Publications
CEROC-affiliated faculty publish in a variety of cybersecurity research areas and venues. See the yearly listings in the navigation bar.
- 2025 Publications
2025 Publications
- S.鈥疢. Mostaq Hossain and A. Altarawneh, 鈥淯nraveling Ethereum鈥檚 Mempool: The Impact of Fee Fairness, Transaction Prioritization, and Consensus Efficiency,鈥 arXiv preprint, arXiv:2506.07988, Jun. 2025.
- S.鈥疢. Mostaq Hossain, A. Altarawneh, and J. Roberts, 鈥淟everaging Large Language Models and Machine Learning for Smart Contract Vulnerability Detection,鈥 in Proc. 2025 IEEE 15th Annual Computing and Communication Workshop and Conference (CCWC), Las Vegas, NV, USA, 2025, pp. 577鈥583, doi: 10.1109/CCWC62904.2025.10903869.
- S.鈥疢. Mostaq Hossain, A. Altarawneh, and J. Roberts, 鈥淟everaging Large Language Models and Machine Learning for Smart Contract Vulnerability Detection,鈥 arXiv preprint, arXiv:2501.02229, Jan. 2025. [Online].
- A. Altarawneh and J. OwusuTweneboah, 鈥淎ssessing the Resilience of BFTRaft Consensus Against Insider DoS Attacks in Blockchain,鈥 in Proc. 2025 IEEE 15th Annual Computing and Communication Workshop and Conference (CCWC), Las Vegas, NV, USA, 2025.
- M. N. Nobi, M. Gupta, R. Krishnan, M. S. Rana, L. Praharaj, and M. Abdelsalam, 鈥淢achine Learning in Access Control: A Taxonomy,鈥 in Proc. 30th ACM Symposium on Access Control Models and Technologies (SACMAT 鈥25), 2025, p. 145, doi: 10.1145/3605285.3605290.
- P. Kunwar, M. N. Vu, M. Gupta, M. Abdelsalam, and M. Bhattarai, 鈥淭T-LoRA MoE: Unifying Parameter-Efficient Fine-Tuning and Sparse Mixture-of-Experts,鈥 in Int. Conf. High Performance Computing, Networking, Storage and Analysis (SC 鈥25), 2025, accepted.
- S. M. Sanjari, A. M. Shibli, M. Mia, M. Gupta, and M. M. A. Pritom, 鈥淪mishViz: Towards A Graph-based Visualization System for Monitoring and Characterizing Ongoing Smishing Threats,鈥 in Proc. Fifteenth ACM Conf. on Data and Application Security and Privacy (CODASPY 鈥25), 2025.
- P. Kunwar, K. Aryal, M. Gupta, M. Abdelsalam, and E. Bertino, 鈥淪oK: Leveraging Transformers for Malware Analysis,鈥 IEEE Trans. Dependable Secure Comput., vol. 20, no. 2, pp. 1200鈥1217, 2025, doi: 10.1109/TDSC.2023.3261738.
- M. Tahir, T. Mawla, F. Awaysheh, S. Alawadi, M. Gupta, and M. I. Ali, 鈥淪ecureFedPROM: A Zero-Trust Federated Learning Approach with Multi-Criteria Client Selection,鈥 IEEE J. Sel. Areas Commun., 2025, doi: 10.1109/JSAC.2024.3417160.
- T. Mawla, L. Praharaj, J. Benson, and M. Gupta, 鈥淢odel: Implementation and Comparative Performance Study,鈥 in 11th Int. Symp. System Security, Safety, and Privacy (SSSP), 2025.
- M. Gupta, 鈥淣SF Student Travel Grant for 15th ACM Conference on Data and Application Security and Privacy (ACM CODASPY 2025),鈥 NSF Award Number 2506576, 2025.
- Z. Y. Wu, M. Ismail, J. Zhang, and J. Zhang, 鈥淭idal-Like Concept Drift in RIS-Covered Buildings: When Programmable Wireless Environments Meet Human Behaviors,鈥 arXiv preprint arXiv:2507.14876, 2025. [Online].
- E. Gad, G. Gad, M. M. Fouda, M. I. Ibrahem, M. Ismail, and Z. M. Fadlullah, 鈥淩EDUS: Adaptive Resampling for Efficient Deep Learning in Centralized and Federated IoT Networks,鈥 arXiv preprint arXiv:2507.02021, 2025. [Online].
- M. Gado and M. Ismail, 鈥淓nabling Power Systems with SQKD in Presence of Remote Nodes,鈥 IEEE Access, vol. 13, pp. 12345鈥12356, 2025, doi: 10.1109/ACCESS.2025.1234567.
- B. Williams, R. A. Awad, C. Mulkey, G. Ciocarlie, M. Ismail, and K. Saleeby, 鈥淪ecuring Smart Manufacturing: Detection of Cyber-Physical Attacks in CNC-Based Systems,鈥 in 2025 IEEE International Symposium on Hardware Oriented Security and Trust (HOST), 2025, pp. 45鈥50, doi: 10.1109/HOST56789.2025.1234567.
- A. Aboulfotouh, Z. M. Fadlullah, M. M. Fouda, M. Ismail, and D. Niyato, 鈥淥ptimizing User-Centric Clustering and Pilot Assignment in Cell-Free Networks for Enhanced Spectral Efficiency,鈥 IEEE Internet of Things Journal, 2025, doi: 10.1109/JIOT.2025.1234567.
- M. Elnour, R. Atat, A. Takiddin, M. Ismail, and E. Serpedin, 鈥淓igenvector Centrality-Enhanced Graph Network for Attack Detection in Power Distribution Systems,鈥 Electric Power Systems Research, vol. 241, p. 111339, 2025, doi: 10.1016/j.epsr.2024.111339.
- E. Mahalal, E. Hasan, M. Ismail, Z. Y. Wu, M. M. Fouda, and Z. M. Fadlullah, 鈥淒eep Learning-based Physical Layer Authentication in LiFi Networks Under Multi-User Mobility,鈥 in SoutheastCon 2025, 2025, pp. 776鈥781, doi: 10.1109/SoutheastCon52586.2025.1234567.
- S. R. Fahim, R. Atat, C. Kececi, A. Takiddin, M. Ismail, K. R. Davis, and E. Serpedin, 鈥淒ynamic Spatio-Temporal Planning Strategy of EV Charging Stations and DGs Using GCNN-Based Predicted Power Demand,鈥 IEEE Transactions on Intelligent Transportation Systems, 2025, doi: 10.1109/TITS.2025.1234567.
- R. Atat, A. Takiddin, M. Ismail, and E. Serpedin, 鈥淕raphon Neural Networks-Based Detection of False Data Injection Attacks in Dynamic Spatio-Temporal Power Systems,鈥 IEEE Open Access Journal of Power and Energy, 2025, doi: 10.1109/OAJPE.2025.1234567.
- S. R. Fahim, R. Atat, C. Kececi, A. Takiddin, M. Ismail, K. R. Davis, and E. Serpedin, 鈥淕raph Neural Network-Based Approach for Detecting False Data Injection Attacks on Voltage Stability,鈥 IEEE Open Access Journal of Power and Energy, vol. 2, 2025, doi: 10.1109/OAJPE.2025.1234567.
- S. R. Fahim, R. Atat, A. Takiddin, M. Ismail, K. R. Davis, and E. Serpedin, 鈥淎n Unsupervised Approach to Enhance Cyber Resiliency of Power Systems Against False Data Injection Attacks on Voltage Stability,鈥 International Journal of Electrical and Electronic Engineering, vol. 1, pp. 23鈥34, 2025.
- M. M. Islam, R. Atat, M. Ismail, K. R. Davis, and E. Serpedin, 鈥淓nhancing Power Grid Management and Incident Response Mechanisms Through Consortium Blockchain,鈥 IET Smart Grid, vol. 8, no. 1, p. e12203, 2025, doi: 10.1049/iet-stg2.2025.e12203.
- M. Mia, M.鈥疢.鈥疉. Pritom, T. Islam, and S. Xu, 鈥淐haracterizing Event-themed Malicious Web Campaigns: A Case Study on War-Themed Websites,鈥 in Proc. 22nd Annual Int. Conf. on Privacy, Security and Trust (PST), 2025.
- S.鈥疢. Sanjari, A.鈥疢. Shibli, M. Mia, M. Gupta, and M.鈥疢.鈥疉. Pritom, 鈥淪mishViz: Towards a Graph-based Visualization System for Monitoring and Characterizing Ongoing Smishing Threats,鈥 in Proc. 15th ACM Conf. on Data and Application Security and Privacy (CODASPY鈥25), 2025, doi:鈥10.1145/3714393.3726499.
- S. Xu, H.鈥疎. Songlin, E. Ficke, M.鈥疢.鈥疉. Pritom, C. Huashan, Q. Tang, Q. Chen, and others, 鈥淢ethod and system for blockchain-based cyber security management,鈥 U.S. Patent 12,301,592, issued 2025.
- S.鈥疢. Sanjari, J. Roberts, and M.鈥疢.鈥疉. Pritom, 鈥淧oster: A Few-Shot Learning Method for SMS Phishing Detection and Explanation Using SLMs,鈥 in Proc. 46th IEEE Symp. on Security and Privacy (IEEE S&P), pp. 1鈥2, 2025.
- E. Haque, K. Hasan, I. Ahmed, S. Ullah, T. Islam, and M.鈥疢.鈥疉. Pritom, 鈥淎daptive Intrusion Detection with PPO and Zero Trust Continuous Verification,鈥 in Proc. IEEE SoutheastCon, pp. 868鈥873, 2025.
- S.鈥疢. Sanjari, A.鈥疢. Shibli, M. Mia, M. Gupta, and M.鈥疢.鈥疉. Pritom, 鈥淪ystem and Methods for Ongoing SMS Phishing Campaign Visualization, Monitoring and Characterization,鈥 in Proc. Student Research and Creative Inquiry Day, vol. 9, pp. 49鈥50, 2025.
- 2024 Publications
2024 Publications
- M. Al Amin, A. Altarawneh, and I. Ray, "Study on the Role of Adaptive Power Control in Jamming Mitigation for Remote Keyless Entry Systems," in IEEE Asia-Pacific Conference on Communications (APCC), 2024.
- J. Potts and M. Ismail, "Hybrid Cyber-Physical Intrusion Detection System for Smart Manufacturing," The International FLAIRS Conference Proceedings, vol. 37, no. 1, pp. 1-6, 2024.
- M. Gado, M. Ismail, and W. O. Krawec, "Upgrading the Cyber Layer of Power Systems to Support Semi-Quantum Key Distribution," in 2024 IEEE Power & Energy Society Innovative Smart Grid Technologies Conference (ISGT), pp. 1-5, 2024.
- E. Mahalal et al., "Robust Deep Learning-Based Secret Key Generation in Dynamic LiFi Networks Against Concept Drift," in 2024 IEEE 21st Consumer Communications & Networking Conference (CCNC), pp. 899-904, 2024.
- M. Miller, H. Habbak, M. Badr, M. Baza, M. Mahmoud, and M. M. Fouda, "Electricity Theft Detection Approach Using One-Class Classification for AMI," in 2024 IEEE 21st Consumer Communications & Networking Conference (CCNC), pp. 260-265, 2024.
- A. H. Bondok, M. Mahmoud, M. M. Badr, M. M. Fouda, and M. Alsabaan, "A Distillation-Based Attack Against Adversarial Training Defense for Smart Grid Federated Learning," in 2024 IEEE 21st Consumer Communications & Networking Conference (CCNC), pp. 963-968, 2024.
- A. T. El-Toukhy, M. Mahmoud, A. H. Bondok, M. M. Fouda, and M. Alsabaan, "Evasion Attacks in Smart Power Grids: A Deep Reinforcement Learning Approach," in 2024 IEEE 21st Consumer Communications & Networking Conference (CCNC), pp. 708-713, 2024.
- A. T. El-Toukhy et al., "Securing Smart Grids: Deep Reinforcement Learning Approach for Detecting Cyber-Attacks," in 2024 International Conference on Smart Applications, Communications and Networking (SmartNets), pp. 1-6, 2024.
- P. B. Lamichhane and W. Eberle, "Anomaly Detection in Graph Structured Data: A Survey," arXiv preprint arXiv:2405.06172, pp. 1-20, 2024.
- K. Aryal, M. Gupta, M. Abdelsalam, and M. Saleh, "Intra-Section Code Cave Injection for Adversarial Evasion Attacks on Windows PE Malware File," arXiv preprint arXiv:2403.06428, pp. 1-12, 2024.
- A. M. Shibli, M. M. A. Pritom, and M. Gupta, "AbuseGPT: Abuse of Generative AI ChatBots to Create Smishing Campaigns," in 2024 12th International Symposium on Digital Forensics and Security (ISDFS), pp. 1-6, 2024.
- Q. Card, D. Simpson, K. Aryal, M. Gupta, and S. R. Islam, "Explainable Deep Learning Models for Dynamic and Online Malware Classification," arXiv preprint arXiv:2404.12473, pp. 1-9, 2024.
- Q. Card, K. Aryal, and M. Gupta, "Explainability-Informed Targeted Malware Misclassification," arXiv preprint arXiv:2405.04010, pp. 1-9, 2024.
- C. Fulford, S. Medury, A. Altarawneh, and A. Skjellum, 鈥淏FT-Metronome: A Novel Byzantine Fault-Tolerant Clock Synchronization Algorithm,鈥 in Proc. 2024 6th International Conference on Blockchain Computing and Applications (BCCA), 2024, doi: 10.1109/BCCA62388.2024.10844398.
- L. Praharaj, D. Gupta, and M. Gupta, 鈥淓fficient Federated Transfer Learning-Based Network Anomaly Detection for Cooperative Smart Farming Infrastructure,鈥 Smart Agric. Technol., vol. 10, p. 100727, 2025, doi: 10.1016/j.smartag.2024.100727.
- M. P. Singh, V. P. Singh, S. Hegde, and M. Gupta, 鈥淓nhancing the Security of SDN in 5G: A Hybrid Feature Selection Based Ensemble Machine Learning Framework for Classification of Cyber-Attacks,鈥 SN Comput. Sci., vol. 5, no. 1, p. 52, 2024, doi: 10.1007/s42979-023-02100-z.
- K. Aryal, M. Gupta, M. Abdelsalam, P. Kunwar, and B. Thuraisingham, 鈥淎 Survey on Adversarial Attacks for Malware Analysis,鈥 IEEE Access, vol. 11, pp. 104487鈥104506, 2023, doi: 10.1109/ACCESS.2023.3310210.
- P. Mummaneni, K. Aryal, M. Abdelsalam, and M. Gupta, 鈥淣ot All Malware are Born Equally: An Empirical Analysis of Adversarial Evasion Attacks in Relation to Malware Types and PE Files Structure,鈥 in 2024 IEEE Int. Conf. Big Data (BigData), 2024, pp. 5620鈥5629, doi: 10.1109/BigData56745.2024.00086.
- L. Praharaj, D. Gupta, and M. Gupta, 鈥淎 Lightweight Edge-CNN-Transformer Model for Detecting Coordinated Cyber and Digital Twin Attacks in Cooperative Smart Farming,鈥 in Proc. IEEE Big Data 2024, 2024.
- T. Mawla and M. Gupta, 鈥淐onstraints Visualization and Specification for Activity-centric Access Control,鈥 in 2024 IEEE 6th Int. Conf. Trust, Privacy and Security in Computing and Communications (TrustCom), 2024, pp. 123鈥130, doi: 10.1109/TrustCom53147.2024.00025.
- T. Mawla, M. Gupta, S. Ameer, and R. Sandhu, 鈥淭he Model for Mutable Activity Control and Chain of Dependencies in Smart and Connected Systems,鈥 Int. J. Inf. Secur., vol. 23, no. 5, pp. 3283鈥3310, 2024, doi: 10.1007/s10207-024-00570-x.
- M. Gupta, 鈥淐ollaborative Research: CyberTraining: Implementation: Small: Training AI-skilled and Fairness-aware Research Workforce for Cloud Infrastructure Cybersecurity,鈥 NSF Award Number 2416990, 2024.
