BibTeX records: M. Ejaz Ahmed

download as .bib file

@article{DBLP:journals/corr/abs-2402-07444,
  author       = {Sajal Halder and
                  Michael Bewong and
                  Arash Mahboubi and
                  Yinhao Jiang and
                  Md Rafiqul Islam and
                  Md Zahidul Islam and
                  Ryan H. L. Ip and
                  Muhammad Ejaz Ahmed and
                  Gowri Sankar Ramachandran and
                  Muhammad Ali Babar},
  title        = {Malicious Package Detection using Metadata Information},
  journal      = {CoRR},
  volume       = {abs/2402.07444},
  year         = {2024},
  url          = {https://doi.org/10.48550/arXiv.2402.07444},
  doi          = {10.48550/ARXIV.2402.07444},
  eprinttype    = {arXiv},
  eprint       = {2402.07444},
  timestamp    = {Fri, 10 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2402-07444.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dai/MaayahAAA023,
  author       = {Marina Maayah and
                  Ahlam Abunada and
                  Khawla Al{-}Janahi and
                  Muhammad Ejaz Ahmed and
                  Junaid Qadir},
  title        = {LimitAccess: on-device TinyML based robust speech recognition and
                  age classification},
  journal      = {Discov. Artif. Intell.},
  volume       = {3},
  number       = {1},
  year         = {2023},
  url          = {https://doi.org/10.1007/s44163-023-00051-x},
  doi          = {10.1007/S44163-023-00051-X},
  timestamp    = {Fri, 05 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dai/MaayahAAA023.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/aintec/AlmashorAPXA0WC23,
  author       = {Mahathir Almashor and
                  M. Ejaz Ahmed and
                  Benjamin Pick and
                  Jason Xue and
                  Sharif Abuadbba and
                  Raj Gaire and
                  Shuo Wang and
                  Seyit Camtepe and
                  Surya Nepal},
  title        = {Unraveling Threat Intelligence Through the Lens of Malicious {URL}
                  Campaigns},
  booktitle    = {Proceedings of the 18th Asian Internet Engineering Conference, {AINTEC}
                  2023, Hanoi, Vietnam, December 12-14, 2023},
  pages        = {78--86},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3630590.3630600},
  doi          = {10.1145/3630590.3630600},
  timestamp    = {Fri, 29 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/aintec/AlmashorAPXA0WC23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2308-01463,
  author       = {Zian Liu and
                  Zhi Zhang and
                  Siqi Ma and
                  Dongxi Liu and
                  Jun Zhang and
                  Chao Chen and
                  Shigang Liu and
                  Muhammad Ejaz Ahmed and
                  Yang Xiang},
  title        = {SemDiff: Binary Similarity Detection by Diffing Key-Semantics Graphs},
  journal      = {CoRR},
  volume       = {abs/2308.01463},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2308.01463},
  doi          = {10.48550/ARXIV.2308.01463},
  eprinttype    = {arXiv},
  eprint       = {2308.01463},
  timestamp    = {Mon, 21 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2308-01463.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2308-04115,
  author       = {Zian Liu and
                  Chao Chen and
                  Muhammad Ejaz Ahmed and
                  Jun Zhang and
                  Dongxi Liu},
  title        = {model-based script synthesis for fuzzing},
  journal      = {CoRR},
  volume       = {abs/2308.04115},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2308.04115},
  doi          = {10.48550/ARXIV.2308.04115},
  eprinttype    = {arXiv},
  eprint       = {2308.04115},
  timestamp    = {Tue, 22 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2308-04115.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/LiCWWACX22,
  author       = {Chaoran Li and
                  Xiao Chen and
                  Derui Wang and
                  Sheng Wen and
                  Muhammad Ejaz Ahmed and
                  Seyit Camtepe and
                  Yang Xiang},
  title        = {Backdoor Attack on Machine Learning Based Android Malware Detectors},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {19},
  number       = {5},
  pages        = {3357--3370},
  year         = {2022},
  url          = {https://doi.org/10.1109/TDSC.2021.3094824},
  doi          = {10.1109/TDSC.2021.3094824},
