Alert button
Picture for Ahmed Abusnaina

Ahmed Abusnaina

Alert button

Burning the Adversarial Bridges: Robust Windows Malware Detection Against Binary-level Mutations

Add code
Bookmark button
Alert button
Oct 05, 2023
Ahmed Abusnaina, Yizhen Wang, Sunpreet Arora, Ke Wang, Mihai Christodorescu, David Mohaisen

Viaarxiv icon

ML-based IoT Malware Detection Under Adversarial Settings: A Systematic Evaluation

Add code
Bookmark button
Alert button
Aug 30, 2021
Ahmed Abusnaina, Afsah Anwar, Sultan Alshamrani, Abdulrahman Alabduljabbar, RhongHo Jang, Daehun Nyang, David Mohaisen

Figure 1 for ML-based IoT Malware Detection Under Adversarial Settings: A Systematic Evaluation
Figure 2 for ML-based IoT Malware Detection Under Adversarial Settings: A Systematic Evaluation
Figure 3 for ML-based IoT Malware Detection Under Adversarial Settings: A Systematic Evaluation
Figure 4 for ML-based IoT Malware Detection Under Adversarial Settings: A Systematic Evaluation
Viaarxiv icon

Hate, Obscenity, and Insults: Measuring the Exposure of Children to Inappropriate Comments in YouTube

Add code
Bookmark button
Alert button
Mar 03, 2021
Sultan Alshamrani, Ahmed Abusnaina, Mohammed Abuhamad, Daehun Nyang, David Mohaisen

Figure 1 for Hate, Obscenity, and Insults: Measuring the Exposure of Children to Inappropriate Comments in YouTube
Figure 2 for Hate, Obscenity, and Insults: Measuring the Exposure of Children to Inappropriate Comments in YouTube
Figure 3 for Hate, Obscenity, and Insults: Measuring the Exposure of Children to Inappropriate Comments in YouTube
Figure 4 for Hate, Obscenity, and Insults: Measuring the Exposure of Children to Inappropriate Comments in YouTube
Viaarxiv icon

Sensor-based Continuous Authentication of Smartphones' Users Using Behavioral Biometrics: A Survey

Add code
Bookmark button
Alert button
Jan 23, 2020
Mohammed Abuhamad, Ahmed Abusnaina, DaeHun Nyang, David Mohaisen

Figure 1 for Sensor-based Continuous Authentication of Smartphones' Users Using Behavioral Biometrics: A Survey
Figure 2 for Sensor-based Continuous Authentication of Smartphones' Users Using Behavioral Biometrics: A Survey
Figure 3 for Sensor-based Continuous Authentication of Smartphones' Users Using Behavioral Biometrics: A Survey
Figure 4 for Sensor-based Continuous Authentication of Smartphones' Users Using Behavioral Biometrics: A Survey
Viaarxiv icon

COPYCAT: Practical Adversarial Attacks on Visualization-Based Malware Detection

Add code
Bookmark button
Alert button
Sep 20, 2019
Aminollah Khormali, Ahmed Abusnaina, Songqing Chen, DaeHun Nyang, Aziz Mohaisen

Figure 1 for COPYCAT: Practical Adversarial Attacks on Visualization-Based Malware Detection
Figure 2 for COPYCAT: Practical Adversarial Attacks on Visualization-Based Malware Detection
Figure 3 for COPYCAT: Practical Adversarial Attacks on Visualization-Based Malware Detection
Figure 4 for COPYCAT: Practical Adversarial Attacks on Visualization-Based Malware Detection
Viaarxiv icon

Examining Adversarial Learning against Graph-based IoT Malware Detection Systems

Add code
Bookmark button
Alert button
Feb 15, 2019
Ahmed Abusnaina, Aminollah Khormali, Hisham Alasmary, Jeman Park, Afsah Anwar, Ulku Meteriz, Aziz Mohaisen

Figure 1 for Examining Adversarial Learning against Graph-based IoT Malware Detection Systems
Figure 2 for Examining Adversarial Learning against Graph-based IoT Malware Detection Systems
Figure 3 for Examining Adversarial Learning against Graph-based IoT Malware Detection Systems
Viaarxiv icon