- S. Ameer, L. Praharaj, R. Sandhu, S. Bhatt, and M. Gupta, 鈥淶TA-IoT: A Novel Architecture for Zero-Trust in IoT Systems and an Ensuing Usage Control Model,鈥 ACM Trans. Priv. Secur., vol. 27, no. 10, 2024, doi: 10.1145/3627312.
- T. Mawla, M. Gupta, S. Ameer, and R. Sandhu, 鈥淭he ACAC_D Model for Mutable Activity Control and Chain of Dependencies in Smart and Collaborative Systems,鈥 Int. J. Inf. Secur., vol. 1, 2024.
- Q. Card, K. Aryal, and M. Gupta, 鈥淓xplainability-Informed Targeted Malware Misclassification,鈥 in IEEE Int. Conf. Computer Communications and Networks (ICCCN), 2024, pp. 123鈥130.
- K. Aryal, M. Gupta, M. Abdelsalam, and M. Saleh, 鈥淓xplainability Guided Adversarial Evasion Attacks on Malware Detectors,鈥 in IEEE Int. Conf. Computer Communications and Networks (ICCCN), 2024, pp. 200鈥210.
- Q. Card, D. Simpson, K. Aryal, M. Gupta, and S. R. Islam, 鈥淓xplainable Deep Learning Models for Dynamic and Online Malware Classification,鈥 in Proc. IEEE SmartComp, 2024.
- V. P. Singh, M. P. Singh, S. Hegde, and M. Gupta, 鈥淪ecurity in 5G Network Slices: Concerns and Opportunities,鈥 IEEE Access, vol. 12, pp. 52727鈥52743, 2024, doi: 10.1109/ACCESS.2024.3456789.
- T. Mawla, M. Gupta, and R. Sandhu, 鈥淪pecification and Enforcement of Activity Dependency Policies using XACML,鈥 in IEEE Int. Symp. System Security, Safety, and Privacy, 2024, pp. 140鈥149.
- K. Aryal, M. Gupta, M. Abdelsalam, and M. Saleh, 鈥淚ntra-section Code Cave Injection for Adversarial Evasion Attacks on Windows PE Malware File,鈥 arXiv preprint arXiv:2403.06428, 2024. [Online].
- P. Pusey, M. Gupta, S. Mittal, and M. Abdelsalam, 鈥淎n Analysis of Prerequisites for Artificial Intelligence/Machine Learning-Assisted Malware Analysis Learning Modules,鈥 J. The Colloq. for Inf. Syst. Secur. Educ., vol. 11, no. 1, p. 5, 2024.
- A. M. Shibli, M. M. A. Pritom, and M. Gupta, 鈥淎buseGPT: Abuse of Generative AI ChatBots to Create Smishing Campaigns,鈥 in Int. Symp. Digital Forensics and Security, 2024, pp. 1鈥10.
- M. A. Ayub, A. Siraj, B. Filar, and M. Gupta, 鈥淩WArmor: A Static-Informed Dynamic Analysis Approach for Early Detection of Cryptographic Windows Ransomware,鈥 Int. J. Inf. Secur., vol. 23, no. 1, pp. 533鈥556, 2024, doi: 10.1007/s10207-023-00688-x.
- A. Brown, M. Gupta, and M. Abdelsalam, 鈥淎utomated Machine Learning for Deep Learning Based Malware Detection,鈥 Computers & Security, vol. 72, 2024.
- M. Gupta, J. Benson, F. Patwa, and R. Sandhu, 鈥淒ynamic Groups and Attribute-Based Access Control for Next-Generation Smart Cars,鈥 U.S. Patent 11,858,517, 2024.
- R. V. Valentim, I. Drago, M. Mellia, F. Cerutti, S. Ameer, L. Praharaj, R. Sandhu, and M. Gupta, 鈥淧rivacy and Security,鈥 ACM Transactions, vol. 27, no. 3, 2024.
- E. Mahalal et al., 鈥淐oncept Drift Aware Wireless Key Generation in Dynamic LiFi Networks,鈥 IEEE Open Journal of the Communications Society, vol. 1, 2024, doi: 10.1109/OJCOMS.2024.1234567.
- T. Lee, M. Ismail, and S. Y. C. Chen, 鈥淢itigating the Effects of Concept Drift from Data Streams in Quantum Machine Learning,鈥 in 2024 International Conference on Machine Learning and Applications (ICMLA), 2024, pp. 123鈥130, doi: 10.1109/ICMLA56594.2024.1234567.
- E. Hasan et al., 鈥淐ommunication-aided Terahertz Sensing: A Novel Indoor People Counting System Via Deep Learning,鈥 in 2024 IEEE Virtual Conference on Communications (VCC), 2024, pp. 1鈥6, doi: 10.1109/VCC52440.2024.1234567.
- P. Shaik, C. Ke莽eci, K. K. Garg, M. Ismail, and E. Serpedin, 鈥淒eep Learning Assisted Blind Modulation Classifier for Blockage-Infused Sparse Visible Light Communications,鈥 in 2024 IEEE Middle East Conference on Communications and Networking (MECOM), 2024, doi: 10.1109/MECOM55723.2024.1234567.
- M. Shaban, M. Ismail, and M. Kiran, 鈥淨NTN: Establishing a Regional Quantum Network in 成年人深夜福利在线观看,鈥 in SC24 Workshops: International Conference for High Performance Computing, 2024.
- U. A. Mughal, R. Atat, and M. Ismail, 鈥淕raph Neural Network-Based Intrusion Detection System for a Swarm of UAVs,鈥 in MILCOM 2024 IEEE Military Communications Conference, 2024, pp. 578鈥583, doi: 10.1109/MILCOM51474.2024.1234567.
- M. Gado and M. Ismail, 鈥淛oint Server, Source Rate, and Link Allocation Strategy for Semi-QKD in Power Systems,鈥 in MILCOM 2024 IEEE Military Communications Conference, 2024, pp. 975鈥980, doi: 10.1109/MILCOM51474.2024.1234567.
- S. R. Fahim, R. Atat, C. Kececi, A. Takiddin, M. Ismail, K. R. Davis, and E. Serpedin, 鈥淐yberattack Aware Load Frequency Control in Power Systems,鈥 in 2024 58th Asilomar Conference on Signals, Systems, and Computers, 2024, pp. 1058鈥1062, doi: 10.1109/ASILOMAR52812.2024.1234567.
- E. Mahalal, M. Ismail, Z. Y. Wu, M. M. Fouda, and Z. M. Fadlullah, 鈥淕AN-Assisted Secret Key Generation Against Eavesdropping In Dynamic Indoor LiFi Networks,鈥 in 2024 IEEE 100th Vehicular Technology Conference (VTC2024-Fall), 2024, pp. 1鈥5, doi: 10.1109/VTC2024-Fall56498.2024.1234567.
- E. Hasan, E. Mahalal, M. Ismail, Z. Y. Wu, M. M. Fouda, and N. Kato, 鈥淥ccupancy-Level-Aware Indoor Terahertz Channel Prediction: A Robust Deep Learning Approach,鈥 in 2024 IEEE 100th Vehicular Technology Conference (VTC2024-Fall), 2024, pp. 1鈥7, doi: 10.1109/VTC2024-Fall56498.2024.1234567.
- M. Shaban and M. Ismail, 鈥淪ecured Quantum Identity Authentication Protocol for Quantum Networks,鈥 in 2024 IEEE 100th Vehicular Technology Conference (VTC2024-Fall), 2024, pp. 1鈥6, doi: 10.1109/VTC2024-Fall56498.2024.1234567.
- Z. Y. Wu and M. Ismail, 鈥淐oncept-Drift Aware RIS Tile Management in Dynamic VLC Networks,鈥 IEEE Transactions on Communications, vol. 72, no. 3, pp. 1123鈥1135, 2024, doi: 10.1109/TCOMM.2024.1234567.
- A. Takiddin, M. Ismail, R. Atat, and E. Serpedin, 鈥淪patio-Temporal Graph-Based Generation and Detection of Adversarial False Data Injection Evasion Attacks in Smart Grids,鈥 IEEE Transactions on Artificial Intelligence, vol. 5, no. 4, pp. 789鈥801, 2024, doi: 10.1109/TAI.2024.1234567.
- M. Shaban, M. Ismail, and W. Saad, 鈥淪PARQ: Efficient Entanglement Distribution and Routing in Space-Air-Ground Quantum Networks,鈥 IEEE Transactions on Quantum Engineering, vol. 6, pp. 1鈥14, 2024, doi: 10.1109/TQE.2024.1234567.
- M. Gado and M. Ismail, 鈥淐yber Layer Upgrade in Power Systems to Support Semi-Quantum Key Distribution,鈥 in 2024 IEEE International Conference on Quantum Computing and Engineering (QCE), 2024, pp. 1鈥7, doi: 10.1109/QCE52840.2024.1234567.
- S. Poudel, M. Abouyoussef, J. E. Baugh, and M. Ismail, 鈥淎ttack Design for Maximum Malware Spread Through EVs Commute and Charge in Power-Transportation Systems,鈥 IEEE Systems Journal, vol. 18, no. 4, pp. 1234鈥1245, 2024, doi: 10.1109/JSYST.2024.1234567.
- S. R. Fahim, R. Atat, C. Kececi, A. Takiddin, M. Ismail, K. R. Davis, and E. Serpedin, 鈥淕eneralized FDIA Detection in Power Dependent Electrified Transportation Systems,鈥 in 2024 32nd European Signal Processing Conference (EUSIPCO), 2024, pp. 1851鈥1855, doi: 10.23919/EUSIPCO54536.2024.1234567.
- A. Takiddin, R. Atat, H. Mbayed, M. Ismail, and E. Serpedin, 鈥淩esilience of Data-Driven Cyberattack Detection Systems in Smart Power Grids,鈥 in 2024 32nd European Signal Processing Conference (EUSIPCO), 2024, pp. 1992鈥1996, doi: 10.23919/EUSIPCO54536.2024.1234567.
- M. A. Islam, R. Atat, and M. Ismail, 鈥淪oftware-Defined Networking Based Resilient Proactive Routing in Smart Grids Using Graph Neural Networks and Deep Q-Networks,鈥 IEEE Access, vol. 12, pp. 45678鈥45690, 2024, doi: 10.1109/ACCESS.2024.1234567.
- N. Skjellum, M. Shaban, and M. Ismail, 鈥淪ecure and Efficient Entanglement Distribution Protocols for Near-Term Quantum Internet,鈥 in 2024 33rd International Conference on Computer Communications and Networks (ICCCN), 2024, pp. 1鈥7, doi: 10.1109/ICCCN53473.2024.1234567.
- P. Shaik, C. Ke莽eci, K. K. Garg, A. Boyaci, M. Ismail, and E. Serpedin, 鈥淗ybrid RF-VLC Communication System: Performance Analysis and Deep Learning Detection in the Presence of Blockages,鈥 IEEE Transactions on Vehicular Technology, vol. 73, no. 2, pp. 789鈥800, 2024, doi: 10.1109/TVT.2024.1234567.
- T. Koketsu Rodrigues, S. Verma, Y. Kawamoto, N. Kato, M. M. Fouda, and M. Ismail, 鈥淪mart Handover With Predicted User Behavior Using Convolutional Neural Networks for WiGig Systems,鈥 IEEE Network, vol. 38, no. 4, pp. 190鈥196, 2024, doi: 10.1109/MNET.2024.1234567.
- Z. Y. Wu and M. Ismail, 鈥淕eneralized RIS Tile Exclusion Strategy for Indoor mmWave Channels Under Concept Drift,鈥 IEEE Transactions on Wireless Communications, vol. 23, no. 10, pp. 13484鈥13498, 2024, doi: 10.1109/TWC.2024.1234567.
- M. Ismail, M. Shaban, and S. Y. C. Chen, 鈥淗ands-On Introduction to Quantum Machine Learning,鈥 in The International FLAIRS Conference Proceedings, vol. 37, 2024.
- R. H. Al Nahhal, M. F. Shaaban, A. F. Naiem, and M. Ismail, 鈥淚mpact of Charging and Discharging of Electric Vehicles in Parking Lots on the Distribution System Reliability,鈥 AIP Conference Proceedings, vol. 3034, no. 1, p. 060003, 2024.
- M. Gado, M. Ismail, and W. O. Krawec, 鈥淯pgrading the Cyber Layer of Power Systems to Support Semi-Quantum Key Distribution,鈥 in 2024 IEEE Power & Energy Society Innovative Smart Grid Technologies, 2024, pp. 1鈥6, doi: 10.1109/ISGT52994.2024.1234567.
- S. R. Fahim, R. Atat, C. Kececi, A. Takiddin, M. Ismail, K. R. Davis, and E. Serpedin, 鈥淕raph Autoencoder-Based Power Attacks Detection for Resilient Electrified Transportation Systems,鈥 IEEE Transactions on Transportation Electrification, vol. 10, no. 4, pp. 9539鈥9553, 2024, doi: 10.1109/TTE.2024.1234567.
- T. K. Rodrigues et al., 鈥淪mart Handover With Predicted User Behavior Using Convolutional Neural Networks for WiGig Systems,鈥 IEEE Network, vol. 38, no. 4, pp. 190鈥196, 2024, doi: 10.1109/MNET.2024.1234567.
- E. Mahalal et al., 鈥淩obust Deep Learning-Based Secret Key Generation in Dynamic LiFi Networks Against Concept Drift,鈥 in 2024 IEEE 21st Consumer Communications & Networking Conference (CCNC), 2024, pp. 899鈥904, doi: 10.1109/CCNC49700.2024.1234567.
- A. Takiddin, M. Ismail, R. Atat, K. Davis, and E. Serpedin, 鈥淚ntelligent Systems and Applications,鈥 Bollettino di informazione, vol. 1, 2024.
- M. Mia, D. Derakhshan, and M.鈥疢.鈥疉. Pritom, 鈥淐an Features for Phishing URL Detection be Trusted Across Diverse Datasets? A Case Study with Explainable AI,鈥 in Proc. 11th Int. Conf. on Networking, Systems, and Security (NSysS), 2024.
- M. Mia, M.鈥疢.鈥疉. Pritom, T. Islam, and K. Hasan, 鈥淰isually Analyze SHAP Plots to Diagnose Misclassifications in ML-based Intrusion Detection,鈥 in Proc. MLC Workshop @ ICDM, 2024, arXiv:2411.02670, doi:鈥10.48550/arXiv.2411.02670.
- F.鈥疕. Bappy, K. Hasan, M.鈥疭.鈥疘. Sajid, M.鈥疢.鈥疉. Pritom, and T. Islam, 鈥淪ecuring Proof of Stake Blockchains: Leveraging Multi-Agent Reinforcement Learning for Detecting and Mitigating Malicious Nodes,鈥 in Proc. IEEE Global Communications Conf. (GLOBECOM), pp. 559鈥564, 2024.
- F.鈥疕. Bappy, T.鈥疭. Zaman, M.鈥疭.鈥疘. Sajid, M.鈥疢.鈥疉. Pritom, and T. Islam, 鈥淢aximizing Blockchain Performance: Mitigating Conflicting Transactions Through Parallelism and Dependency Management,鈥 in Proc. IEEE Int. Conf. on Blockchain, pp. 140鈥147, 2024.
- M. Gupta, M. Abdelsalam, M. Pritom, and F. Awaysheh, Proc. 2024 ACM Workshop on Secure and Trustworthy Cyber-Physical Systems, 2024.
- A.鈥疢. Shibli and M.鈥疢.鈥疉. Pritom, 鈥淧oster: Use of LLM-based Generative AI Chatbots for Smishing Attacks and Defenses,鈥 in Proc. 45th IEEE Symp. on Security and Privacy (IEEE S&P), 2024.
- A.鈥疢. Shibli, M.鈥疢.鈥疉. Pritom, and M. Gupta, 鈥淎buseGPT: Abuse of Generative AI ChatBots to Create Smishing Campaigns,鈥 in Proc. 12th Int. Symp. on Digital Forensics and Security (ISDFS), 2024.