  timestamp    = {Sat, 10 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/LiCWWACX22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/ThapaJACPN22,
  author       = {Chandra Thapa and
                  Seung Ick Jang and
                  Muhammad Ejaz Ahmed and
                  Seyit Camtepe and
                  Josef Pieprzyk and
                  Surya Nepal},
  title        = {Transformer-Based Language Models for Software Vulnerability Detection},
  booktitle    = {Annual Computer Security Applications Conference, {ACSAC} 2022, Austin,
                  TX, USA, December 5-9, 2022},
  pages        = {481--496},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3564625.3567985},
  doi          = {10.1145/3564625.3567985},
  timestamp    = {Sun, 25 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/ThapaJACPN22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/issre/KimCANK22,
  author       = {Soolin Kim and
                  Jusop Choi and
                  Muhammad Ejaz Ahmed and
                  Surya Nepal and
                  Hyoungshick Kim},
  title        = {VulDeBERT: {A} Vulnerability Detection System Using {BERT}},
  booktitle    = {{IEEE} International Symposium on Software Reliability Engineering
                  Workshops, {ISSRE} 2022 - Workshops, Charlotte, NC, USA, October 31
                  - Nov. 3, 2022},
  pages        = {69--74},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/ISSREW55968.2022.00042},
  doi          = {10.1109/ISSREW55968.2022.00042},
  timestamp    = {Tue, 03 Jan 2023 17:09:36 +0100},
  biburl       = {https://dblp.org/rec/conf/issre/KimCANK22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sigsoft/Li0SXWAC022,
  author       = {Chaoran Li and
                  Xiao Chen and
                  Ruoxi Sun and
                  Minhui Xue and
                  Sheng Wen and
                  Muhammad Ejaz Ahmed and
                  Seyit Camtepe and
                  Yang Xiang},
  editor       = {Abhik Roychoudhury and
                  Cristian Cadar and
                  Miryung Kim},
  title        = {Cross-language Android permission specification},
  booktitle    = {Proceedings of the 30th {ACM} Joint European Software Engineering
                  Conference and Symposium on the Foundations of Software Engineering,
                  {ESEC/FSE} 2022, Singapore, Singapore, November 14-18, 2022},
  pages        = {772--783},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3540250.3549142},
  doi          = {10.1145/3540250.3549142},
  timestamp    = {Tue, 26 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sigsoft/Li0SXWAC022.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2204-00985,
  author       = {Alsharif Abuadbba and
                  Shuo Wang and
                  Mahathir Almashor and
                  Muhammad Ejaz Ahmed and
                  Raj Gaire and
                  Seyit Camtepe and
                  Surya Nepal},
  title        = {Towards Web Phishing Detection Limitations and Mitigation},
  journal      = {CoRR},
  volume       = {abs/2204.00985},
  year         = {2022},
  url          = {https://doi.org/10.48550/arXiv.2204.00985},
  doi          = {10.48550/ARXIV.2204.00985},
  eprinttype    = {arXiv},
  eprint       = {2204.00985},
  timestamp    = {Fri, 29 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2204-00985.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2204-03214,
  author       = {Chandra Thapa and
                  Seung Ick Jang and
                  Muhammad Ejaz Ahmed and
                  Seyit Camtepe and
                  Josef Pieprzyk and
                  Surya Nepal},
  title        = {Transformer-Based Language Models for Software Vulnerability Detection:
                  Performance, Model's Security and Platforms},
  journal      = {CoRR},
  volume       = {abs/2204.03214},
  year         = {2022},
  url          = {https://doi.org/10.48550/arXiv.2204.03214},
  doi          = {10.48550/ARXIV.2204.03214},
  eprinttype    = {arXiv},
  eprint       = {2204.03214},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2204-03214.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2208-12449,
  author       = {Mahathir Almashor and
                  M. Ejaz Ahmed and
                  Benjamin Pick and
                  Sharif Abuadbba and
                  Jason Xue and
                  Raj Gaire and
                  Shuo Wang and
                  Seyit Camtepe and
                  Surya Nepal},
  title        = {Unraveling Threat Intelligence Through the Lens of Malicious {URL}
                  Campaigns},
