Follow
Ahmed Abusnaina
Ahmed Abusnaina
ML Research Scientist, Meta
Verified email at fb.com
Title
Cited by
Cited by
Year
Sensor-based continuous authentication of smartphones’ users using behavioral biometrics: A contemporary survey
M Abuhamad, A Abusnaina, DH Nyang, D Mohaisen
IEEE Internet of Things Journal 8 (1), 65-84, 2020
1802020
Analyzing and detecting emerging Internet of Things malware: A graph-based approach
H Alasmary, A Khormali, A Anwar, J Park, J Choi, A Abusnaina, A Awad, ...
IEEE Internet of Things Journal 6 (5), 8977-8988, 2019
1532019
Adversarial learning attacks on graph-based IoT malware detection systems
A Abusnaina, A Khormali, H Alasmary, J Park, A Anwar, A Mohaisen
2019 IEEE 39th international conference on distributed computing systems …, 2019
1012019
Cleaning the NVD: Comprehensive quality assessment, improvements, and analyses
A Anwar, A Abusnaina, S Chen, F Li, D Mohaisen
IEEE Transactions on Dependable and Secure Computing 19 (6), 4255-4269, 2021
782021
Adversarial example detection using latent neighborhood graph
A Abusnaina, Y Wu, S Arora, Y Wang, F Wang, H Yang, D Mohaisen
Proceedings of the IEEE/CVF International Conference on Computer Vision …, 2021
622021
Soteria: Detecting adversarial examples in control flow graph-based malware classifiers
H Alasmary, A Abusnaina, R Jang, M Abuhamad, A Anwar, DH Nyang, ...
2020 IEEE 40th International Conference on Distributed Computing Systems …, 2020
542020
Dfd: Adversarial learning-based approach to defend against website fingerprinting
A Abusnaina, R Jang, A Khormali, DH Nyang, D Mohaisen
IEEE INFOCOM 2020-IEEE Conference on Computer Communications, 2459-2468, 2020
512020
Dl-fhmc: Deep learning-based fine-grained hierarchical learning approach for robust malware classification
A Abusnaina, M Abuhamad, H Alasmary, A Anwar, R Jang, S Salem, ...
IEEE Transactions on Dependable and Secure Computing 19 (5), 3432-3447, 2021
482021
From blue-sky to practical adversarial learning
A Khormali, A Abusnaina, S Chen, DH Nyang, D Mohaisen
2020 Second IEEE International Conference on Trust, Privacy and Security in …, 2020
39*2020
Hate, obscenity, and insults: Measuring the exposure of children to inappropriate comments in youtube
S Alshamrani, A Abusnaina, M Abuhamad, D Nyang, D Mohaisen
Companion proceedings of the web conference 2021, 508-515, 2021
362021
Investigating Online Toxicity in Users Interactions with the Mainstream Media Channels on YouTube.
S Alshamrani, M Abuhamad, A Abusnaina, D Mohaisen
CIKM (Workshops), 2020
292020
TLDR: deep learning-based automated privacy policy annotation with key policy highlights
A Alabduljabbar, A Abusnaina, Ü Meteriz-Yildiran, D Mohaisen
Proceedings of the 20th Workshop on Workshop on Privacy in the Electronic …, 2021
232021
Subgraph-based adversarial examples against graph-based IoT malware detection systems
A Abusnaina, H Alasmary, M Abuhamad, S Salem, DH Nyang, ...
Computational Data and Social Networks: 8th International Conference, CSoNet …, 2019
222019
Examining the robustness of learning-based ddos detection in software defined networks
A Abusnaina, A Khormali, DH Nyang, M Yuksel, A Mohaisen
2019 IEEE Conference on Dependable and Secure Computing (DSC), 1-8, 2019
212019
Hiding in plain sight: A measurement and analysis of kids’ exposure to malicious urls on youtube
S Alshamrani, A Abusnaina, D Mohaisen
2020 IEEE/ACM Symposium on Edge Computing (SEC), 321-326, 2020
182020
Understanding the proxy ecosystem: A comparative analysis of residential and open proxies on the internet
J Choi, M Abuhamad, A Abusnaina, A Anwar, S Alshamrani, J Park, ...
IEEE Access 8, 111368-111380, 2020
152020
Automated privacy policy annotation with information highlighting made practical using deep representations
A Alabduljabbar, A Abusnaina, Ü Meteriz-Yildiran, D Mohaisen
Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications …, 2021
112021
SHELLCORE: Automating malicious IoT software detection using shell commands representation
H Alasmary, A Anwar, A Abusnaina, A Alabduljabbar, M Abuhamad, ...
IEEE Internet of Things Journal 9 (4), 2485-2496, 2021
112021
Self-adaptive mussels wandering optimization algorithm with application for artificial neural network training
AA Abusnaina, R Abdullah, A Kattan
Journal of Intelligent Systems 29 (1), 345-363, 2019
112019
Poster: Examining Adversarial Learning against Graph-based IoT Malware Detection Systems
A Abusnaina, A Khormali, H Alasmary, J Park, A Anwar, U Meteriz, ...
11*
The system can't perform the operation now. Try again later.
Articles 1–20