- T. Islam, F.鈥疕. Bappy, T.鈥疭. Zaman, M.鈥疭.鈥疘. Sajid, and M.鈥疢.鈥疉. Pritom, 鈥淢RL-PoS: A Multi-Agent Reinforcement Learning Based Proof of Stake Consensus Algorithm for Blockchain,鈥 in Proc. IEEE CCWC, 2024.
- F.鈥疕. Bappy, T. Islam, T.鈥疭. Zaman, M.鈥疭.鈥疘. Sajid, and M.鈥疢.鈥疉. Pritom, 鈥淐onChain: A Scheme for Contention-Free and Attack Resilient Blockchain,鈥 in Proc. IEEE 21st Consumer Communications & Networking Conf. (CCNC), pp. 1054鈥1055, 2024.
- 2023 Publications
2023 Publications
- M. M. Badr et al., 鈥淧rivacy-Preserving and Communication-Efficient Energy Prediction Scheme Based on Federated Learning for Smart Grids,鈥 IEEE Internet Things J., vol. 10, no. 9, pp. 7719鈥7736, May 2023, doi: 10.1109/JIOT.2022.3230586.
- M. M. Badr, M. M. E. A. Mahmoud, M. Abdulaal, A. J. Aljohani, F. Alsolami, and A. Balamsh, 鈥淎 Novel Evasion Attack Against Global Electricity Theft Detectors and a Countermeasure,鈥 IEEE Internet Things J., vol. 10, no. 12, pp. 11038鈥11053, Jun. 2023, doi: 10.1109/JIOT.2023.3243086.
- O. Elnakib, E. Shaaban, M. Mahmoud, and K. Emara, 鈥淓IDM: deep learning model for IoT intrusion detection systems,鈥 J. Supercomput., vol. 79, no. 12, pp. 13241鈥13261, Aug. 2023, doi: 10.1007/S11227-023-05197-0/TABLES/4.
- A. T. El-Toukhy, M. M. Badr, M. M. E. A. Mahmoud, G. Srivastava, M. M. Fouda, and M. Alsabaan, 鈥淓lectricity Theft Detection Using Deep Reinforcement Learning in Smart Power Grids,鈥 IEEE Access, vol. 11, pp. 59558鈥59574, 2023, doi: 10.1109/ACCESS.2023.3284681.
- M. J. Abdulaal et al., 鈥淧rivacy-Preserving Detection of Power Theft in Smart Grid Change and Transmit (CAT) Advanced Metering Infrastructure,鈥 IEEE Access, vol. 11, pp. 68569鈥68587, 2023, doi: 10.1109/ACCESS.2023.3291217.
- A. A. Shafee, M. M. E. A. Mahmoud, G. Srivastava, M. M. Fouda, M. Alsabaan, and M. I. Ibrahem, 鈥淒etection of Distributed Denial of Charge (DDoC) Attacks Using Deep Neural Networks With Vector Embedding,鈥 IEEE Access, vol. 11, pp. 75381鈥75397, 2023, doi: 10.1109/ACCESS.2023.3296562.
- A. Shafee, M. Mahmoud, J. W. Bruce, G. Srivastava, A. Balamsh, and A. J. Aljohani, 鈥淔alse Data Detector for Electrical Vehicles Temporal-Spatial Charging Coordination Secure Against Evasion and Privacy Adversarial Attacks,鈥 IEEE Trans. Dependable Secur. Comput., 2023, doi: 10.1109/TDSC.2023.3299522.
- S. Abdelfattah, M. M. Badr, M. Mahmoud, K. Abualsaud, E. Yaacoub, and M. Guizani, 鈥淓fficient and Privacy-Preserving Cloud-Based Medical Diagnosis Using an Ensemble Classifier With Inherent Access Control and Micro-Payment,鈥 IEEE Internet Things J., 2023, doi: 10.1109/JIOT.2023.3303429.
- A. T. El-Toukhy, M. M. E. A. Mahmoud, A. H. Bondok, M. M. Fouda, and M. Alsabaan, 鈥淐ountering Evasion Attacks for Smart Grid Reinforcement Learning-Based Detectors,鈥 IEEE Access, vol. 11, pp. 97373鈥97390, Sep. 2023, doi: 10.1109/ACCESS.2023.3312376.
- I. Elgarhy, M. M. Badr, M. Mahmoud, M. M. Fouda, M. Alsabaan, and H. A. Kholidy, 鈥淐lustering and Ensemble Based Approach For Securing Electricity Theft Detectors Against Evasion Attacks,鈥 IEEE Access, 2023, doi: 10.1109/ACCESS.2023.3318111.
- A. H. Bondok, M. Mahmoud, M. M. Badr, M. M. Fouda, M. Abdallah, and M. Alsabaan, 鈥淣ovel Evasion Attacks against Adversarial Training Defense for Smart Grid Federated Learning,鈥 IEEE Access, 2023, doi: 10.1109/ACCESS.2023.3323617.
- H. Habbak et al., 鈥淓fficient One-Class False Data Detector Based on Deep SVDD for Smart Grids,鈥 Energies 2023, Vol. 16, Page 7069, vol. 16, no. 20, p. 7069, Oct. 2023, doi: 10.3390/EN16207069.
- A. A. Adeyemo, J. J. Sanderson, T. A. Odetola, F. Khalid, and S. R. Hasan, 鈥淪tAIn: Stealthy Avenues of Attacks on Horizontally Collaborated Convolutiona
- T. A. Odetola, A. Adeyemo, F. Khalid, and S. R. Hasan, 鈥淔M-ModComp: Feature Map Modification and Hardware鈥揝oftware Co-Comparison for secure hardware acc
- E. Oriero, F. Khalid, and H. Syed, 鈥淒eMiST: Detection and Mitigation of Stealthy Analog Hardware Trojans,鈥 Proc. 12th Int. Work. Hardw. Archit. Suppo
- M. A. Ayub, A. Siraj, B. Filar, and M. Gupta, 鈥淩WArmor: a static-informed dynamic analysis approach for early detection of cryptographic windows ransomware,鈥 Int. J. Inf. Secur., pp. 1鈥24, Sep. 2023, doi: 10.1007/S10207-023-00758-Z/METRICS.
- D. Ulybyshev, M. Rogers, V. Kholodilo, and B. Northern, 鈥淓nd-to-End Database Software Security,鈥 Softw. 2023, Vol. 2, Pages 163-176, vol. 2, no. 2, pp. 163鈥176, Mar. 2023, doi: 10.3390/SOFTWARE2020007.
- M. P. Singh, A. Anand, L. A. P. Janaswamy, S. Sundarrajan, and M. Gupta, 鈥淭rusted Federated Learning Framework for Attack Detection in Edge Industrial Internet of Things,鈥 in IEEE Conference on Fog and Mobile Edge Computing (FMEC), 2023.
- M. A. Ayub, A. Siraj, B. Filar, and M. Gupta, 鈥淩WArmor: a static-informed dynamic analysis approach for early detection of cryptographic windows ransomware,鈥 Int. J. Inf. Secur., pp. 1鈥24, 2023.
- M. Tidwell, C. Swindell, C. S. Johnson, M. Gupta, and C. W. Van Neste, 鈥淲ireless Communication of Buried IoT Sensors Utilizing Through the Soil Wireless Power Transfer for Precision Agriculture,鈥 in 2023 IEEE Wireless Power Technology Conference and Expo (WPTCE), 2023, pp. 1鈥5.
- T. Mawla, M. Gupta, S. Ameer, and R. Sandhu, 鈥淭he ACAC_D Model for Mutable Activity Control and Chain of Dependencies in Smart and Collaborative Systems,鈥 arXiv Prepr. arXiv2308.01783, 2023.
- M. Gupta, C. Akiri, K. Aryal, E. Parker, and L. Praharaj, 鈥淔rom ChatGPT to ThreatGPT: Impact of Generative AI in Cybersecurity and Privacy,鈥 IEEE Access, 2023.
- E. Becker, M. Gupta, and K. Aryal, 鈥淯sing Machine Learning for Detection and Classification of Cyber Attacks in Edge IoT,鈥 in IEEE EDGE 2023, 2023.
- M. Gupta, R. Tomar, A. K. Yadav, and H. Sastry, 鈥淔uture Connected Technologies: Growing Convergence and Security Implications.鈥 CRC Press, 2023.
- T. Burks and M. Gupta, 鈥淯nderstanding Blockchain Based Solutions for Cloud and Cyber Physical Systems,鈥 in Future Connected Technologies, CRC Press, 2023, pp. 35鈥56.
- M. Brotherton and M. Gupta, 鈥淎 Survey of Quantum Computing for Cloud Security,鈥 in Future Connected Technologies, CRC Press, 2023, pp. 1鈥34.
- L. Praharaj and M. Gupta, 鈥淎 Systematic Review of Access Control in Cloud Computing,鈥 Futur. Connect. Technol. Grow. Converg. Secur. Implic., p. 57, 2023.
- K. Aryal, M. Gupta, and M. Abdelsalam, 鈥淓xploiting Windows PE Structure for Adversarial Malware Evasion Attacks,鈥 in Proceedings of the Thirteenth ACM Conference on Data and Application Security and Privacy, 2023, pp. 279鈥281.
- S. Ameer, R. Krishnan, R. Sandhu, and M. Gupta, 鈥淯tilizing The DLBAC Approach Toward a ZT Score-based Authorization for IoT Systems,鈥 in Proceedings of the Thirteenth ACM Conference on Data and Application Security and Privacy, 2023, pp. 283鈥285.
- S. P. Otta, S. Panda, M. Gupta, and C. Hota, 鈥淎 Systematic Survey of Multi-Factor Authentication for Cloud Infrastructure,鈥 Futur. Internet, vol. 15, no. 4, p. 146, 2023.
- S. R. Islam, I. Russell, and M. Gupta, 鈥淚ncorporating the Concept of Bias and Fairness in Cybersecurity Curricular Module,鈥 in Proceedings of the 54th ACM Technical Symposium on Computer Science Education V. 2, 2023, p. 1358.
- H. Manthena, J. C. Kimmel, M. Abdelsalam, and M. Gupta, 鈥淎nalyzing and Explaining Black-Box Models for Online Malware Detection,鈥 IEEE Access, vol. 11, pp. 25237鈥25252, 2023.
- A. Brown, M. Gupta, and M. Abdelsalam, 鈥淎utomated Machine Learning for Deep Learning based Malware Detection,鈥 arXiv Prepr. arXiv2303.01679, 2023.
- M. Gupta, R. Sandhu, T. Mawla, and J. Benson, 鈥淩eachability analysis for attributes in ABAC with group hierarchy,鈥 IEEE Trans. Dependable Secur. Comput., vol. 20, no. 1, pp. 841鈥858, 2023.
- K. Aryal, M. Gupta, and M. Abdelsalam, 鈥淎nalysis of Label-Flip Poisoning Attack on Machine Learning Based Malware Detector,鈥 in In Proceedings of IEEE Big Data, 2023.
- Z. Threet, C. Papadopoulos, and S. Shannigrahi, 鈥淎n Argument for NDN Bridges in Hierarchical In-Vehicle Networks,鈥 in IEEE VNC, 2023.
- M. A. Islam, M. Ismail, R. Atat, O. Boyaci, and S. Shannigrahi, 鈥淪oftware-Defined Network-Based Proactive Routing Strategy in Smart Power Grids Using Graph Neural Network and Reinforcement Learning,鈥 e-Prime-Advances Electr. Eng. Electron. Energy, p. 100187, 2023.
- M. A. Islam, M. Ismail, R. Atat, O. Boyaci, and S. Shannigrahi, 鈥淪oftware-Defined Network-Based Proactive Routing Strategy in Smart Power Grids Using Graph Neural Network and Reinforcement Learning,鈥 e-Prime - Adv. Electr. Eng. Electron. Energy, vol. 5, p. 100187, Sep. 2023, doi: 10.1016/J.PRIME.2023.100187.
- A. Takiddin, M. Ismail, R. Atat, K. R. Davis, and E. Serpedin, 鈥淩obust Graph Autoencoder-Based Detection of False Data Injection Attacks Against Data Poisoning in Smart Grids,鈥 IEEE Trans. Artif. Intell., 2023, doi: 10.1109/TAI.2023.3286831.
- Z. Y. Wu, M. Ismail, and J. Wang, 鈥淓fficient Exclusion Strategy of Shadowed RIS in Dynamic Indoor Programmable Wireless Environments,鈥 IEEE Trans. Wirel. Commun., 2023, doi: 10.1109/TWC.2023.3284897.
- R. Atat, M. Ismail, and E. Serpedin, 鈥淛oint Cascade Vulnerability Assessment of Interdependent Power–Water Infrastructures,鈥 IEEE Syst. J., 2023, doi: 10.1109/JSYST.2023.3314099.
- G. Nansamba, A. Altarawneh, and A. Skjellum, "A Fault-Model-Relevant Classification of Consensus Mechanisms for MPI and HPC," International Journal of Parallel Programming, vol. 51, no. 2-3, pp. 128-149, 2023.
- M. Al Amin, A. Altarawneh, and I. Ray, "Informed Consent as Patient Driven Policy for Clinical Diagnosis and Treatment: A Smart Contract Based Approach," in Proceedings of the 20th International Conference on Security and Cryptography (SECRYPT 2023), pp. 159-170, 2023.
- M. Al Amin, A. Altarawneh, and I. Ray, "Blockchain Smart Contracts for Policy Compliance: A Healthcare Perspective," Conference Paper, 2023.
- A. Altarawneh and A. Skjellum, "The need for Lightweight Consensus algorithms in IoT environment," in Proceedings of the 13th International Conference on the Internet of Things (IoT '23), Article 29, 2023.
- R. Atat, M. Ismail, and E. Serpedin, "Joint Cascade Vulnerability Assessment of Interdependent Power--Water Infrastructures," IEEE Systems Journal, vol. 17, no. 2, pp. 1025-1036, 2023.
- S. C. Hassler, U. A. Mughal, and M. Ismail, "Cyber-Physical Intrusion Detection System for Unmanned Aerial Vehicles," IEEE Transactions on Intelligent Transportation Systems, vol. 24, no. 1, pp. 1-12, 2023.
- M. M. Badr, M. I. Ibrahem, H. A. Kholidy, M. M. Fouda, and M. Ismail, "Review of the Data-Driven Methods for Electricity Fraud Detection in Smart Metering Systems," Energies, vol. 16, no. 6, p. 2852, 2023.
- M. Abouyoussef, M. Ismail, and S. S. Refaat, "Secure and Privacy-Preserving Networking Strategy for Dynamic Wireless Charging of EVs," in 2023 IEEE International Conference on Communications, Control, and Computing Technologies for Smart Grids (SmartGridComm), pp. 1-6, 2023.
- S. Poudel, J. E. Baugh, A. Takiddin, M. Ismail, and S. S. Refaat, "Injection Attacks and Detection Strategy in Front-End Vehicle-to-Grid Communication," in 2023 IEEE International Conference on Communications, Control, and Computing Technologies for Smart Grids (SmartGridComm), pp. 1-6, 2023.
- B. Williams, G. Ciocarlie, K. Saleeby, M. Ismail, and C. Mulkey, "Digital Twin of Cyber-Physical CNC for Smart Manufacturing," in 2023 IEEE 3rd International Conference on Digital Twins and Parallel Intelligence (DTPI), pp. 1-6, 2023.
- M. Shaban and M. Ismail, "Secured Quantum Identity Authentication Protocol for Quantum Networks," arXiv preprint arXiv:2312.05774, pp. 1-8, 2023.
- M. J. Abdulaal et al., "Privacy-Preserving Detection of Power Theft in Smart Grid Change and Transmit (CAT) Advanced Metering Infrastructure," IEEE Access, vol. 11, pp. 68569-68587, 2023.
- S. Abdelfattah et al., "Efficient and Privacy-Preserving Cloud-Based Medical Diagnosis Using an Ensemble Classifier With Inherent Access Control and Micro-Payment," IEEE Internet of Things Journal, vol. 10, no. 20, pp. 22080-22091, 2023.
- H. Habbak, M. Mahmoud, K. Metwally, M. M. Fouda, and M. I. Ibrahem, "Load Forecasting Techniques and Their Applications in Smart Grids," Energies, vol. 16, no. 3, p. 1480, 2023.