  journal      = {CoRR},
  volume       = {abs/2208.12449},
  year         = {2022},
  url          = {https://doi.org/10.48550/arXiv.2208.12449},
  doi          = {10.48550/ARXIV.2208.12449},
  eprinttype    = {arXiv},
  eprint       = {2208.12449},
  timestamp    = {Fri, 29 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2208-12449.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dsn/KimAGZANK21,
  author       = {Bedeuro Kim and
                  Alsharif Abuadbba and
                  Yansong Gao and
                  Yifeng Zheng and
                  Muhammad Ejaz Ahmed and
                  Surya Nepal and
                  Hyoungshick Kim},
  title        = {Decamouflage: {A} Framework to Detect Image-Scaling Attacks on {CNN}},
  booktitle    = {51st Annual {IEEE/IFIP} International Conference on Dependable Systems
                  and Networks, {DSN} 2021, Taipei, Taiwan, June 21-24, 2021},
  pages        = {63--74},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/DSN48987.2021.00023},
  doi          = {10.1109/DSN48987.2021.00023},
  timestamp    = {Mon, 09 Aug 2021 14:50:25 +0200},
  biburl       = {https://dblp.org/rec/conf/dsn/KimAGZANK21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/AhmedKCN21,
  author       = {Muhammad Ejaz Ahmed and
                  Hyoungshick Kim and
                  Seyit Camtepe and
                  Surya Nepal},
  editor       = {Elisa Bertino and
                  Haya Schulmann and
                  Michael Waidner},
  title        = {Peeler: Profiling Kernel-Level Events to Detect Ransomware},
  booktitle    = {Computer Security - {ESORICS} 2021 - 26th European Symposium on Research
                  in Computer Security, Darmstadt, Germany, October 4-8, 2021, Proceedings,
                  Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12972},
  pages        = {240--260},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-88418-5\_12},
  doi          = {10.1007/978-3-030-88418-5\_12},
  timestamp    = {Tue, 17 Oct 2023 10:41:56 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/AhmedKCN21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2101-12434,
  author       = {Muhammad Ejaz Ahmed and
                  Hyoungshick Kim and
                  Seyit Camtepe and
                  Surya Nepal},
  title        = {Peeler: Profiling Kernel-Level Events to Detect Ransomware},
  journal      = {CoRR},
  volume       = {abs/2101.12434},
  year         = {2021},
  url          = {https://arxiv.org/abs/2101.12434},
  eprinttype    = {arXiv},
  eprint       = {2101.12434},
  timestamp    = {Tue, 02 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2101-12434.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2108-12726,
  author       = {Mahathir Almashor and
                  M. Ejaz Ahmed and
                  Benjamin Pick and
                  Sharif Abuadbba and
                  Raj Gaire and
                  Seyit Camtepe and
                  Surya Nepal},
  title        = {Characterizing Malicious {URL} Campaigns},
  journal      = {CoRR},
  volume       = {abs/2108.12726},
  year         = {2021},
  url          = {https://arxiv.org/abs/2108.12726},
  eprinttype    = {arXiv},
  eprint       = {2108.12726},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2108-12726.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2111-08217,
  author       = {Chaoran Li and
                  Xiao Chen and
                  Ruoxi Sun and
                  Jason Xue and
                  Sheng Wen and
                  Muhammad Ejaz Ahmed and
                  Seyit Camtepe and
                  Yang Xiang},
  title        = {NatiDroid: Cross-Language Android Permission Specification},
  journal      = {CoRR},
  volume       = {abs/2111.08217},
  year         = {2021},
  url          = {https://arxiv.org/abs/2111.08217},
  eprinttype    = {arXiv},
  eprint       = {2111.08217},
  timestamp    = {Tue, 26 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2111-08217.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/AhmedKHKOK20,
  author       = {Muhammad Ejaz Ahmed and
                  Il{-}Youp Kwak and
                  Jun Ho Huh and
                  Iljoo Kim and
                  Taekkyung Oh and
                  Hyoungshick Kim},
  editor       = {Srdjan Capkun and
                  Franziska Roesner},
  title        = {Void: {A} fast and light voice liveness detection system},
  booktitle    = {29th {USENIX} Security Symposium, {USENIX} Security 2020, August 12-14,
                  2020},
  pages        = {2685--2702},
