DDoS attack mitigation in Internet of Things using software defined networking ME Ahmed, H Kim 2017 IEEE third international conference on big data computing service and …, 2017 | 113 | 2017 |
Void: A fast and light voice liveness detection system ME Ahmed, IY Kwak, JH Huh, I Kim, T Oh, H Kim 29th USENIX Security Symposium (USENIX Security 20), 2685-2702, 2020 | 99 | 2020 |
Statistical application fingerprinting for DDoS attack mitigation ME Ahmed, S Ullah, H Kim IEEE Transactions on Information Forensics and Security 14 (6), 1471-1484, 2018 | 93 | 2018 |
Transformer-based language models for software vulnerability detection C Thapa, SI Jang, ME Ahmed, S Camtepe, J Pieprzyk, S Nepal Proceedings of the 38th Annual Computer Security Applications Conference …, 2022 | 88 | 2022 |
Mitigating DNS query-based DDoS attacks with machine learning on software-defined networking ME Ahmed, H Kim, M Park MILCOM 2017-2017 IEEE Military Communications Conference (MILCOM), 11-16, 2017 | 73 | 2017 |
Backdoor attack on machine learning based android malware detectors C Li, X Chen, D Wang, S Wen, ME Ahmed, S Camtepe, Y Xiang IEEE Transactions on dependable and secure computing 19 (5), 3357-3370, 2021 | 62 | 2021 |
Preventing DNS amplification attacks using the history of DNS queries with SDN S Kim, S Lee, G Cho, ME Ahmed, J Jeong, H Kim Computer Security–ESORICS 2017: 22nd European Symposium on Research in …, 2017 | 39 | 2017 |
Peeler: Profiling kernel-level events to detect ransomware ME Ahmed, H Kim, S Camtepe, S Nepal Computer Security–ESORICS 2021: 26th European Symposium on Research in …, 2021 | 38 | 2021 |
Vuldebert: A vulnerability detection system using bert S Kim, J Choi, ME Ahmed, S Nepal, H Kim 2022 IEEE International Symposium on Software Reliability Engineering …, 2022 | 36 | 2022 |
Energy-arrival-aware detection threshold in wireless-powered cognitive radio networks ME Ahmed, DI Kim, JY Kim, Y Shin IEEE Transactions on Vehicular Technology 66 (10), 9201-9213, 2017 | 29 | 2017 |
Sensing-transmission edifice using bayesian nonparametric traffic clustering in cognitive radio networks ME Ahmed, JB Song, Z Han, DY Suh IEEE Transactions on Mobile Computing 13 (9), 2141-2155, 2013 | 22 | 2013 |
Resource optimization scheme for multimedia-enabled wireless mesh networks A Ali, ME Ahmed, MJ Piran, DY Suh Sensors 14 (8), 14500-14525, 2014 | 21 | 2014 |
Evolving techniques in cyber threat hunting: A systematic review A Mahboubi, K Luong, H Aboutorab, HT Bui, G Jarrad, M Bahutair, ... Journal of Network and Computer Applications, 104004, 2024 | 19 | 2024 |
Traffic-aware optimal spectral access in wireless powered cognitive radio networks ME Ahmed, DI Kim, KW Choi IEEE Transactions on Mobile Computing 17 (3), 733-745, 2017 | 17 | 2017 |
Medusa: Malware detection using statistical analysis of system's behavior ME Ahmed, S Nepal, H Kim 2018 IEEE 4th International Conference on Collaboration and Internet …, 2018 | 16 | 2018 |
Mitigating malicious attacks using Bayesian nonparametric clustering in collaborative cognitive radio networks ME Ahmed, JB Song, Z Han 2014 IEEE Global Communications Conference, 999-1004, 2014 | 15 | 2014 |
Decamouflage: A framework to detect image-scaling attacks on CNN B Kim, A Abuadbba, Y Gao, Y Zheng, ME Ahmed, S Nepal, H Kim 2021 51st Annual IEEE/IFIP International Conference on Dependable Systems …, 2021 | 14* | 2021 |
Optimal spectrum sensing policy in RF-powered cognitive radio networks HS Lee, ME Ahmed, DI Kim IEEE Transactions on Vehicular Technology 67 (10), 9557-9570, 2018 | 14 | 2018 |
Nonparametric Bayesian identification of primary users' payloads in cognitive radio networks ME Ahmed, JB Song, NT Nguyen, Z Han 2012 IEEE International Conference on Communications (ICC), 1586-1591, 2012 | 14 | 2012 |
Transformer-based language models for software vulnerability detection: Performance, model's security and platforms C Thapa, SI Jang, ME Ahmed, S Camtepe, J Pieprzyk, S Nepal CoRR, 2022 | 12 | 2022 |