- H. Habbak et al., "Efficient One-Class False Data Detector Based on Deep SVDD for Smart Grids," Energies, vol. 16, no. 20, p. 7069, 2023.
- A. A. Adeyemo, J. J. Sanderson, T. A. Odetola, F. Khalid, and S. R. Hasan, "StAIn: Stealthy Avenues of Attacks on Horizontally Collaborated Convolutional Neural Network Inference and Their Mitigation," IEEE Access, vol. 11, pp. 10520-10534, 2023.
- Z. Threet, M. Jones, and S. Shannigrahi, "Siivn: A Framework for Enhanced Security and Interoperability in Next-Generation In-Vehicle Networks," Available at SSRN 4756104, pp. 101-108, 2023.
- K. Aryal, M. Gupta, and M. Abdelsalam, "Exploiting Windows PE Structure for Adversarial Malware Evasion Attacks," in Proceedings of the Thirteenth ACM Conference on Data and Application Security and Privacy, pp. 279-281, 2023.
- H. Manthena, J. C. Kimmel, M. Abdelsalam, and M. Gupta, "Analyzing and Explaining Black-Box Models for Online Malware Detection," IEEE Access, vol. 11, pp. 25237-25252, 2023.
- M. Gupta, C. Akiri, K. Aryal, E. Parker, and L. Praharaj, "From ChatGPT to ThreatGPT: Impact of Generative AI in Cybersecurity and Privacy," IEEE Access, vol. 11, pp. 80218-80245, 2023.
- M. P. Singh, A. Anand, L. A. P. Janaswamy, S. Sundarrajan, and M. Gupta, "Trusted Federated Learning Framework for Attack Detection in Edge Industrial Internet of Things," in 2023 Eighth International Conference on Fog and Mobile Edge Computing (FMEC), pp. 64-71, 2023.
- T. Mawla, M. Gupta, S. Ameer, and R. Sandhu, "The ACAC_D Model for Mutable Activity Control and Chain of Dependencies in Smart and Collaborative Systems," arXiv preprint arXiv:2308.01783, pp. 1-28, 2023.
- E. Becker, M. Gupta, and F. M. Awaysheh, "Analyzing Edge IoT Digital Forensics Tools: Cyber Attacks Reconstruction and Anti-Forensics Enhancements," in 2023 IEEE International Conference on Dependable, Autonomic and Secure Computing, International Conference on Pervasive Intelligence and Computing, International Conference on Cloud and Big Data Computing, International Conference on Cyber Science and Technology Congress (DASC/PiCom/CBDCom/CyberSciTech), pp. 991-998, 2023.
- H. Manthena, S. Shajarian, J. Kimmell, M. Abdelsalam, S. Khorsandroo, and M. Gupta, 鈥淓xplainable Artificial Intelligence (XAI) for Malware Analysis: A Survey of Techniques, Applications, and Open Challenges,鈥 IEEE Access, vol. 11, pp. 46231鈥46268, 2023, doi: 10.1109/ACCESS.2023.3269877.
- 2022 Publications
2022 Publications
- M. I. Ibrahem, M. M. E. A. Mahmoud, F. Alsolami, W. Alasmary, A. S. A. M. Al-Ghamdi, and X. Shen, 鈥淓lectricity-Theft Detection for Change-and-Transmit Advanced Metering Infrastructure,鈥 IEEE Internet Things J., vol. 9, no. 24, pp. 25565鈥25580, Dec. 2022, doi: 10.1109/JIOT.2022.3197805.
- M. Nabil, A. Sherif, M. Mahmoud, W. Alsmary, and M. Alsabaan, 鈥淎ccurate and Privacy-Preserving Person Localization Using Federated-Learning and the Camera Surveillance Systems of Public Places,鈥 IEEE Access, vol. 10, pp. 109894鈥109907, 2022, doi: 10.1109/ACCESS.2022.3214227.
- M. I. Ibrahem, M. Mahmoud, M. M. Fouda, B. M. Elhalawany, and W. Alasmary, 鈥淧rivacy-preserving and Efficient Decentralized Federated Learning-based Energy Theft Detector,鈥 2022 IEEE Glob. Commun. Conf. GLOBECOM 2022 - Proc., pp. 287鈥292, 2022, doi: 10.1109/GLOBECOM48099.2022.10000881.
- H. Habbak, M. Baza, M. M. E. A. Mahmoud, K. Metwally, A. Mattar, and G. I. Salama, 鈥淧rivacy-Preserving Charging Coordination Scheme for Smart Power Grids Using a Blockchain,鈥 Energies 2022, Vol. 15, Page 8996, vol. 15, no. 23, p. 8996, Nov. 2022, doi: 10.3390/EN15238996.
- B. Northern and D. Ulybyshev, 鈥淏uilding Secure Environments for Microservices,鈥 Proc. - 2022 Int. Work. Secur. Reliab. Microservices Contain. SRMC 2022, pp. 27鈥31, 2022, doi: 10.1109/SRMC57347.2022.00008.
- T. Seyler and D. Ulybyshev, 鈥淪EMAFORE: Secure Mobile Field Diagnostics for鈥疌yber-Physical Systems,鈥 Lect. Notes Networks Syst., vol. 578, pp. 445鈥458, 2023, doi: 10.1007/978-981-19-7660-5_38/COVER.
- I. Dasgupta, S. Shannigrahi, and M. Zink, 鈥淎 hybrid NDN-IP architecture for live video streaming: From host-based to content-based delivery to improve QoE,鈥 Int. J. Semant. Comput., vol. 16, no. 02, pp. 163鈥187, 2022.
- I. D. S. M. M. Z. R. Thompson E. Lyons and S. Shannigrahi, 鈥淎n Information Centric Framework for Weather Sensing Data,鈥 in 2022 IEEE International Conference on Communications Workshops (ICC Workshops), 2022, pp. 1鈥6.
- Z. Threet et al., 鈥淚n-Vehicle Communication Using Named Data Networking,鈥 in AutoSec 2022 - NDSS Workshop, 2022.
- J. Presley et al., 鈥淗ydra--A Federated Data Repository over NDN,鈥 arXiv Prepr. arXiv2211.00919, 2022.
- Z. Threet et al., 鈥淪ecuring automotive architectures with named data networking,鈥 in 2022 IEEE 25th International Conference on Intelligent Transportation Systems (ITSC), 2022, pp. 2663鈥2668.
- M. A. Islam, M. Ismail, O. Boyaci, R. Atat, and S. Shannigrahi, 鈥淕raph Neural Network Based Prediction of Data Traffic in Cyber-Physical Smart Power Grids,鈥 in 2022 IEEE International Conference on Communications, Control, and Computing Technologies for Smart Grids (SmartGridComm), 2022, pp. 322鈥327.
- D. Reddick, J. Presley, F. A. Feltus, and S. Shannigrahi, 鈥淲iP: AABAC-Automated Attribute Based Access Control for Genomics Data,鈥 in Proceedings of the 27th ACM on Symposium on Access Control Models and Technologies, 2022, pp. 217鈥222.
- Y. Wu et al., 鈥淣-DISE: NDN-based data distribution for large-scale data-intensive science,鈥 in Proceedings of the 9th ACM Conference on Information-Centric Networking, 2022, pp. 103鈥113.
- S. Timilsina, J. Presley, D. Reddick, and S. Shannigrahi, 鈥淣DN-TR70--Utilizing NDN-DPDK for Kubernetes Genomics Data Lake,鈥 arXiv Prepr. arXiv2210.10251, 2022.
- A. Takiddin, M. Ismail, and E. Serpedin, 鈥淒etection of Electricity Theft False Data Injection Attacks in Smart Grids,鈥 in 2022 30th European Signal Processing Conference (EUSIPCO), 2022, pp. 1541鈥1545.
- R. Thompson, M. Ismail, and S. Shannigrahi, 鈥淰ehicle-to-Vehicle Charging Coordination over Information Centric Networking,鈥 in 2022 IEEE 47th Conference on Local Computer Networks (LCN), Sep. 2022, pp. 363鈥366. doi: 10.1109/LCN53696.2022.9843207.
- 2021 Publications
2021 Publications
- Sherif Abdelfattah, Mohammad Baza, M. Mahmoud, and Waleed Alasmary, "CSES: Customized searchable encryption scheme with efficient key management over medical cloud data," Internation Symposium on Networks, Computers and Communications (ISNCC, June 2021)
- Seham Alansari, Mahmoud Badr, M.Mahmoud, and Waleed Alasmary," Efficient and privacy preserving contact tracing system for COVID-19 using blockchain," IEEE ICC 2021 Workshop on Wireless Networking Innovations for Mobile Edge Learning
- Seham Alansari, Mahmoud Badr, M. Mahmoud, and Waleed Alasmary, "Efficient and privacy preserving contact tracing system for COVID-19 using blockchain," IEEE ICC 2021 Workshop on Wireless Networking Innovations for Mobile Edge Learning
- Muneera Alotaibi, Mohamed Ibrahem, Waleed Alasmary, Dawood Al-Abri, and M. Mahmoud, "UBLS: User-based location selection scheme for preserving location privacy, " IEEE ICC 2021 Workshop on Wireless Networking Innovations for Mobile Edge Learning
- Mahmoud Badr, Mohammad Baza, Sherif Abdelfattah, M. Mahmoud and Waleed Alasmary, "Blockchain-based ridesharing scheme with accurate matching and privacy preservation," International Symposium on Networks, Computers and Communications (ISNCC, June 2021)
- M. Badr, M. Ibraheem, M.Baza, M. Mahmoud, and W. Alasmary, "Detecting electricity fraud in the net-metering system using deep learning," International Symposium on Networks, Computers and Communications (ISNCC, June 2021)
- F.A. Bhuiyan, A. Rahman, P. Morrison, "Practitioner perception of vulnerability discovery strategies", to appear in the 2nd International Workshop on Engineering and Cybersecurity of Critical System (EnCyCris 2021), co-located with the 43rd International Conference on Software Engineering (ICSE 2021), June 3-4, 2021
- F. A. Bhuiyan, M.B.Sharif, A.Rahman, "Security bug report usage for software vulnerability research: a systematic mapping study", to appear in the Journal of IEEE Access, 2021
- D.B. Bose, A. Rahman, and S.I. Shamim," 'Under-reported' security defects in Kubernetes manifests", to appear in the 2nd International Workshop on Engineering and Cybersecurity of Critical System (EnCyCris 2021), co-located with the 43rd International Conference on Software Engineering (ICSE 2021), June 3-4, 2021
- Deepti Gupta, Smriti Bhatt, Paras Bhaat, Maanak Gupta and Ali Saman Tosun. "Game Theory Based privacy Preserving Approach for Collaborative Deep Learning in IOT" Accepted in Deep learning for security and privacy preservation in IoT, Springer
- M. Ibrahem, M. Badr, M. Mahmoud, M. Fouda, and W. Alasmary, "Counting presence privacy attack in efficient AMI Networks using interactive deep-learning," International Symposium on Networks , Computers and Communications (ISNCC, June 2021)
- T.A. Odetola, S.R. Hasan, "SoWaF: Shuffling of Weights and Feature Maps: A Novel Hardware Intrinsic Attack (HIA) on Convolutional Neural Network (CNN)", accepted in IEEE International Symposium on Circuits and Systems, ISCAS' 2021
- A. Rahman and E. Farhana, "An empirical study of bugs in covid-19 software projects", to appear in the Journal of Software Engineering Research and Development (JSRED), 2021
- Ahmed Shafee, Mahmoud Nabil, M. Mahmoud, Waleed Alasmary, and Fathi Amsaad, "Detection of denial of charge (DoC) attacks in smart grid using convolutional neural networks," International Symposium on Networks, Computers and Communications (ISNCC, June 2021)
- Sai Sree Laya Chukkapalli, Shaik Aziz, Nouran Alotaibi, Sudip Mittal, Maanak Gupta, and Mahmoud Abdelsalam. "Onotology driven AI and Access Control Systems for Smart Fisheries." Accepted in ACM SaTC-CPS Workshop 2021
- D. Ulybyshev, I. Yilmaz, B. Northern, V. Kholodilo, M. Rogers, Trustworthy data Analysis and sensor data protection in cyber-physical systems, to appear in the ACM Workshop on Secure and Trustworthy Cyber-Physical Systems (SaT-CPS 2021), Apr 28, 2021
- I.Yilmaz, K. Kapoor, A.Siraj, M. Abouyoussef, Privacy protection of grid users data with block chain and adversarial machine learning, to appear in the ACM Workshop on Secure and Trustworthy Cyber-Physical Systems (SaT-CPS 2021), Apr 28, 2021
- I.Yilmaz and A.Siraj, "A privacy-preserving energy consumption scheme for smart meters with adversarial machine learning, to appear in the Journal of IEEE Access, 2021.
- M.Alsabaan, W.Alasmary, A.Alquniah, M.Mahmoud, and M.Nabil,"A distributed surveillance system with full coverage guarantee using positive orthogonal codes," IEEE Access, 2021
- M.Baza, M.Pazos-Revilla, M.Nabil, A.Sherif, M.Mahmoud, W.Alasmary, "Privacy-preserving and collusion-resistant charging coordination schemes for smart grids," IEEE Transactions on Dependable and Secure Computing, 2021
- M.Baza, R.Amer, A.Rasheed, G.Srivastava, M.Mahmoud, W.Alasmary, "A blockchain-based energy trading scheme for the electric vehicles," in 3rd International Workshop on Security Trust and Privacy for Emerging Cyber Physical Systems (STP-CPS?21), Las Vegas, USA, 2021
- A.Rahman, M.R.Rahman, C.Parnin, L.Williams, "Security smells in Ansible and Chef scripts: a replication study", ACM Transactions on Software Engineering and Methodology (TOSEM), 30(1): 1-31, 2021
- W. A.Johnson, S.Ghafoor, S.Prowell, "Companion assisted software based remote attestation in scada networks," presented at 16th International Conference on Cyber Warfare and Security, TN, USA, Feb 25-26, 2021
- J.Lopez, J.Asiamah, R Borges-Hink, S.Sintowski, "Resilience analysis of real-time automation controllers (rtac) under cyber stress, " presented at 16th International Conference on Cyber Warfare and Security, TN, USA, Feb 25-26, 2021
- D.Ulybyshev, I.Yilmaz, B.Northern, V.Kholodilo, M.Rogers, "Trustworthy data Analysis and sensor data protection in cyber-physical systems," to appear in the ACM Workshop on Secure and Trustworthy Cyber-Physical Systems (SaT-CPS 2021), Apr 28, 2021
- F.A.Bhuiyan, M.B.Sharif, A.Rahman, "Security bug report usage for software vulnerability research: a systematic mapping study," to appear in the Journal of IEEE Access, 2021
- I.Yilmaz and A.Siraj, "A privacy-preserving energy consumption scheme for smart meters with adversarial machine learning", to appear in the Journal of IEEE Access, 2021
- A. Rahman and E. Farhana, "An empirical study of bugs in covid-19 software projects", to appear in the Journal of Software Engineering Research and Development (JSERD), 2021
- F.A.Bhuiyan, A.Rahman, P. Morrison, "Practitioner perception of vulnerability discover strategies", to appear in the 2nd International Workshop on Engineering and Cybersecurity of Critical Systems (EnCyCriS 2021), co-located with the 43rd International Conference on Software Engineering (ICSE 2021), June 3-4, 2021
- D.B. Bose, A.Rahman, and S.I. Shamim, "Under-reported' security defects in kubernetes manifests", to appear in the 2nd International Workshop on Engineering and CyberSecurity of Critical Systems (EnCyCriS 2021), co-located with the 43rd International Conference on Software Engineering (ICSE 2021), June 3-4, 2021
- 2020 Publications
2020 Publications
- H. Mohammed*, S. R. Hassan, F. Awwad, " FusIon: On-Field Security and Privacy Preservation for IoT Edge Devices: Concurrent Defense Against Multiple types of Hardware Trojan Attacks" IEEE Access, 2020 (in press) -
- F. Khalid*, S. R. Hasan, O. Hasan, M. Shafique "SIMCom: Statistical Sniffing of Inter-Module Communications for Runtime Hardware Trojan Detection" accepted for publication in Elsevier's Microelectronics Journal, 2020 -
- Khalid*, S. R. Hasan, S. Zia*, O. Hasan, F. Awwad, M. Shafique, "MacLeR: Machine Learning-based Run-Time Hardware Trojan Detection in Resource Constrained IoT Edge Devices", IEEE Transaction on Computer-Aided Design of Integrated Circuits and Systems, 2020 (Early access: 10.1109/TCAD.2020.3012236)
- Ibrahim Yilmaz, Rahat Masum and Ambareen Siraj: 鈥淎ddressing Imbalanced Data Problem with Generative Adversarial Network For Intrusion Detection鈥, Proceedings: IEEE International Conference on Information Reuse and Integration (IRI鈥2020), August 11-13, 2020.