  publisher    = {{USENIX} Association},
  year         = {2020},
  url          = {https://www.usenix.org/conference/usenixsecurity20/presentation/ahmed-muhammad},
  timestamp    = {Fri, 29 Jan 2021 22:08:55 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/AhmedKHKOK20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2010-03735,
  author       = {Bedeuro Kim and
                  Alsharif Abuadbba and
                  Yansong Gao and
                  Yifeng Zheng and
                  Muhammad Ejaz Ahmed and
                  Hyoungshick Kim and
                  Surya Nepal},
  title        = {Decamouflage: {A} Framework to Detect Image-Scaling Attacks on Convolutional
                  Neural Networks},
  journal      = {CoRR},
  volume       = {abs/2010.03735},
  year         = {2020},
  url          = {https://arxiv.org/abs/2010.03735},
  eprinttype    = {arXiv},
  eprint       = {2010.03735},
  timestamp    = {Tue, 13 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2010-03735.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jsac/AliAATNP19,
  author       = {Amjad Ali and
                  Muhammad Ejaz Ahmed and
                  Farman Ali and
                  Nguyen Hoang Tran and
                  Dusit Niyato and
                  Sangheon Pack},
  title        = {NOn-parametric Bayesian channEls cLustering {(NOBEL)} Scheme for Wireless
                  Multimedia Cognitive Radio Networks},
  journal      = {{IEEE} J. Sel. Areas Commun.},
  volume       = {37},
  number       = {10},
  pages        = {2293--2305},
  year         = {2019},
  url          = {https://doi.org/10.1109/JSAC.2019.2933943},
  doi          = {10.1109/JSAC.2019.2933943},
  timestamp    = {Sun, 30 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jsac/AliAATNP19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/AhmedUK19,
  author       = {Muhammad Ejaz Ahmed and
                  Saeed Ullah and
                  Hyoungshick Kim},
  title        = {Statistical Application Fingerprinting for DDoS Attack Mitigation},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {14},
  number       = {6},
  pages        = {1471--1484},
  year         = {2019},
  url          = {https://doi.org/10.1109/TIFS.2018.2879616},
  doi          = {10.1109/TIFS.2018.2879616},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/AhmedUK19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tmc/AhmedKC18,
  author       = {Muhammad Ejaz Ahmed and
                  Dong In Kim and
                  Kae Won Choi},
  title        = {Traffic-Aware Optimal Spectral Access in Wireless Powered Cognitive
                  Radio Networks},
  journal      = {{IEEE} Trans. Mob. Comput.},
  volume       = {17},
  number       = {3},
  pages        = {733--745},
  year         = {2018},
  url          = {https://doi.org/10.1109/TMC.2017.2734660},
  doi          = {10.1109/TMC.2017.2734660},
  timestamp    = {Tue, 06 Mar 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tmc/AhmedKC18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tvt/LeeAK18,
  author       = {Hae Sol Lee and
                  Muhammad Ejaz Ahmed and
                  Dong In Kim},
  title        = {Optimal Spectrum Sensing Policy in RF-Powered Cognitive Radio Networks},
  journal      = {{IEEE} Trans. Veh. Technol.},
  volume       = {67},
  number       = {10},
  pages        = {9557--9570},
  year         = {2018},
  url          = {https://doi.org/10.1109/TVT.2018.2857853},
  doi          = {10.1109/TVT.2018.2857853},
  timestamp    = {Thu, 25 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tvt/LeeAK18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/coinco/AhmedNK18,
  author       = {Muhammad Ejaz Ahmed and
                  Surya Nepal and
                  Hyoungshick Kim},
  title        = {{MEDUSA:} Malware Detection Using Statistical Analysis of System's
                  Behavior},
  booktitle    = {4th {IEEE} International Conference on Collaboration and Internet
                  Computing, {CIC} 2018, Philadelphia, PA, USA, October 18-20, 2018},
  pages        = {272--278},
  publisher    = {{IEEE} Computer Society},
  year         = {2018},
  url          = {https://doi.org/10.1109/CIC.2018.00044},
  doi          = {10.1109/CIC.2018.00044},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/coinco/AhmedNK18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icuimc/LeeAK18,
  author       = {Hae Sol Lee and
                  Muhammad Ejaz Ahmed and
                  Dong In Kim},
