Chen, DH Nyang, D Mohaisen
2020 Second IEEE International Conference on Trust, Privacy and Security in …, 2020
DFD: Adversarial Learning-based Approach to Defend Against Website Fingerprinting
A Abusnaina, R Jang, A Khormali, DH Nyang, D Mohaisen
IEEE INFOCOM 2020-IEEE Conference on Computer Communications, 2459-2468, 2020
Generating Adversarial Examples with an Optimized Quality
A Khormali, DH Nyang, D Mohaisen
arXiv preprint arXiv:2007.00146, 2020
Developing a Robust Defensive System against Adversarial Examples Using Generative Adversarial Networks
S Taheri, A Khormali, M Salem, JS Yuan
Big Data and Cognitive Computing 4 (2), 11, 2020
2020 Second IEEE International Conference on Trust, Privacy and Security in Intelligent Systems and Applications (TPS-ISA)| 978-1-7281-8543-9/20/$31.00© 2020 IEEE| DOI: 10.1109 …
S Abuadbba, A Abusnaina, GJ Ahn, A Al-Alaj, M Anisetti, CA Ardagna, ...
현재 시스템이 작동되지 않습니다. 나중에 다시 시도해 주세요.
학술자료 1–20