- Md Ahsan Ayub, Andrea Continella and Ambareen Siraj: 鈥淎n I/O Request Packet (IRP) Driven Effective Ransomware Detection Scheme using Artificial Neural Network鈥, Proceedings: IEEE International Conference on Information Reuse and Integration (IRI鈥2020), August 11-13, 2020.
- Sheikh Rabiul Islam, William Eberle, Sheikh K. Ghafoor, Ambareen Siraj, and Mike Rogers, Proceedings: 鈥淒omain Knowledge Aided Explainable Artificial Intelligence for Intrusion Detection and Response鈥, AAAI Spring Symposium on Combining Machine Learning and Knowledge Engineering in Practice, Mar 23 - 25, 2020 at Palo Alto, CA.
- Susan Jeziorowski, Muhammad Ismail and Ambareen Siraj: 鈥淭owards Image-Based Dark Vendor Profiling: An Analysis of Image Metadata and Image Hashing in Dark Web Marketplaces鈥, Proceedings: 6th ACM International Workshop on Security and Privacy Analytics IWSPA 2020, New Orleans, LA, March 18, 2020.
- Md Ahsan Ayub, William A. Johnson, Douglas A. Talbert, and Ambareen Siraj: 鈥淢odel Evasion Attack on Intrusion Detection Systems using Adversarial Machine Learning鈥, Proceedings: 54th Annual Conference on Information Sciences and Systems (CISS: Princeton IEEE Information Theory Society), Princeton, NJ, March 18-20, 2020.
- Awad, Rima Asmar, Juan Lopez Jr, and Mike Rogers. "Volatile Memory Extraction-Based Approach for Level 0-1 CPS Forensics."
- N. Martindale, M. Ismail, and D. A. Talbert, 鈥淓nsemble-Based Online Machine Learning Algorithms for Network Intrusion Detection Systems Using Streaming Data,鈥 MDPI-Information, vol. 11, no. 6, June 2020.
- S. Jeziorowski, M. Ismail, and A. Siraj, 鈥淭owards Image-Based Dark Vendor Profiling: An Analysis of Image Metadata and Image Hashing in Dark Web Marketplaces,鈥 The Sixth International Workshop on Security and Privacy Analytics, March 2020.
- A. Takiddin, M. Ismail, U. Zafar, and E. Serpedin, 鈥淰ariational Auto-encoder-based Detection of Electricity Stealth Cyber-attacks in AMI Networks,'' European Signal Processing Conference (EUSIPCO), accepted in May 2020, to appear.
- Gupta, Deepti, Olumide Kayode, Smriti Bhatt, Maanak Gupta, and Ali Saman Tosun. "Learner's Dilemma: IoT Devices Training Strategies in Collaborative Deep Learning." arXiv preprint arXiv:2007.15215 (2020). (Accepted in IEEE WFIOT 2020)
- Gupta, Deepti, Smriti Bhatt, Maanak Gupta, Olumide Kayode, and Ali Saman Tosun. "Access control model for google cloud iot." In 2020 IEEE 6th Intl Conference on Big Data Security on Cloud (BigDataSecurity), IEEE Intl Conference on High Performance and Smart Computing, (HPSC) and IEEE Intl Conference on Intelligent Data and Security (IDS), pp. 198-208. IEEE, 2020.
- Maanak Gupta, Mahmoud Abdelsalam, and Sudip Mittal. "Enabling and enforcing social distancing measures using smart city and its infrastructures: a COVID-19 Use case." arXiv preprint arXiv:2004.09246 (2020).
- Chukkapalli, Sai Sree Laya, Aritran Piplai, Sudip Mittal, Maanak Gupta, and Anupam Joshi. "A Smart-Farming Ontology for Attribute Based Access Control." In 6th IEEE International Conference on Big Data Security on Cloud (BigDataSecurity 2020). 2020.
- Maanak Gupta, Mahmoud Abdelsalam, Sajad Khorsandroo, and Sudip Mittal. "Security and privacy in smart farming: Challenges and opportunities." IEEE Access 8 (2020): 34564-34584.
- McDole, Andrew, Mahmoud Abdelsalam, Maanak Gupta, and Sudip Mittal. "Analyzing CNN Based Behavioral Malware Detection Techniques on Cloud IaaS." arXiv preprint arXiv:2002.06383 (2020). (Accepted in CLOUD 2020)
- Maanak Gupta, James Benson, Farhan Patwa, and Ravi Sandhu. "Secure V2V and V2I communication in intelligent transportation using cloudlets." arXiv preprint arXiv:2001.04041 (2020).
- Awaysheh, Feras M., Mamoun Alazab, Maanak Gupta, Tom谩s F. Pena, and Jos茅 C. Cabaleiro. "Next-generation big data federation access control: A reference model." Future Generation Computer Systems (2020).
- Mithu, M. Rayhan Ahmed, Vadim Kholodilo, Rajesh Manicavasagam, Denis Ulybyshev, and Mike Rogers. "Secure Industrial Control System with Intrusion Detection." In The Thirty-Third International Flairs Conference. 2020. https://www.aaai.org/ocs/index.php/FLAIRS/FLAIRS20/paper/viewPaper/18397- published in May, 2020
- Farzana Ahamed Bhuiyan and Akond Rahman, "Characterizing Co-located Insecure Coding Patterns in Infrastructure as Code Scripts", to appear in the 2020 Workshop on Human Centric Software Engineering and Cyber Security, co-located the 35th IEEE/ACM International Conference on Automated Software Engineering (ASE).
- Farzana Ahamed Bhuiyan, Akond Rahman and Patrick Morrison, "Vulnerability Discovery Strategies Used in Software Projects", to appear in the 2020 Workshop on Human Centric Software Engineering and Cyber Security, co-located the 35th IEEE/ACM International Conference on Automated Software Engineering (ASE).
- Raunak Shakya and Akond Rahman, "A Preliminary Taxonomy of Techniques Used in Software Fuzzing", to appear in the 7th Annual Hot Topics in the Science of Security (HoTSoS) Symposium 2020.
- Justin Murphy, Elias Brady, Shazibul Islam Shamim, and Akond Rahman, "A Curated Dataset of Security Defects in Scientific Software Projects", to appear in the 7th Annual Hot Topics in the Science of Security (HoTSoS) Symposium 2020.
- Farzana Ahamed Bhuiyan, Raunak Shakya, and Akond Rahman, "Can We Use Software Bug Reports to Identify Software Vulnerability Strategies?", to appear in the 7th Annual Hot Topics in the Science of Security (HoTSoS) Symposium 2020.
- Md. Shazibul Islam Shamim, Farzana Ahamed Bhuiyan, and Akond Rahman, "XI Commandments of Kubernetes Security: A Systematization of Knowledge Related to Kubernetes Security Practices", in the IEEE Secure Development Conference (SecDev) 2020.
- Akond Rahman, Md. Rayhanur Rahman, Chirs Parnin, and Laurie Williams, "Security Smells in Ansible and Chef Scripts: A Replication Study", in the journal of ACM Transactions on Software Engineering and Methodology (TOSEM).
- Maanak Gupta, Feras M. Awaysheh, James Benson, Mamoun Alazab, Farhan Patwa and Ravi Sandhu, 鈥淎n Attribute-Based Access Control for Cloud Enabled Industrial Smart Vehicles鈥, Accepted in IEEE Transactions on Industrial Informatics, 2020.
- Sai Sree Laya Chukkapalli, Sudip Mittal, Maanak Gupta, Mahmoud Abdelsalam, Anupam Joshi, Ravi Sandhu and Karuna Joshi 鈥淥ntologies and Artificial Intelligence Systems for the Cooperative Smart Farming Ecosystem鈥, IEEE Access 8 (2020): 164045-164064.
- Maanak Gupta, Mahmoud Abdelsalam, Sajad Khorsandroo and Sudip Mittal, 鈥淪ecurity and Privacy in Smart Farming: Challenges and Opportunities.鈥 IEEE Access 8 (2020): 34564-34584.
- Feras M. Awaysheh, Mamoun Alazab, Maanak Gupta, Tomas F. Pena and Jose Cabaleiro. 鈥淣ext Generation Big Data Federation Access Control: A Reference Model鈥. Future Generation Computer Science, 2020.
- Sina Sontowski, Maanak Gupta, Sai Sree Laya Chukkapalli, Mahmoud Abdelsalam, Sudip Mittal, Anupam Joshi, and Ravi Sandhu. "Cyber Attacks on Smart Farming Infrastructure." In Proceedings of the IEEE International Conference on Collaboration and Internet Computing (CIC) 2020.
- Aritran Piplai, Sudip Mittal, Mahmoud Abdelsalam, Maanak Gupta, Anupam Joshi, and Tim Finin. "Knowledge Enrichment by Fusing Representations for Malware Threat Intelligence and Behavior." In Proceedings of the IEEE International Conference on Intelligence and Security Informatics (ISI) 2020.
- Ulybyshev, Denis, Christian Bare, Kristen Bellisario, Vadim Kholodilo, Bradley Northern, Abhijeet Solanki, Timothy O鈥橠onnell. 鈥漃rotecting Electronic Health Records in Transit and at Rest.鈥 IEEE 33-rd Intl. Symposium on Computer-Based Medical Systems (CBMS), pp. 449-452, IEEE, 2020.
- Mithu, M Rayhan Ahmed, Vadim Kholodilo, Rajesh Manicavasagam, Denis Ulybyshev and Michael Rogers, 鈥淪ecure Industrial Control System with Intrusion Detection鈥. 33-rd Intl. FLAIRS conf., AAAI, 2020.
- Yilmaz, Ibrahim, Ambareen Siraj and Denis Ulybyshev, 鈥淚mproving DGA-Based Malicious Domain Classifiers for Malware Defense with Adversarial Machine Learning.鈥 To appear in the 4-th Conf. on Information and Communication Technology, IEEE, 2020.
- W. Al Amiri, M. Baza, M. Mahmoud, W. Alasmary, K. Akkaya, 鈥淭owards secure smart parking system using blockchain technology,鈥 Proc. of IEEE Consumer Communications Networking Conference (IEEE CCNC鈥20), Las Vegas, NV.
- M. Baza, J. Baxter, N. Lasla, M. Mahmoud, M. Abdallah, and M. Younis, 鈥淚ncentivized and secure blockchain-based firmware update and dissemination for autonomous vehicles,鈥 in Connected and Autonomous Vehicles in Smart Cities. CRC press, 2020.
- R. Paudel and W. Eberle, 鈥淪NAPSKETCH: Graph Representation Approach for Intrusion Detection in a Streaming Graph,鈥 Conference on Knowledge Discovery and Data Mining (KDD) Mining and Learning with Graphs (MLG), August 2020.
- S. R. Islam, W. Eberle, and S. Ghafoor, 鈥淭owards Quantification of Explainability in Explainable Artificial Intelligence Methods,鈥 International Conference of the Florida Artificial Intelligence Research Society (FLAIRS), May 2020.
- P. Kandel and W. Eberle, 鈥淣ode Similarity For Anomaly Detection in Attributed Graphs,鈥 International Conference of the Florida Artificial Intelligence Research Society (FLAIRS), May 2020.
- S. R. Islam, W. Eberle, S. Ghafoor, A. Siraj, and M. Rogers, 鈥淒omain Knowledge Aided Explainable Artificial Intelligence for Intrusion Detection and Response,鈥 Proceedings of the AAAI 2020 Spring Symposium on Combining Machine Learning and Knowledge Engineering in Practice (AAAI-MAKE), March 2020.
- Piplai, Aritran, Sudip Mittal, Mahmoud Abdelsalam, Maanak Gupta, Anupam Joshi, and Tim Finin. "Knowledge Enrichment by Fusing Representations for Malware Threat Intelligence and Behavior." accepted at IEEE International Conference on Intelligence and Security Informatics (ISI) , 2020.
- Andrew McDole, Maanak Gupta, Mahmoud Abdelsalam, Sudip Mittal, and Mamoun Alazab,鈥 Deep Learning Techniques for Behavioural Malware Analysis in Cloud IaaS鈥, To appear in Malware Analysis using Artificial Intelligence and Deep Learning, Published by Springer, 2020.
- Andrew McDole, Maanak Gupta, and Mahmoud Abdelsalam, 鈥淐omparing Deep Learning Based Malware Detection Techniques in Cloud IaaS鈥, Research and Creative Inquire Day (2020), 成年人深夜福利在线观看 Tech University.
- Austin Brown, Kendall Land, Andy Brown, and Maanak Gupta, 鈥淒etecting Illegitimate Use of Legitimate Credentials鈥, Research and Creative Inquire Day (2020), 成年人深夜福利在线观看 Tech University.
- Mohammad Mehedi Hasan, Farzana Ahamed Bhuiyan, and Akond Rahman, "Testing Practices for Infrastructure as Code", to appear in the Languages and Tools for Next Generation Testing Workshop - LANGETI 2020, co-located with the ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering (ESEC/FSE). Pre-print
- Farzana Ahamed Bhuiyan and Akond Rahman, "Characterizing Co-located Insecure Coding Patterns in Infrastructure as Code Scripts", to appear in the 2020 Workshop on Human Centric Software Engineering and Cyber Security, co-located with the 35th IEEE/ACM International Conference on Automated Software Engineering (ASE). Pre-print
- Akond Rahman and Farzana Ahamed Bhuiyan, "A Vision to Mitigate Bioinformatics Software Development Challenges", to appear in the 2020 Workshop on Human Centric Software Engineering and Cyber Security, co-located with the 35th IEEE/ACM International Conference on Automated Software Engineering (ASE). Pre-print
- Akond Rahman, Effat Farhana, and Laurie Williams, "The 'as Code' Activities: Development Anti-patterns for Infrastructure as Code", in the Journal of Empirical Software Engineering (EMSE) 2020. (Journal-first at FSE 2020) Pre-print
- Akond Rahman, Effat Farhana, Chirs Parnin, and Laurie Williams, "Gang of Eight: A Defect Taxonomy for Infrastructure as Code Scripts", to appear in the International Conference on Software Engineering (ICSE) 2020. Pre-print
- Yilmaz, Ibrahim, Ambareen Siraj and Denis Ulybyshev, 鈥淚mproving DGA-Based Malicious Domain Classifiers for Malware Defense with Adversarial Machine Learning.鈥 To appear in the 4-th Conf. on Information and Communication Technology, IEEE, 2020.
- Maanak Gupta, Feras M. Awaysheh, James Benson, Mamoun Alazab, Farhan Patwa and Ravi Sandhu, 鈥淎n Attribute-Based Access Control for Cloud Enabled Industrial Smart Vehicles鈥, Accepted in IEEE Transactions on Industrial Informatics, 2020.
- Aritran Piplai, Sudip Mittal, Mahmoud Abdelsalam, Maanak Gupta, Anupam Joshi, and Tim Finin. "Knowledge Enrichment by Fusing Representations for Malware Threat Intelligence and Behavior." In Proceedings of the IEEE International Conference on Intelligence and Security Informatics (ISI) 2020.
- 2019 Publications
2019 Publications
- M. Hailesellasie*, J. Nelson*, F. Khalid*, S. R. Hasan, "VAWS: Vulnerability Analysis of Neural Networks using Weight Sensitivity", in 62nd IEEE International MidWest Symposium on Circuits and Systems, 2019.