  title        = {Traffic-Aware Optimal Spectrum Sensing Policy in Wireless-Powered
                  Cognitive Radio Networks},
  booktitle    = {Proceedings of the 12th International Conference on Ubiquitous Information
                  Management and Communication, {IMCOM} 2018, Langkawi, Malaysia, January
                  05-07, 2018},
  pages        = {66:1--66:7},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3164541.3164555},
  doi          = {10.1145/3164541.3164555},
  timestamp    = {Wed, 21 Nov 2018 12:44:20 +0100},
  biburl       = {https://dblp.org/rec/conf/icuimc/LeeAK18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1803-09193,
  author       = {Hae Sol Lee and
                  Muhammad Ejaz Ahmed and
                  Dong In Kim},
  title        = {Optimal Spectrum Sensing Policy with Traffic Classification in RF-Powered
                  CRNs},
  journal      = {CoRR},
  volume       = {abs/1803.09193},
  year         = {2018},
  url          = {http://arxiv.org/abs/1803.09193},
  eprinttype    = {arXiv},
  eprint       = {1803.09193},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1803-09193.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tvt/AhmedKKS17,
  author       = {Muhammad Ejaz Ahmed and
                  Dong In Kim and
                  Jin Young Kim and
                  Yoan Shin},
  title        = {Energy-Arrival-Aware Detection Threshold in Wireless-Powered Cognitive
                  Radio Networks},
  journal      = {{IEEE} Trans. Veh. Technol.},
  volume       = {66},
  number       = {10},
  pages        = {9201--9213},
  year         = {2017},
  url          = {https://doi.org/10.1109/TVT.2017.2705244},
  doi          = {10.1109/TVT.2017.2705244},
  timestamp    = {Thu, 25 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tvt/AhmedKKS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/apcc/LeeAK17,
  author       = {Hae Sol Lee and
                  Muhammad Ejaz Ahmed and
                  Dong In Kim},
  title        = {Optimal spectrum sensing policy in RF-powered cognitive radio networks},
  booktitle    = {23rd Asia-Pacific Conference on Communications, {APCC} 2017, Perth,
                  Australia, December 11-13, 2017},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2017},
  url          = {https://doi.org/10.23919/APCC.2017.8304016},
  doi          = {10.23919/APCC.2017.8304016},
  timestamp    = {Wed, 16 Oct 2019 14:14:54 +0200},
  biburl       = {https://dblp.org/rec/conf/apcc/LeeAK17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/bigdataservice/AhmedK17,
  author       = {M. Ejaz Ahmed and
                  Hyoungshick Kim},
  title        = {DDoS Attack Mitigation in Internet of Things Using Software Defined
                  Networking},
  booktitle    = {Third {IEEE} International Conference on Big Data Computing Service
                  and Applications, BigDataService 2017, Redwood City, CA, USA, April
                  6-9, 2017},
  pages        = {271--276},
  publisher    = {{IEEE} Computer Society},
  year         = {2017},
  url          = {https://doi.org/10.1109/BigDataService.2017.41},
  doi          = {10.1109/BIGDATASERVICE.2017.41},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/bigdataservice/AhmedK17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/AhmedK17,
  author       = {Muhammad Ejaz Ahmed and
                  Hyoungshick Kim},
  editor       = {Bhavani Thuraisingham and
                  David Evans and
                  Tal Malkin and
                  Dongyan Xu},
  title        = {Poster: Adversarial Examples for Classifiers in High-Dimensional Network
                  Data},
  booktitle    = {Proceedings of the 2017 {ACM} {SIGSAC} Conference on Computer and
                  Communications Security, {CCS} 2017, Dallas, TX, USA, October 30 -
                  November 03, 2017},
  pages        = {2467--2469},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3133956.3138853},
  doi          = {10.1145/3133956.3138853},
  timestamp    = {Wed, 29 Jun 2022 15:37:41 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/AhmedK17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/KimLCAJK17,
  author       = {Soyoung Kim and
                  Sora Lee and
                  Geumhwan Cho and
                  Muhammad Ejaz Ahmed and
                  Jaehoon (Paul) Jeong and
                  Hyoungshick Kim},
  editor       = {Simon N. Foley and
                  Dieter Gollmann and
                  Einar Snekkenes},
  title        = {Preventing {DNS} Amplification Attacks Using the History of {DNS}
