Mohammed Abuhamad
Cited by
Cited by
Large-scale and language-oblivious code authorship identification
M Abuhamad, T AbuHmed, A Mohaisen, DH Nyang
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications …, 2018
Code authorship identification using convolutional neural networks
M Abuhamad, J Rhim, T AbuHmed, S Ullah, S Kang, DH Nyang
Future Generation Computer Systems 95, 104-115, 2019
AUToSen: Deep Learning-based Implicit Continuous Authentication Using Smartphone Sensors
M Abuhamad, T Abuhmed, D Mohaisen, DH Nyang
IEEE Internet of Things Journal 7 (6), 5008-5020, 2020
Event-driven business intelligence approach for real-time integration of technical and fundamental analysis in forex market
M AbuHamad, M Mohd, J Salim
Journal of Computer Science 9 (4), 488, 2013
Sensor-based Continuous Authentication of Smartphones' Users Using Behavioral Biometrics: A Contemporary Survey
M Abuhamad, A Abusnaina, DH Nyang, D Mohaisen
IEEE Internet of Things Journal 8 (1), 65 - 84, 2021
Investigating online toxicity in users interactions with the mainstream media channels on YouTube
S Alshamrani, M Abuhamad, A Abusnaina, D Mohaisen
The 5th International Workshop on Mining Actionable Insights from Social …, 2020
W-Net: A CNN-based Architecture for White Blood Cells Image Classification
C Jung, M Abuhamad, J Alikhanov, A Mohaisen, K Han, DH Nyang
The AAAI 2019 Symposium on AI for Social Good, 2019
Chemical Rings Handwritten Recognition Based On Neural Network
N Hewahi, MN Nounou, MS Nassar, M AbuHamad, H AbuHamad
Ubiquitous Computing and Communication Journal 3 (3), 2008
Soteria: Detecting adversarial examples in control flow graph-based malware classifiers
H Alasmary, A Abusnaina, R Jang, M Abuhamad, A Anwar, DH Nyang, ...
2020 IEEE 40th International Conference on Distributed Computing Systems …, 2020
Subgraph-based Adversarial Examples Against Graph-based IoT Malware Detection Systems
A Abusnaina, H Alasmary, M Abuhamad, S Salem, D Nyang, M Aziz
In Proceedings of the 8th International Conference on Computational Data and …, 2019
Multi-χ: Identifying Multiple Authors from Source Code Files
M Abuhamad, T Abuhmed, DH Nyang, D Mohaisen
Proceedings on Privacy Enhancing Technologies 2020 (3), 25-41, 2020
Understanding the Proxy Ecosystem: A Comparative Analysis of Residential and Open Proxies on the Internet
J Choi, M Abuhamad, A Abusnaina, A Anwar, S Alshamrani, J Park, ...
IEEE Access 8, 111368-111380, 2020
ShellCore: Automating Malicious IoT Software Detection by Using Shell Commands Representation
H Alasmary, A Anwar, A Abusnaina, A Alabduljabbar, M Abuhamad, ...
arXiv preprint arXiv:2103.14221, 2021
An Exploration of Geo-temporal Characteristics of Users' Reactions on Social Media During the Pandemic
E Abdukhamidov, F Juraev, M Abuhamad, T AbuHmed
arXiv preprint arXiv:2103.13032, 2021
Hate, Obscenity, and Insults: Measuring the Exposure of Children to Inappropriate Comments in YouTube
S Alshamrani, A Abusnaina, M Abuhamad, D Nyang, D Mohaisen
arXiv preprint arXiv:2103.09050, 2021
An Analysis of Users Engagement on Twitter During the COVID-19 Pandemic: Topical Trends and Sentiments
S Alshamrani, A Abusnaina, M Abuhamad, A Lee, DH Nyang, ...
International Conference on Computational Data and Social Networks, 73-86, 2020
2020 Index IEEE Internet of Things Journal Vol. 7
M Aazam, H Abbas, A Abbasfar, M Abbasi, K Abboud, MS Abdalzaher, ...
IEEE Internet of Things Journal 7 (12), 2020
Deep Learning-based Fine-grained Hierarchical Learning Approach for Robust Malware Classification
A Abusnaina, M Abuhamad, H Alasmary, A Anwar, R Jang, S Salem, ...
arXiv preprint arXiv:2005.07145, 2020
Insights into Attacks’ Progression: Prediction of Spatio-Temporal Behavior of DDoS Attacks
A Abusnaina, M Abuhamad, DH Nyang, S Chen, A Wang, D Mohaisen
The 21st World Conference on Information Security Applications (WISA), 2020
DL-CAIS: Deep Learning-based Code Authorship Identification System.
M Abuhamad, T AbuHmed, A Mohaisen, DH Nyang
In Proceedings of Network and Distributed System Security Symposium, NDSS 2019, 2019
The system can't perform the operation now. Try again later.
Articles 1–20