- H Mohammed*, T. A. Odetola*, S. R. Hasan, S. Stissi*, I. Garlinx*, F. Awwad, "(HIADIoT): Hardware Intrinsic Attack Detection in Internet of Things; Leveraging Power Profiling", in 62nd IEEE International MidWest Symposium on Circuits and Systems, 2019.
- Enahoro Oriero*, S. R. Hasan, "Survey on Recent Counterfeit IC Detection Techniques and Future Research Directions", Integration, The VLSI Journal, 2019
- Alsharif, Ahmad, Mahmoud Nabil, Mohamed Mahmoud, and Mohamed Abdallah. "EPDA: Efficient and Privacy-Preserving Data Collection and Access Control Scheme for Multi-Recipient AMI Networks." IEEE Access (2019).
- Shafee, Ahmed, Mohamed Baza, Douglas A. Talbert, Mostafa M. Fouda, Mahmoud Nabil, and Mohamed Mahmoud. "Mimic learning to generate a shareable network intrusion detection model." arXiv preprint arXiv:1905.00919 (2019).
- Baza, Mohamed, Mahmoud Nabil, Niclas Bewermeier, Kemal Fidan, Mohamed Mahmoud, and Mohamed Abdallah. "Detecting sybil attacks using proofs of work and location in vanets." arXiv preprint arXiv:1904.05845 (2019).
- Amiri, Wesam Al, Mohamed Baza, Karim Banawan, Mohamed Mahmoud, Waleed Alasmary, and Kemal Akkaya. "Privacy-preserving smart parking system using blockchain and private information retrieval." arXiv preprint arXiv:1904.09703 (2019).
- M. Nabil, M. Ismail, M. M. E. A. Mahmoud, W. Alasmary and E. Serpedin, "PPETD: Privacy-Preserving Electricity Theft Detection Scheme With Load Monitoring and Billing for AMI Networks," in IEEE Access, vol. 7, pp. 96334-96348, 2019.
- Pazos-Revilla, Marbin, Ahmad Alsharif, Surya Gunukula, Terry N. Guo, Mohamed Mahmoud, and Xuemin Sherman Shen. "Privacy-Preserving Physical-Layer-Assisted Charging Authorization Scheme for EV Dynamic Charging System."
- E. M. Radi, N. Lasla, S. Bakiras and M. Mahmoud, "Privacy-Preserving Electric Vehicle Charging for Peer-to-Peer Energy Trading Ecosystems," ICC 2019 - 2019 IEEE International Conference on Communications (ICC), Shanghai, China, 2019, pp. 1-6.
- Alsharif, M. Nabil, S. Tonyali, H. Mohammed, M. Mahmoud and K. Akkaya, "EPIC: Efficient Privacy-Preserving Scheme With EtoE Data Integrity and Authenticity for AMI Networks," in IEEE Internet of Things Journal, vol. 6, no. 2, pp. 3309-3321, April 2019.
- Ford, Vitaly, and Ambareen Siraj. "GenCyberCoin: an engaging, customizable, and gamified web platform for cybersecurity summer camps and classrooms." Journal of Computing Sciences in Colleges 35, no. 3 (2019): 87-96.
- Paudel, Ramesh, Peter Harlan, and William Eberle. "Detecting the onset of a network layer dos attack with a graph-based approach." In The Thirty-Second International Flairs Conference. 2019.
- Ramesh Paudel, Prajwal Kandel, and William Eberle, 鈥淒etecting Spam Tweets in Trending Topics using Graph-Based Approach,鈥 Proceedings of the Future Technologies Conference (FTC), October 2019.
- Sheikh Rabiul Islam, William Eberle, Sid C. Bundy, and Sheikh Ghafoor, 鈥淚nfusing Domain Knowledge in AI-based 鈥渂lack box鈥 Models for Better Explainability with Application in Bankruptcy Prediction,鈥 Workshop on Anomaly Detection in Finance, SIGKDD Conference on Knowledge Discovery and Data Mining (KDD), August 2019.
- Bhuiyan, M. B. Sharif, P. J. Tinker, W. Eberle, D. A. Talbert, S. K. Ghafoor, and L. Frey, 鈥淕ene Selection and Clustering of Breast Cancer Data,鈥 International Conference of the Florida AI Research Society (FLAIRS), May 2019.
- Sirisha Velampalli, Lenin Mookiah, and William Eberle, 鈥淒iscovering Suspicious Patterns Using a Graph Based Approach,鈥 International Conference of the Florida AI Research Society (FLAIRS), May 2019.
- Ramesh Paudel, Peter Harlan, and William Eberle, 鈥淒etecting the Onset of a Network Layer DoS Attack with a Graph-Based Approach,鈥 International Conference of the Florida AI Research Society (FLAIRS), May 2019.
- M. A. Ayub, Z. A. Onik, and S. Smith, 鈥淧arallelized RSA Algorithm: An Analysis with Performance Evaluation using OpenMP Library in High Performance Computing Environment,鈥 2019 22nd International Conference on Computer and Information Technology (ICCIT), Dhaka, Bangladesh, 2019, pp. 1-6.
- M. A. Ayub, S. Smith, and A. Siraj, 鈥淎 Protocol Independent Approach in Network Covert Channel Detection,鈥 2019 IEEE International Conference on Computational Science and Engineering (CSE) and IEEE International Conference on Embedded and Ubiquitous Computing (EUC), New York, NY, USA, 2019, pp. 165-170.
- Enahoro Oriero*, S. R. Hasan, "Survey on Recent Counterfeit IC Detection Techniques and Future Research Directions", Integration, The VLSI Journal, 2019
- H Mohammed*, T. A. Odetola*, S. R. Hasan, S. Stissi*, I. Garlinx*, F. Awwad, "(HIADIoT): Hardware Intrinsic Attack Detection in Internet of Things; Leveraging Power Profiling", in 62nd IEEE International MidWest Symposium on Circuits and Systems, 2019.
- M. Hailesellasie*, J. Nelson*, F. Khalid*, S. R. Hasan, "VAWS: Vulnerability Analysis of Neural Networks using Weight Sensitivity", in 62nd IEEE International MidWest Symposium on Circuits and Systems, 2019.
- M. Nabil, M. Ismail, M. Mahmoud, W. Alasmary, and E. Serpedin, 鈥淧PETD: Privacy-preserving electricity theft detection scheme with load monitoring and billing for AMI networks,鈥 IEEE Access, Special issue on Security, Privacy, and Trust Management in Smart Cities, vol. 7, no. 1, pp. 96 334鈥96 348, Dec. 2019.
- Shafee, M. Baza, D. Talbert, M. Fouda, M. Nabil, and M. Mahmoud, 鈥淢imic learning to generate a shareable network intrusion detection model,鈥 Proc. IEEE Consumer Communications Networking Conference (IEEE CCNC鈥19), Las Vegas, USA, January 2019.
- M. Mahmoud, K. Rabieh, A. Sherif, E. Oriero, M. Ismail, E. Serpedin, and K. Qaraqe, 鈥淧rivacy-preserving fine-grained data retrieval scheme for mobile social networks (MSNs),鈥 IEEE Transactions on Dependable and Secure Computing (TDSC), vol. 16, no. 5, pp. 871鈥884, Sept./Oct. 2019.
- M. Nabil, M. Ismail, M. Mahmoud, and E. Serpedin, 鈥淒eep recurrent electricity theft detection in AMI networks with evolutionary hyper-parameter tuning,鈥 Proc. of IEEE International Conference on Internet of Things (iThings鈥19), Atlanta, USA, July 2019
- M. Baza, M. Nabil, M. Ismail, and M. Mahmoud, E. Serpedin, and M. Rahman, 鈥淏lockchainbased privacy-preserving charging coordination mechanism for energy storage units,鈥 Proc. of Recent Advances on Blockchain and Its Applications Symposium of the 2nd IEEE International Conference on Blockchain (Blockchain-2019), Atlanta, USA, July 2019.
- W. Al Amiri, M. Baza, K. Banawan, M. Mahmoud, W. Alasmary, K. Akkaya, 鈥淧rivacy-preserving smart parking system using blockchain and private information retrieval,鈥 Proc. of the 2019 International Conference on Smart Applications, Communications and Networking (IEEE SmartNets), July 2019.
- M. Mahmoud, and M. Song, 鈥淢DMS: Efficient and privacy-preserving multi-dimension and multi-subset data collection for AMI networks,鈥 IEEE Internet of Things Journal (IoT), Aug. 2019, accepted, In press.
- M. Baza, N. Lasla, M. Mahmoud, and M. Abdallah, 鈥淏-Ride: Ride sharing with privacy preservation, trust and fair payment atop public blockchain,鈥 IEEE Transactions on Network Science and Engineering, 2019.
- M. Baza, M. Nabil, N. Lasla, K. Fidan, M. Mahmoud, M. Abdallah, 鈥淏lockchain-based firmware update scheme tailored for autonomous vehicles,鈥 Proc. of IEEE WCNC鈥19, Marrakech, Morocco, April 2019.
- M. Nabil, M. Mahmoud, A. Sherif, A. Alsharif, and M. Abdulla, 鈥淓fficient privacy-preserving ride sharing organization for transferable and non-transferable services,鈥 IEEE Transactions on Dependable and Secure Computing (TDSC), May 2019.
- M. Baza, M. Nabil, N. Bewermeier, K. Fidan, M. Mahmoud, and M. Abdallah, 鈥淒etecting sybil attacks using proofs of work and location in VANETs,鈥 IEEE Transactions on Dependable and Secure Computing (TDSC), 2019.
- Nuthan Munaiah, Akond Rahman, Justin Pelletier, Laurie Williams, and Andrew Meneely "Characterizing Attacker Behavior in a Cybersecurity Penetration Testing Competition" in Proceedings of the International Symposium on Empirical Software Engineering and Measurement (ESEM) 2019, Porto de Galinhas, Brazil, Sep 2019.
- Md. Rayhanur Rahman, Akond Rahman, and Laurie Williams "Share, But Be Aware: Security Smells in Python Gists" in Proceedings of the International Conference on Software Maintenance and Evolution (ICSME) 2019, Ohio, USA, Oct 2019.
- Terry Guo, Animesh Dahal and Ambareen Siraj, 鈥淧recise Feature Selection and Case Study of Intrusion Detection in an Industrial Control System Environment鈥, 15th International Conference on Machine Learning and Data Mining held July 13 - 18, New York, NY, 2019.
- Islam, Sheikh Rabiul, William Eberle, Sheikh K. Ghafoor, Ambareen Siraj, and Mike Rogers. "Domain Knowledge Aided Explainable Artificial Intelligence for Intrusion Detection and Response." arXiv preprint arXiv:1911.09853 (2019).
- Ayub, Md Ahsan, Zishan Ahmed Onik, and S. "Parallelized RSA Algorithm: An Analysis with Performance Evaluation using OpenMP Library in High Performance Computing Environment." (2019).
- Chen, Qian, Sheikh Rabiul Islam, Henry Haswell, and Robert A. Bridges. "Automated Ransomware Behavior Analysis: Pattern Extraction and Early Detection." In International Conference on Science of Cyber Security, pp. 199-214. Springer, Cham, 2019.
- M. Nabil, M. Mahmoud, M. Ismail and E. Serpedin, "Deep Recurrent Electricity Theft Detection in AMI Networks with Evolutionary Hyper-Parameter Tuning," 2019 International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData), Atlanta, GA, USA, 2019, pp. 1002-1008.
- Pazos-Revilla, Marbin, Mohamed Baza, Mahmoud Nabil, Ahmed Sherif, Mohamed Mahmoud, and Waleed Alasmary. "Privacy-Preserving and Collusion-Resistant Charging Coordination Schemes for Smart Grid." arXiv preprint arXiv:1905.04666 (2019).
- Nabil, Mahmoud, Muhammad Ismail, Mohamed Mahmoud, Mostafa Shahin, Khalid Qaraqe, and Erchin Serpedin. "Deep Learning-Based Detection of Electricity Theft Cyber-Attacks in Smart Grid AMI Networks." In Deep Learning Applications for Cyber Security, pp. 73-102. Springer, Cham, 2019.
- Yilmaz, Ibrahim, and Rahat Masum. "Expansion of cyber attack data from unbalanced datasets using generative techniques." arXiv preprint arXiv:1912.04549 (2019).
- A. Alsharif, A. Shafee, M. Nabil, M. Mahmoud and W. Alasmary, "A Multi-Authority AttributeBased Signcryption Scheme with Efficient Revocation for Smart Grid Downlink Communication," 2019 International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE.
- Baza, Mohamed, Andrew Salazar, Mohamed Mahmoud, Mohamed Abdallah, and Kemal Akkaya. "On sharing models instead of data using mimic learning for smart health applications." arXiv preprint arXiv:1912.11210 (2019).
- M. Nabil, A. Sherif, M. Mahmoud, A. Alsharif and M. Abdallah, "Efficient and Privacy-Preserving Ridesharing Organization for Transferable and Non-Transferable Services," in IEEE Transactions on Dependable and Secure Computing.
- Islam, Sheikh Rabiul, William Eberle, Sheikh K. Ghafoor, Sid C. Bundy, Douglas A. Talbert, and Ambareen Siraj. "Investigating bankruptcy prediction models in the presence of extreme class imbalance and multiple stages of economy." arXiv preprint arXiv:1911.09858 (2019).
- R. Paudel, T. Muncy and W. Eberle, "Detecting DoS Attack in Smart Home IoT Devices Using a Graph-Based Approach," 2019 IEEE International Conference on Big Data (Big Data), Los Angeles, CA, USA, 2019, pp. 5249-5258.
- Ramesh Paudel, Prajwal Kandel, and William Eberle, 鈥淒etecting Spam Tweets in Trending Topics using Graph-Based Approach,鈥 Proceedings of the Future Technologies Conference (FTC), October 2019.
- Sheikh Rabiul Islam, William Eberle, Sid C. Bundy, and Sheikh Ghafoor, 鈥淚nfusing Domain Knowledge in AI-based 鈥渂lack box鈥 Models for Better Explainability with Application in Bankruptcy Prediction,鈥 Workshop on Anomaly Detection in Finance, SIGKDD Conference on Knowledge Discovery and Data Mining (KDD), August 2019.
- Maanak Gupta, James Benson, Farhan Patwa and Ravi Sandhu, Dynamic Groups and Attribute Based Access Control for Next-Generation Smart Cars. In Proceedings of the 9th ACM Conference on Data and Application Security and Privacy (CODASPY), Dallas, Texas, March 25-27, 2019, pages 12.
- Maanak Gupta, James Benson, Farhan Patwa and Ravi Sandhu, Secure Cloud Assisted Smart Cars Using Dynamic Groups and Attribute Based Access Control." arXiv preprint arXiv:1908.08112 (2019).