                  Queries with {SDN}},
  booktitle    = {Computer Security - {ESORICS} 2017 - 22nd European Symposium on Research
                  in Computer Security, Oslo, Norway, September 11-15, 2017, Proceedings,
                  Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10493},
  pages        = {135--152},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-66399-9\_8},
  doi          = {10.1007/978-3-319-66399-9\_8},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/KimLCAJK17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icc/AhmedK17,
  author       = {M. Ejaz Ahmed and
                  Dong In Kim},
  title        = {Traffic-pattern aware opportunistic wireless energy harvesting in
                  cognitive radio networks},
  booktitle    = {{IEEE} International Conference on Communications, {ICC} 2017, Paris,
                  France, May 21-25, 2017},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2017},
  url          = {https://doi.org/10.1109/ICC.2017.7996350},
  doi          = {10.1109/ICC.2017.7996350},
  timestamp    = {Wed, 16 Oct 2019 14:14:50 +0200},
  biburl       = {https://dblp.org/rec/conf/icc/AhmedK17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/milcom/AhmedKP17,
  author       = {Muhammad Ejaz Ahmed and
                  Hyoungshick Kim and
                  Moosung Park},
  title        = {Mitigating {DNS} query-based DDoS attacks with machine learning on
                  software-defined networking},
  booktitle    = {2017 {IEEE} Military Communications Conference, {MILCOM} 2017, Baltimore,
                  MD, USA, October 23-25, 2017},
  pages        = {11--16},
  publisher    = {{IEEE}},
  year         = {2017},
  url          = {https://doi.org/10.1109/MILCOM.2017.8170802},
  doi          = {10.1109/MILCOM.2017.8170802},
  timestamp    = {Wed, 16 Oct 2019 14:14:52 +0200},
  biburl       = {https://dblp.org/rec/conf/milcom/AhmedKP17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wcnc/AhmedK16a,
  author       = {M. Ejaz Ahmed and
                  Dong In Kim},
  title        = {Traffic and energy-aware access in wireless powered cognitive radio
                  networks},
  booktitle    = {{IEEE} Wireless Communications and Networking Conference, {WCNC} 2016,
                  Doha, Qatar, April 3-6, 2016},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/WCNC.2016.7564693},
  doi          = {10.1109/WCNC.2016.7564693},
  timestamp    = {Wed, 16 Oct 2019 14:14:50 +0200},
  biburl       = {https://dblp.org/rec/conf/wcnc/AhmedK16a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wcnc/AhmedK16,
  author       = {M. Ejaz Ahmed and
                  Dong In Kim},
  title        = {Traffic and energy-aware access in wireless powered cognitive radio
                  networks},
  booktitle    = {{IEEE} Wireless Communications and Networking Conference Workshops,
                  {WCNC} Workshops 2016, Doha, Qatar, April 3-6, 2016},
  pages        = {340--345},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/WCNCW.2016.7552722},
  doi          = {10.1109/WCNCW.2016.7552722},
  timestamp    = {Wed, 16 Oct 2019 14:14:50 +0200},
  biburl       = {https://dblp.org/rec/conf/wcnc/AhmedK16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/mis/PiranAASS15,
  author       = {Mohammad Jalil Piran and
                  M. Ejaz Ahmed and
                  Amjad Ali and
                  Ju Bin Song and
                  Doug Young Suh},
  title        = {Channel Allocation Based on Content Characteristics for Video Transmission
                  in Time-Domain-Based Multichannel Cognitive Radio Networks},
  journal      = {Mob. Inf. Syst.},
  volume       = {2015},
  pages        = {934715:1--934715:7},
  year         = {2015},
  url          = {https://doi.org/10.1155/2015/934715},
  doi          = {10.1155/2015/934715},
  timestamp    = {Thu, 01 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/mis/PiranAASS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sensors/AliAPS14,
  author       = {Amjad Ali and
                  M. Ejaz Ahmed and
                  Mohammad Jalil Piran and
                  Doug Young Suh},
  title        = {Resource Optimization Scheme for Multimedia-Enabled Wireless Mesh
                  Networks},
  journal      = {Sensors},
  volume       = {14},
  number       = {8},
  pages        = {14500--14525},
  year         = {2014},
  url          = {https://doi.org/10.3390/s140814500},
  doi          = {10.3390/S140814500},
