Follow
Muhammad Ejaz Ahmed
Muhammad Ejaz Ahmed
CSIRO's Data61
Verified email at data61.csiro.au
Title
Cited by
Cited by
Year
DDoS attack mitigation in Internet of Things using software defined networking
ME Ahmed, H Kim
2017 IEEE third international conference on big data computing service and …, 2017
1082017
Void: A fast and light voice liveness detection system
ME Ahmed, IY Kwak, JH Huh, I Kim, T Oh, H Kim
29th USENIX Security Symposium (USENIX Security 20), 2685-2702, 2020
892020
Statistical application fingerprinting for DDoS attack mitigation
ME Ahmed, S Ullah, H Kim
IEEE Transactions on Information Forensics and Security 14 (6), 1471-1484, 2018
872018
Mitigating DNS query-based DDoS attacks with machine learning on software-defined networking
ME Ahmed, H Kim, M Park
MILCOM 2017-2017 IEEE Military Communications Conference (MILCOM), 11-16, 2017
672017
Transformer-based language models for software vulnerability detection
C Thapa, SI Jang, ME Ahmed, S Camtepe, J Pieprzyk, S Nepal
Proceedings of the 38th Annual Computer Security Applications Conference …, 2022
572022
Backdoor attack on machine learning based android malware detectors
C Li, X Chen, D Wang, S Wen, ME Ahmed, S Camtepe, Y Xiang
IEEE Transactions on dependable and secure computing 19 (5), 3357-3370, 2021
472021
Preventing DNS amplification attacks using the history of DNS queries with SDN
S Kim, S Lee, G Cho, ME Ahmed, J Jeong, H Kim
Computer Security–ESORICS 2017: 22nd European Symposium on Research in …, 2017
372017
Peeler: Profiling kernel-level events to detect ransomware
ME Ahmed, H Kim, S Camtepe, S Nepal
Computer Security–ESORICS 2021: 26th European Symposium on Research in …, 2021
342021
Energy-arrival-aware detection threshold in wireless-powered cognitive radio networks
ME Ahmed, DI Kim, JY Kim, Y Shin
IEEE Transactions on Vehicular Technology 66 (10), 9201-9213, 2017
292017
Sensing-transmission edifice using bayesian nonparametric traffic clustering in cognitive radio networks
ME Ahmed, JB Song, Z Han, DY Suh
IEEE Transactions on Mobile Computing 13 (9), 2141-2155, 2013
222013
Resource optimization scheme for multimedia-enabled wireless mesh networks
A Ali, ME Ahmed, MJ Piran, DY Suh
Sensors 14 (8), 14500-14525, 2014
212014
Vuldebert: A vulnerability detection system using bert
S Kim, J Choi, ME Ahmed, S Nepal, H Kim
2022 IEEE International Symposium on Software Reliability Engineering …, 2022
192022
Traffic-aware optimal spectral access in wireless powered cognitive radio networks
ME Ahmed, DI Kim, KW Choi
IEEE Transactions on Mobile Computing 17 (3), 733-745, 2017
172017
Medusa: Malware detection using statistical analysis of system's behavior
ME Ahmed, S Nepal, H Kim
2018 IEEE 4th International Conference on Collaboration and Internet …, 2018
142018
Mitigating malicious attacks using Bayesian nonparametric clustering in collaborative cognitive radio networks
ME Ahmed, JB Song, Z Han
2014 IEEE Global Communications Conference, 999-1004, 2014
142014
Optimal spectrum sensing policy in RF-powered cognitive radio networks
HS Lee, ME Ahmed, DI Kim
IEEE Transactions on Vehicular Technology 67 (10), 9557-9570, 2018
132018
Nonparametric Bayesian identification of primary users' payloads in cognitive radio networks
ME Ahmed, JB Song, NT Nguyen, Z Han
2012 IEEE International Conference on Communications (ICC), 1586-1591, 2012
132012
Decamouflage: A framework to detect image-scaling attacks on CNN
B Kim, A Abuadbba, Y Gao, Y Zheng, ME Ahmed, S Nepal, H Kim
2021 51st Annual IEEE/IFIP International Conference on Dependable Systems …, 2021
12*2021
Synthesis, characterization and performance evaluation of poly octadecyl methacrylate and poly octadecyl methacrylatecomethylmethacrylate as an additive for lubricating oil
M Ahmed, A Mohammed, M Ahamad
IOSR journal of applied chemistry 10 (04), 50-58, 2017
122017
Poster: Adversarial examples for classifiers in high-dimensional network data
ME Ahmed, H Kim
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications …, 2017
102017
The system can't perform the operation now. Try again later.
Articles 1–20