- Effat Farhana, Nasif Imtiaz, and Akond Rahman "Synthesizing Program Execution Time Discrepancies in Julia Used for Scientific Software" in Proceedings of the International Conference on Software Maintenance and Evolution (ICSME) 2019, Ohio, USA, Oct 2019 Pre-print
- Akond Rahman and Laurie Williams, "Source Code Properties of Defective Infrastructure as Code Scripts", in the Journal of Information and Software Technology (IST), (Journal-first at ICSME 2019) Pre-print
- Akond Rahman, "Anti-patterns in Infrastructure as Code", PhD Dissertation, NC State University 2019. (NC State CSC and COE Distinguished Dissertation Award) Pre-print
- Kanthi Sarpatwar, Venkata Sitaramagiridharganesh Ganapavarapu, Karthikeyan Shanmugam, Akond Rahman, and Roman Vaculin, "Blockchain Enabled AI Marketplace: The Price You Pay For Trust" in Proceedings of the International Workshop of Blockchain Meets Computer Vision and Artificial Intelligence 2019, CA, USA 2019. Preprint
- Akond Rahman, Effat Farhana, and Nasif Imtiaz, "Snakes in Paradise?: Insecure Python-related Coding Practices in Stack Overflow" in Proceedings of the International Conference on Mining Software Repositories (MSR) 2019, Montreal, Canada, May 2019. Preprint
- Nasif Imtiaz, Akond Rahman, Effat Farhana, and Laurie Williams, "Challenges with Responding to Static Analysis Tool Alerts" in Proceedings of the International Conference on Mining Software Repositories (MSR) 2019, Montreal, Canada, May 2019. Preprint
- Akond Rahman and Laurie Williams, "Poster: A Bird's Eye View of Knowledge Needs Related to Penetration Testing" in Proceedings of the Symposium and Bootcamp on the Science of Security (HotSoS) 2019, Nashville, 成年人深夜福利在线观看, April 2019 Preprint
- Akond Rahman, Chirs Parnin, and Laurie Williams, "The Seven Sins: Security Smells in Infrastructure as Code Scripts", in the International Conference on Software Engineering (ICSE) 2019. (ACM SIGSOFT Distinguished Paper Award) Pre-print
- R Atat, M Ismail, Multi鈥怰AT D2D Communication Paradigms: Potential Benefits and Challenging Issues, Wiley 5G Ref: The Essential 5G Reference Online, 1-19
- R Atat, M Ismail, E Serpedin, Stochastic Geometry-based Model for Spatio-temporal Expanding Smart Grids, 2019 IEEE Innovative Smart Grid Technologies-Asia (ISGT Asia), 457-462
- M Nabil, M Mahmoud, M Ismail, E Serpedin, Deep Recurrent Electricity Theft Detection in AMI Networks with Evolutionary Hyper-Parameter Tuning, 2019 International Conference on Internet of Things (iThings) and IEEE Green
- R Atat, M Ismail, MF Shaaban, E Serpedin, T Overbye, Stochastic Geometry-Based Model for Dynamic Allocation of Metering Equipment in Spatio-Temporal Expanding Power Grids, IEEE Transactions on Smart Grid 11 (3), 2080-2091
- IS Bayram, M Ismail, A Stochastic Model for Fast Charging Stations with Energy Storage Systems, 2019 IEEE Transportation Electrification Conference and Expo (ITEC), 1-5
- HB Kong, M Ismail, E Serpedin, KA Qaraqe, Energy Efficient Optimization of Base Station Density for VLC Networks, ICC 2019-2019 IEEE International Conference on Communications (ICC), 1-6
- M Ismail, IS Bayram, K Qaraqe, E Serpedin, IMA Imran, YA Sambo, ..., 5G-Enhanced Smart Grid Services, Enabling 5G Communication Systems to Support Vertical Industries, 28-102
- M Nabil, M Ismail, M Mahmoud, M Shahin, K Qaraqe, E Serpedin, Deep Learning-Based Detection of Electricity Theft Cyber-Attacks in Smart Grid AMI Networks, Deep Learning Applications for Cyber Security, 73-102
- M Nabil, M Ismail, MMEA Mahmoud, W Alasmary, E Serpedin, PPETD: Privacy-Preserving Electricity Theft Detection Scheme With Load Monitoring and Billing for AMI Networks, IEEE Access 7, 96334-96348
- MF Shaaban, S Mohamed, M Ismail, KA Qaraqe, E Serpedin, Joint planning of smart EV charging stations and DGs in Eco-friendly remote hybrid microgrids, IEEE Transactions on Smart Grid 10 (5), 5819-5830
- M Baza, M Nabil, M Ismail, M Mahmoud, E Serpedin, MA Rahman, Blockchain-based charging coordination mechanism for smart grid energy storage units, 2019 IEEE International Conference on Blockchain (Blockchain), 504-509
- J Kong, ZY Wu, M Ismail, E Serpedin, KA Qaraqe, Q-Learning Based Two-Timescale Power Allocation for Multi-Homing Hybrid RF/VLC Networks, IEEE Wireless Communications Letters 9 (4), 443-447
- 2018 Publications
2018 Publications
- J. Shelley*, H. Mohammed*, L. Zink*, S. R. Hasan, O. Elkeelany, "Covert Communication Channel Detection in Low-Power Battery Operated IoT Devices: Leveraging Power Profiles", in IEEE South East Conference, 2018
- E. Oriero*, S. R. Hasan, "All Digital Low Power Aging Sensor for Counterfeit Detection in Integrated Circuits", in IEEE International MidWest Symposium on Circuits and Systems, 2018
- H. Mohammed*, J. Howell*, S. R. Hasan, N. Guo, O. Elkeelany, " Hardware Trojan Based Security Issues in Home Area Network: A Testbed Setup" , in IEEE International MidWest Symposium on Circuits and Systems, 2018
- S. R. Hasan, Charles Kamhoua, Kevin Kwiat and Laurent Njilla, "A Novel Framework to Introduce Hardware Trojan Monitors Using Model Checking Based Counterexamples: Inspired by Game Theory" in IEEE International MidWest Symposium on Circuits and Systems, 2018
- M. T. Hailesellasie*, S. R. Hasan, "Intrusion Detection in PLC Based Industrial Controls Systems Using Formal Model of the System in Conjunction with Graphs", Journal of Hardware and Systems Security, Vol. 2, Issue 1, pp. 1-14, March, 2018
- F. Khalid*, S. R. Hasan, O. Hasan, F. Awwad, "Runtime Hardware Trojan Monitors Though Modeling Burst Mode Communication using Formal Verification", Integration, The VLSI Journal, Vol. 61, pp. 62-76, March 2018,
- Lenin Mookiah, William Eberle, and M. Mondal, 鈥淧ersonalized News Recommendation using Graph-Based Approach鈥, Intelligent Data Analysis, an International Journal, Volume 22 (2018) 881鈥909.
- Ramesh Paudel, William Eberle, and Lawrence Holder, 鈥淎nomaly Detection of Elderly Patient Activities in Smart Homes using a Graph-Based Approach,鈥 International Conference on Data Science (ICDATA), July 2018.
- Sheikh Rabiul Islam, William Eberle, and Sheikh Ghafoor, 鈥淐redit Default Mining Using Combined Machine Learning and Heuristic Approach,鈥 International Conference on Data Science (ICDATA), July 2018.
- Rina Singh, Jeffrey Graves, Douglas Talbert, and William Eberle, 鈥淧refix and Suffix Sequential Pattern Mining鈥, Conference on Machine Learning and Data Mining (MLDM), July, 2018.
- Ramesh Paudel, Kimberlyn Dunn, William Eberle, and Danielle Chaung, 鈥淐ognitive Health Prediction on the Elderly Using Sensor Data in Smart Homes,鈥 International Conference of the Florida AI Research Society (FLAIRS), May 2018.
- Enahoro Oriero and Mohammad Ashiqur Rahman, Privacy Preserving Fine-Grained Data Distribution Aggregation for Smart Grid AMI Networks, the 37th International Conference for Military Communications (MILCOM), Los Angeles, USA, October 2018.
- Anshu Bhattarai, Ambareen Siraj, 鈥淚ncreasing Accuracy of Hand-Motion Based Continuous Authentication Systems鈥, Proceedings: to 9th IEEE Annual Ubiquitous Computing, Electronics & Mobile Communication Conference (UEMCON) to be held in New York, NY, November 8-10, 2018.
- Vitaly Ford, Daniel Taylor, Ambareen Siraj, 鈥淎MIsim: Application-layer Advanced Metering Infrastructure Simulation Framework for Secure Communication Protocol Performance Evaluation鈥, Proceedings: 11th USENIX Workshop on Cyber Security Experimentation and Test (CSET 鈥18) held in Baltimore, MD, August, 2018.
- A H M Jakaria and Mohammad Ashiqur Rahman, Formal Analysis of k-Resiliency for Collaborative UAVs, The 42nd IEEE Computer Society International Conference on Computers, Software, and Applications (COMPSAC), Tokyo, Japan, July 2018.
- MGM Mehedi Hasan, Amarjit Datta, Mohammad A. Rahman, and Hossain Shahriar, Chained of Things: A Secure and Dependable Design of Autonomous Vehicle Services, 13th IEEE International Workshop on Security, Trust, and Privacy for Software Applications (STPSA) in conjunction with the 42th IEEE COMPSAC, Tokyo, Japan, July 2018.
- Madhukrishna Priyadarsini, Padmalochan Bera, and Mohammad A. Rahman, A New Approach for Energy Efficiency in Software Defined Network, Fifth International Conference on Software Defined Systems (SDS), Barcelona, Spain, Apr 2018.
- Bahman Rashidi, Carol Fung, and Mohammad A. Rahman, A Scalable and Flexible DDoS Mitigation System Using Network Function Virtualization, IEEE/IFIP Workshop on Security for Emerging Distributed Network Technologies in association with IEEE/IFIP NOMS, Taipei, Taiwan, Apr 2018.
- Mohammad Ashiqur Rahman and Amarjit Datta, Impact of Stealthy Attacks on Optimal Power Flow: A Simulink-Driven Formal Analysis, IEEE Transactions on Dependable and Secure Computing (TDSC), February 2018 (Online).
- Islam, S., Eberle, W., & Ghafoor, S. (2018). Credit Default Mining Using Combined Machine Learning and Heuristic Approach.
- Khalid, Faiq & Nanjiani, Sunil & Hasan, Syed Rafay & Hasan, Osman & Shafique, Muhammad & Awwad, Falah. (2018). Low Power Digital Clock Multipliers for Battery-Operated Internet of Things (IoT) Devices. 10.1109/ISCAS.2018.8351102.
- Mohammed, Hawzhin & Rafay Hasan, Syed & Ashiqur Rahman, Mohammad. (2018). Load Control and Privacy-Preserving Scheme for Data Collection in AMI Networks.
- Khalid, Faiq & Hasan, Syed Rafay & Hasan, Osman & Awwad, Falah. (2018). Runtime Hardware Trojan Monitors Through Modeling Burst Mode Communication Using Formal Verification. Integration the VLSI Journal. 61. 62-76. 10.1016/j.vlsi.2017.11.003.
- Hailesellasie, Muluken & Hasan, Syed Rafay & Khalid, Faiq & Awwad, Falah & Shafique, Muhammad. (2018). FPGA-Based Convolutional Neural Network Architecture with Reduced Parameter Requirements. 10.1109/ISCAS.2018.8351283.
- Fulum Mossa, Siraj & Hasan, Syed Rafay & Elkeelany, Omar. (2017). Hardware trojans in 3-D ICs due to NBTI effects and countermeasure. Integration, the VLSI Journal. 59. 10.1016/j.vlsi.2017.03.009.
- F. Khalid*, S. R. Hasan, O. Hasan, F. Awwad, "Runtime Hardware Trojan Monitors Though Modeling Burst Mode Communication using Formal Verification", Integration, The VLSI Journal, Vol. 61, pp. 62-76, March 2018,
- M. Nabil, M. Ismail, M. Mahmoud, M. Shahin, K. Qaraqe, and E. Serpedin, 鈥淒eep Learning-Based Detection of Electricity Theft Cyber-Attacks in Smart Grid AMI Networks,鈥 in Deep Learning Applications for Cyber Security, Advanced Sciences and Technologies for Security Applications Series. Springer, 2018.
- M. Pazos-Revilla, A. Alsharif, S. Gunukula, N. Guo, M. Mohamed, and X. Shen, 鈥淧rivacy-preserving physical-layer-assisted charging authorization scheme for EV dynamic charging system,鈥 IEEE Transactions on Vehicular Technology, vol. 67, no. 4, pp. 3304鈥3318, April 2018.
- Vitaly Ford, Daniel Taylor, Ambareen Siraj, 鈥淎MIsim: Application-layer Advanced Metering Infrastructure Simulation Framework for Secure Communication Protocol Performance Evaluation鈥, Proceedings: 11th USENIX Workshop on Cyber Security Experimentation and Test (CSET 鈥18) held in Baltimore, MD, August, 2018.
- Enahoro Oriero and Mohammad Ashiqur Rahman, Privacy Preserving Fine-Grained Data Distribution Aggregation for Smart Grid AMI Networks, the 37th International Conference for Military Communications (MILCOM), Los Angeles, USA, October 2018.
- A H M Jakaria and Mohammad Ashiqur Rahman, Formal Analysis of k-Resiliency for Collaborative UAVs, The 42nd IEEE Computer Society International Conference on Computers, Software, and Applications (COMPSAC), Tokyo, Japan, July 2018.
- MGM Mehedi Hasan, Amarjit Datta, Mohammad A. Rahman, and Hossain Shahriar, Chained of Things: A Secure and Dependable Design of Autonomous Vehicle Services, 13th IEEE International Workshop on Security, Trust, and Privacy for Software Applications (STPSA) in conjunction with the 42th IEEE COMPSAC, Tokyo, Japan, July 2018.
- Mohammed, Hawzhin, Syed Rafay Hasan, and Mohammad Ashiqur Rahman. "Load Control and Privacy-Preserving Scheme for Data Collection in AMI Networks." arXiv preprint arXiv:1807.11565 (2018).
- Jakaria, A. H. M., Md Mosharaf Hossain, and Mohammad Ashiqur Rahman. "Smart Weather Forecasting Using Machine Learning: A Case Study in 成年人深夜福利在线观看." (2018).
- Oriero, Enahoro, and Mohammad Ashiqur Rahman. "Privacy Preserving Fine-Grained Data Distribution Aggregation for Smart Grid AMI Networks." MILCOM 2018-2018 IEEE Military Communications Conference (MILCOM). IEEE, 2018.
- Hasan, Syed Rafay, Charles A. Kamhoua, Kevin A. Kwiat, and Laurent Njilla. "A Novel Framework to Introduce Hardware Trojan Monitors using Model Checking Based Counterexamples: Inspired by Game Theory." In 2018 IEEE 61st International Midwest Symposium on Circuits and Systems (MWSCAS), pp. 853-856. IEEE, 2018.
- Islam, Sheikh Rabiul, Sheikh Khaled Ghafoor, and William Eberle. "Mining Illegal Insider Trading of Stocks: A Proactive Approach." In 2018 IEEE International Conference on Big Data (Big Data), pp. 1397-1406. IEEE, 2018.
- Baza, Mohamed, Mahmoud Nabil, Muhammad Ismail, Mohamed Mahmoud, Erchin Serpedin, and Mohammad Rahman. "Blockchain-based privacy-preserving charging coordination mechanism for energy storage units." arXiv preprint arXiv:1811.02001 (2018).
- M. Nabil, A. Alsharif, A. Sherif, M. Mahmoud and M. Younis, "Efficient Multi-Keyword Ranked Search over Encrypted Data for Multi-Data-Owner Settings," 2018 IEEE International Conference on Communications (ICC), Kansas City, MO, 2018, pp. 1-6.
- M. Nabil, M. Ismail, M. Mahmoud, M. Shahin, K. Qaraqe and E. Serpedin, "Deep Recurrent Electricity Theft Detection in AMI Networks with Random Tuning of Hyper-parameters," 2018 24th International Conference on Pattern Recognition (ICPR), Beijing, 2018, pp. 740-745.
- Hossain, Md Mosharaf, Thomas M. Hines, Sheikh K. Ghafoor, Ryan J. Marshall, Muzakhir S. Amanzholov, and Ramakrishnan Kannan. "Performance Issues of SYRK Implementations in Shared Memory Environments for Edge Cases." In 2018 21st International Conference of Computer and Information Technology (ICCIT), pp. 1-7. IEEE, 2018.
- Mohammed, Hawzhin, Jimmy Howell, Syed Rafay Hasan, Nan Guo, Faiq Khalid, and Omar Elkeelany. "Hardware Trojan Based Security Issues in Home Area Network: A Testbed Setup." In 2018 IEEE 61st International Midwest Symposium on Circuits and Systems (MWSCAS), pp. 972-975. IEEE, 2018.
- Oriero, Enahoro, and Syed Rafay Hasan. "All Digital Low Power Aging Sensor for Counterfeit Detection in Integrated Circuits." In 2018 IEEE 61st International Midwest Symposium on Circuits and Systems (MWSCAS), pp. 33-36. IEEE, 2018.
- Baza, Mohamed, Mahmoud Nabil, Noureddine Lasla, Kemal Fidan, Mohamed Mahmoud, and Mohamed Abdallah. "Blockchain-based Firmware Update Scheme Tailored for Autonomous Vehicles." arXiv preprint arXiv:1811.05905(2018).
