Muhammad Ejaz Ahmed
Muhammad Ejaz Ahmed
CSIRO's Data61
Potvrđena adresa e-pošte na
DDoS attack mitigation in Internet of Things using software defined networking
ME Ahmed, H Kim
2017 IEEE third international conference on big data computing service and …, 2017
Void: A fast and light voice liveness detection system
ME Ahmed, IY Kwak, JH Huh, I Kim, T Oh, H Kim
29th USENIX Security Symposium (USENIX Security 20), 2685-2702, 2020
Statistical application fingerprinting for DDoS attack mitigation
ME Ahmed, S Ullah, H Kim
IEEE Transactions on Information Forensics and Security 14 (6), 1471-1484, 2018
Mitigating DNS query-based DDoS attacks with machine learning on software-defined networking
ME Ahmed, H Kim, M Park
MILCOM 2017-2017 IEEE Military Communications Conference (MILCOM), 11-16, 2017
Transformer-based language models for software vulnerability detection
C Thapa, SI Jang, ME Ahmed, S Camtepe, J Pieprzyk, S Nepal
Proceedings of the 38th Annual Computer Security Applications Conference …, 2022
Backdoor attack on machine learning based android malware detectors
C Li, X Chen, D Wang, S Wen, ME Ahmed, S Camtepe, Y Xiang
IEEE Transactions on dependable and secure computing 19 (5), 3357-3370, 2021
Preventing DNS amplification attacks using the history of DNS queries with SDN
S Kim, S Lee, G Cho, ME Ahmed, J Jeong, H Kim
Computer Security–ESORICS 2017: 22nd European Symposium on Research in …, 2017
Peeler: Profiling kernel-level events to detect ransomware
ME Ahmed, H Kim, S Camtepe, S Nepal
Computer Security–ESORICS 2021: 26th European Symposium on Research in …, 2021
Energy-arrival-aware detection threshold in wireless-powered cognitive radio networks
ME Ahmed, DI Kim, JY Kim, Y Shin
IEEE Transactions on Vehicular Technology 66 (10), 9201-9213, 2017
Sensing-transmission edifice using bayesian nonparametric traffic clustering in cognitive radio networks
ME Ahmed, JB Song, Z Han, DY Suh
IEEE Transactions on Mobile Computing 13 (9), 2141-2155, 2013
Resource optimization scheme for multimedia-enabled wireless mesh networks
A Ali, ME Ahmed, MJ Piran, DY Suh
Sensors 14 (8), 14500-14525, 2014
Vuldebert: A vulnerability detection system using bert
S Kim, J Choi, ME Ahmed, S Nepal, H Kim
2022 IEEE International Symposium on Software Reliability Engineering …, 2022
Traffic-aware optimal spectral access in wireless powered cognitive radio networks
ME Ahmed, DI Kim, KW Choi
IEEE Transactions on Mobile Computing 17 (3), 733-745, 2017
Medusa: Malware detection using statistical analysis of system's behavior
ME Ahmed, S Nepal, H Kim
2018 IEEE 4th International Conference on Collaboration and Internet …, 2018
Mitigating malicious attacks using Bayesian nonparametric clustering in collaborative cognitive radio networks
ME Ahmed, JB Song, Z Han
2014 IEEE Global Communications Conference, 999-1004, 2014
Optimal spectrum sensing policy in RF-powered cognitive radio networks
HS Lee, ME Ahmed, DI Kim
IEEE Transactions on Vehicular Technology 67 (10), 9557-9570, 2018
Nonparametric Bayesian identification of primary users' payloads in cognitive radio networks
ME Ahmed, JB Song, NT Nguyen, Z Han
2012 IEEE International Conference on Communications (ICC), 1586-1591, 2012
Decamouflage: A framework to detect image-scaling attacks on CNN
B Kim, A Abuadbba, Y Gao, Y Zheng, ME Ahmed, S Nepal, H Kim
2021 51st Annual IEEE/IFIP International Conference on Dependable Systems …, 2021
Synthesis, characterization and performance evaluation of poly octadecyl methacrylate and poly octadecyl methacrylatecomethylmethacrylate as an additive for lubricating oil
M Ahmed, A Mohammed, M Ahamad
IOSR journal of applied chemistry 10 (04), 50-58, 2017
Poster: Adversarial examples for classifiers in high-dimensional network data
ME Ahmed, H Kim
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications …, 2017
Sustav trenutno ne može provesti ovu radnju. Pokušajte ponovo kasnije.
Članci 1–20