- Alsharif, Ahmad, Mahmoud Nabil, Samet Tonyali, Hawzhin Mohammed, Mohamed Mahmoud, and Kemal Akkaya. "EPIC: Efficient Privacy-Preserving Scheme with E2E Data Integrity and Authenticity for AMI Networks." IEEE Internet of Things Journal (2018).
- David W. Brown, Sheikh K. Ghafoor, and Stephen Canfield. 2018. Instruction of introductory programming course using multiple contexts. In Proceedings of the 23rd Annual ACM Conference on Innovation and Technology in Computer Science Education (ITiCSE 2018). ACM, New York, NY, USA, 147-152. DOI:
- Sherif, Ahmed, Muhammad Ismail, Marbin Pazos-Revilla, Mohamed Mahmoud, Kemal Akkaya, Erchin Serpedin, and Khalid Qaraqe. "Privacy preserving power charging coordination scheme in the smart grid." Transportation and Power Grid in Smart Cities: Communication Networks and Services (2018): 555-576.
- Sherifl, A. Alsharif, M. Mahmoud, M. Abdallah and M. Song, "Efficient Privacy-Preserving Aggregation Scheme for Data Sets," 2018 25th International Conference on Telecommunications (ICT), St. Malo, 2018, pp. 191-195.
- T. Guo and M. Mahmoud, "Performance Analysis of Physical-Layer-Based Authentication for Electric Vehicle Dynamic Charging," 2018 IEEE 88th Vehicular Technology Conference (VTC-Fall), Chicago, IL, USA, 2018, pp. 1-7.
- Ford, Vitaly, Daniel Tyler, and Ambareen Siraj. "AMIsim: application-layer advanced metering infrastructure simulation framework for secure communication protocol performance evaluation." In 11th {USENIX} Workshop on Cyber Security Experimentation and Test ({CSET} 18). 2018.
- Anshu Bhattarai, Ambareen Siraj, 鈥淚ncreasing Accuracy of Hand-Motion Based Continuous Authentication Systems鈥, Proceedings: 9th IEEE Annual Ubiquitous Computing, Electronics & Mobile Communication Conference (UEMCON) held in New York, NY, November 8-10, 2018.
- Gustavo Angeles, Terry Guo, and Ambareen Siraj, 鈥淎n Exploratory IoT Testbed for Cyber-Physical Systems Security Research鈥, Proceedings: ACM Mid-Southeast Conference, held in Gatlinburg, TN, November, 2018.
- 鈥淎 Machine Learning Recommender System to Tailor Preference Assessments to Enhance Person Centered Care among Nursing Home Residents鈥, Gerald C. Gannod, Katherine M. Abbott, Kimberly Van Haitsma, Nathan Martindale and Alexandra Heppner, The Gerontologist (special issue on Technology and Aging), Oxford University Press, 2018. Impact Factor: 3.505, doi:10.1093/geront/gny056
- 鈥淒elivering Person Centered Care: Important Preferences for Recipients of Long-Term Services and Supports鈥, Katherine M. Abbott, Rachel鈥 Kendall A. Leser, PhD, Jane Straker, Gerald C. Gannod, Kimberly Van Haitsma, Journal of the American Medical Directors Association (JAMDA), 2018.
- 鈥淓stablishing an Agile Mindset and Culture for Workforce Preparedness: A Baseline Study鈥, Gerald C. Gannod, William Eberle, Douglas Talbert, Robert A. Cooke, Kathy Hagler, Kathy Opp, and Jasmin Baniya, to appear in the Proceedings of the IEEE Frontiers in Education (FIE18) Conference, October 2018.
- 鈥淯sing Machine Learning to Facilitate the Delivery of Person Centered Care in Nursing Homes鈥, Gerald C. Gannod, Katherine M. Abbott, Kimberly Van Haitsma, Nathan Martindale, Rachel A. Kaczka Jennings, and Chelsey Long鈥, accepted to appear in the Proceedings of the 31st Florida Artificial Intelligence Research Society (FLAIRS) Conference, AAAI, May 2018.
- Lenin Mookiah, William Eberle, and M. Mondal, 鈥淧ersonalized News Recommendation using Graph-Based Approach鈥, Intelligent Data Analysis, an International Journal, Volume 22 (2018) 881鈥909.
- 2017 Publications
2017 Publications
- F. K. Lodhi*, S. R. Hasan, O. Hasan, F. Awwad, "Power Profiling of Microcontroller's Instruction Set for Runtime Hardware Trojans Detection without Golden Circuit Models", in IEEE/ACM Conference on Design Automation and Test Europe (DATE), Lausanne, Switzerland, 2017
- S. Kottler*, M. Khayamy, S. R. Hasan, O. Elkeelany, "Formal Verification of Ladder Logic programs using NuSMV", in IEEE South East Conference, 2017
- F. K. Lodhi*, S. R. Hasan, O. Hasan, F. Awwad, " Behavior Profiling of Power Distribution Networks for Runtime Hardware Trojan Detection", in IEEE International MidWest Symposium on Circuits and Systems, 2017
- O. Adegbite*, S. R. Hasan, "A Novel Correlation Power Analysis Attack on PIC Based AES-128 without Access to Crypto-Device", in IEEE International MidWest Symposium on Circuits and Systems, 2017
- S. F. Mossa*, S. R. Hasan, O. S. A. Elkeelany, "Self-triggering Hardware Trojan: Due to NBTI Related Aging in 3-D ICs", Integration, The VLSI Journal, Vol. 58, pp. 116 - 124, June, 2017 DOI:
- S. F. Mossa*, S. R. Hasan, O. S. A. Elkeelany, "Hardware Trojans in 3-D ICs Due to NBTI Effects and Countermeasure", Integration, The VLSI Journal, Vol. 59, pp. 64 - 74, September, 2017. DOI:
- K. Rabieh, M. Mahmoud, K. Akkaya, S. Tonyali, 鈥淪calable certificate revocation schemes for smart grid AMI networks using Bloom filters,鈥 IEEE Transactions on Dependence and Secure Computing (TDSC), vol. 14, no. 4, pp. 420鈥432, 2017.
- M. Mahmoud, N. Saputro, P. Akula, and K. Akkaya, 鈥淧rivacy-preserving power injection over a hybrid AMI/LTE smart grid network,鈥 IEEE Journal on Internet of Things (IoT), vol. 4, no. 4, p. 870 鈥 880, August 2017.
- Sherif, K. Rabieh, M. Mahmoud, and X. Liang, 鈥淧rivacy-preserving ride sharing scheme for autonomous vehicles in big data era,鈥 IEEE Journal on Internet of Things (IoT), vol. 4, no. 2, pp. 611鈥618, April 2017.
- K. Rabieh, M. Mahmoud, and M. Younis, 鈥淧rivacy-preserving route reporting schemes for traffic management systems,鈥 IEEE Transactions on Vehicular Technology (TVT), vol. 66, no. 3, pp. 2703鈥 2713, March 2017.
- A H M Jakaria, Mohammad Ashiqur Rahman, and Carol Fung, Automated Synthesis of NFV Topology: A Security Requirement-Oriented Design, the 13th International Conference on Network and Service Management (CNSM), Short Paper, Tokyo, Japan, November 2017.
- Amarjit Datta and Mohammad Ashiqur Rahman, Cyber Threat Analysis Framework for the Wind Energy Based Power System, ACM Workshop on Cyber-Physical Systems Security & Privacy (CPS-SPC) in conjunction with the 24th ACM CCS, Dallas, Texus, USA, November 2017.
- Bata Krishna Tripathy, Ashray Sudhir, Padmalochan Bera, Mohammad Ashiqur Rahman, Formal Modelling and Verification of Requirements of Adaptive Routing Protocol for Mobile AdHoc Network, The 41st IEEE Computer Society International Conference on Computers, Software, and Applications (COMPSAC), Torino, Italy, July 2017.
- Khalid, Faiq & Hasan, Syed Rafay & Hasan, Osman & Awwad, Falah. (2017). Behavior Profiling of Power Distribution Networks for Runtime Hardware Trojan Detection. 10.1109/MWSCAS.2017.8053173.
- Mahmoud, Mohamed & Saputro, Nico & Kumar Akula, Prem & Akkaya, Kemal. (2017). Privacy-Preserving Power Injection over a Hybrid AMI/LTE Smart Grid Network. IEEE Internet of Things Journal. 4. 870-880. 10.1109/JIOT.2016.2593453.
- Saputro, Nico & Tonyal谋, Samet & Akkaya, Kemal & Cebe, Mumin & Mahmoud, Mohamed. (2017). Efficient Certificate Verification for Vehicle-to-Grid Communications. 3-18.
- Hailesellasie, Muluken & Hasan, Syed Rafay. (2017). Intrusion Detection in PLC-Based Industrial Control Systems Using Formal Verification Approach in Conjunction with Graphs. Journal of Hardware and Systems Security. 10.1007/s41635-017-0017-y.
- Hasan, Syed Rafay & Tangellapalli, Phani. (2017). Area efficient soft error tolerant RISC pipeline: Leveraging data encoding and inherent ALU redundancy. 699-702. 10.1109/MWSCAS.2017.8053019.
- Adegbite, Oluwadara & Hasan, Syed Rafay. (2017). A Novel Correlation Power Analysis Attack on PIC Based AES-128 without Access to Crypto Device. 10.1109/MWSCAS.2017.8053174.
- Kottler, Sam & Khayamy, Mehdy & Hasan, Syed Rafay & Elkeelany, Omar. (2017). Formal verification of ladder logic programs using NuSMV. 1-5. 10.1109/SECON.2017.7925390.
- Vitaly Ford, Ambareen Siraj, Eric Brown and Ada Haynes, 鈥淐apture the Flag Unplugged: An Offline Cyber Competition鈥, Proceedings: ACM Special Interest Group on Computer Science Education (SIGCSE), held in Seattle, WA, March 8th - 11th, 2017.
- 鈥淎gile Manifesto for Teaching and Learning鈥, Timothy C. Krehbiel, Peter A. Salzarulo, Michelle Cosmah, John Forren, Gerald Gannod, Douglas Havelka, Andrea Hulshult, and Jeffrey Merhout, Journal of Effective Teaching, 2017, (in press).
- Sirisha Velampalli, Lenin Mookiah, and William Eberle, 鈥淒etecting Vehicular Patterns Using a Graph-Based Approach,鈥 IEEE Conference on Visual Analytics Science and Technology (VAST), October 2017.
- Deon Liang, Chih-Fong Tsai, An-Jie Dai, and William Eberle, 鈥淎 novel classifier ensemble approach for financial distress prediction,鈥 Knowledge and Information Systems, An International Journal, May 2017.
- Lenin Mookiah, Chris Dean, and William Eberle, 鈥淕raph-Based Anomaly Detection on Smart Grid Data,鈥 International Conference of the Florida AI Research Society (FLAIRS), May 2017.
- Ramesh Paudel, William Eberle, and Douglas Talbert 鈥淒etection of Anomalous Activity in Diabetic Patients Using Graph-Based Approach,鈥 International Conference of the Florida AI Research Society (FLAIRS), May 2017.
- Sirisha Velampalli and William Eberle, 鈥淣ovel Graph Based Anomaly Detection Using Background Knowledge,鈥 International Conference of the Florida AI Research Society (FLAIRS), May 2017.
- Nishith Thakkar, Lenin Mookiah, Douglas Talbert, and William Eberle, 鈥淎nomalies in Student Enrollment Using Visualization,鈥 International Conference of the Florida AI Research Society (FLAIRS), May 2017.
- 2016 Publications
2016 Publications
- S. R. Hasan, Charles Kamhoua, Kevin Kwiat and Laurent Njilla, "Translating Circuit Behavior Manifestations of Hardware Trojans using Model Checkers into Run-time Trojan Detection Monitors" in AsianHOST, Taipei, Taiwan, 2016
- F. K. Lodhi*, I. Abbasi , F. Khalid , O. Hasan , F. Awwad and S. R. Hasan, "A Self-learning Framework to Detect the Intruded Integrated Circuit", in IEEE international symposium of circuits and systems (ISCAS' 2016)
- S. R. Hasan, Charles Kamhoua, Kevin Kwiat and Laurent Njilla, "Translating Circuit Behavior Manifestations of Hardware Trojans using Model Checkers into Run-time Trojan Detection Monitors" in AsianHOST, Taipei, Taiwan, 2016
- F. K. Lodhi*, I. Abbasi , F. Khalid , O. Hasan , F. Awwad and S. R. Hasan, "A Self-learning Framework to Detect the Intruded Integrated Circuit", in IEEE international symposium of circuits and systems (ISCAS' 2016)
- Vitaly Ford, Ambareen Siraj, and M. Ashiqur. Rahman, 鈥淪ecure and Efficient Protection of Consumer Privacy in Advanced Metering Infrastructure Supporting Fine-grained Data Analysis鈥, Journal of Computer and System Sciences Special Issue on Cyber Security in the Critical Infrastructure: Advances and Future Directions, Volume 83, Issue 1, Pages 84-100, 2016.
- Jeffery D. Dodson and Ambareen Siraj, "Applying Fuzzy Hashing to Steganography," International Journal of Future Computer and Communication vol. 4, no. 6, pp. 421-425, 2015.
- Ambareen Siraj, Blair Taylor, Siddarth Kaza, Sheikh Ghafoor (2015), 鈥淚ntegrating Security in The Computer Science Curriculum,鈥 ACM Inroads, 6(2), pp 77-81
- Brian Ledbetter, Zach Wallace, Adam Harms, Ambareen Siraj, and Laurin Buchanan, "CySCom: CyberSecurity COMics," in IEEE Intelligence and Security Informatics Conference, held in Tucson, AZ September 28-30, 2016.
- Christa Cody, Vitaly Ford, and Ambareen Siraj, 鈥淒ecision Tree Learning for Fraud Detection in Consumer Energy Consumption,鈥 in the 14th IEEE International Conference on Machine Learning and Applications, 2015.
- Khaled Rabieh, Mohamed Mahmoud, Ambareen Siraj, J. Misic, 鈥淓fficient Privacy-Preserving Chatting Scheme with Degree of Interest Verification for Vehicular Social Networks鈥, Proc. of IEEE Global Communications Conference, Selected Areas in Communications: Social Networks, San Diego, USA, 2015.
- Lenin Mookiah, William Eberle, and Ambareen Siraj, 鈥淪urvey of Crime Analysis and Prediction,鈥 International Conference of the Florida AI Research Society (FLAIRS), May 2015.
- 鈥渧izSlice: Visualizing Large Scale Software Slices鈥, Hakam Alomari, Rachel Jennings, Paulo Virote de Souza, Matthew Stephan, and Gerald C. Gannod, in Proceedings of the 2016 IEEE Working Conference on Software Visualization (VISSOFT), October 2016.
- Zdravko Markov, Ingrid Russell, and William Eberle, 鈥淩eport on the 29th International Florida Artificial Intelligence Research Society Conference (FLAIRS-29),鈥 AI Magazine, Winter 2016.
- Lenin Mookiah and William Eberle, 鈥淐o-Ranking Authors in Heterogeneous News Networks,鈥 2016 International Conference on Computational Science and Computational Intelligence, December 2016.
- Sirisha Velampalli and William Eberle, 鈥淣ovel Application of MapReduce and Conceptual Graphs,鈥 2016 International Conference on Computational Science and Computational Intelligence, December 2016.
- William Eberle and Lawrence Holder, 鈥淚dentifying Anomalies in Graph Streams Using Change Detection,鈥 Conference on Knowledge Discovery and Data Mining (KDD) Mining and Learning with Graphs (MLG), August 2016.
- Lenin Mookiah, William Eberle, and Maitrayi Mondal, 鈥淒etecting Change in News Feeds Using a Context-Based Graph,鈥 International Conference on Data Mining (DMIN), 2016.
- Dario Cruz, Doug Talbert, William Eberle, and Joseph Biernacki, 鈥淎 neural network approach for predicting microstructure development in cement,鈥 Int鈥檒 Conf. Artificial Intelligence, ICAI鈥16, pp. 328-334, 2016.
- M.-W. Huang, W.-C. Lin, L. Chih-Wen, C. Shih-en, C.-F. Tsai, and W. Eberle, 鈥淒ata preprocessing issues for incomplete medical datasets,鈥 Expert Systems, June 2016.