  timestamp    = {Thu, 27 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sensors/AliAPS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tmc/AhmedSHS14,
  author       = {M. Ejaz Ahmed and
                  Ju Bin Song and
                  Zhu Han and
                  Doug Young Suh},
  title        = {Sensing-Transmission Edifice Using Bayesian Nonparametric Traffic
                  Clustering in Cognitive Radio Networks},
  journal      = {{IEEE} Trans. Mob. Comput.},
  volume       = {13},
  number       = {9},
  pages        = {2141--2155},
  year         = {2014},
  url          = {https://doi.org/10.1109/TMC.2013.156},
  doi          = {10.1109/TMC.2013.156},
  timestamp    = {Wed, 05 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tmc/AhmedSHS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/globecom/AhmedSH14,
  author       = {M. Ejaz Ahmed and
                  Ju Bin Song and
                  Zhu Han},
  title        = {Mitigating malicious attacks using Bayesian nonparametric clustering
                  in collaborative cognitive radio networks},
  booktitle    = {{IEEE} Global Communications Conference, {GLOBECOM} 2014, Austin,
                  TX, USA, December 8-12, 2014},
  pages        = {999--1004},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/GLOCOM.2014.7036939},
  doi          = {10.1109/GLOCOM.2014.7036939},
  timestamp    = {Wed, 05 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/globecom/AhmedSH14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wcnc/AhmedSH13,
  author       = {M. Ejaz Ahmed and
                  Ju Bin Song and
                  Zhu Han},
  title        = {Traffic pattern-based reward maximization for secondary user in dynamic
                  spectrum access},
  booktitle    = {2013 {IEEE} Wireless Communications and Networking Conference (WCNC),
                  Shanghai, Shanghai, China, April 7-10, 2013},
  pages        = {291--296},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/WCNC.2013.6554579},
  doi          = {10.1109/WCNC.2013.6554579},
  timestamp    = {Wed, 05 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wcnc/AhmedSH13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sensors/AhmedS12,
  author       = {M. Ejaz Ahmed and
                  Ju Bin Song},
  title        = {Non-Parametric Bayesian Human Motion Recognition Using a Single {MEMS}
                  Tri-Axial Accelerometer},
  journal      = {Sensors},
  volume       = {12},
  number       = {10},
  pages        = {13185--13211},
  year         = {2012},
  url          = {https://doi.org/10.3390/s121013185},
  doi          = {10.3390/S121013185},
  timestamp    = {Wed, 14 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/sensors/AhmedS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icc/AhmedSNH12,
  author       = {M. Ejaz Ahmed and
                  Ju Bin Song and
                  Nam Tuan Nguyen and
                  Zhu Han},
  title        = {Nonparametric Bayesian identification of primary users' payloads in
                  cognitive radio networks},
  booktitle    = {Proceedings of {IEEE} International Conference on Communications,
                  {ICC} 2012, Ottawa, ON, Canada, June 10-15, 2012},
  pages        = {1586--1591},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://doi.org/10.1109/ICC.2012.6364306},
  doi          = {10.1109/ICC.2012.6364306},
  timestamp    = {Wed, 05 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icc/AhmedSNH12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wcnc/ZhaoAMSL12,
  author       = {Guanzhe Zhao and
                  M. Ejaz Ahmed and
                  Rukun Mao and
                  Ju Bin Song and
                  Husheng Li},
  title        = {Channel allocation under uncertain primary users for delay sensitive
                  secondary users},
  booktitle    = {2012 {IEEE} Wireless Communications and Networking Conference, {WCNC}
                  2012, Paris, France, April 1-4, 2012},
  pages        = {1337--1342},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://doi.org/10.1109/WCNC.2012.6213987},
  doi          = {10.1109/WCNC.2012.6213987},
  timestamp    = {Wed, 16 Oct 2019 14:14:50 +0200},
  biburl       = {https://dblp.org/rec/conf/wcnc/ZhaoAMSL12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fit/AhmedQB09,
  author       = {M. Ejaz Ahmed and
                  Junaid Qadir and
                  Adeel Baig},
  editor       = {Sajjad Ahmad Madani},
  title        = {Channel assignment in cognitive radio networks: comparison and analysis},
  booktitle    = {{FIT} '09, 7th International Conference on Frontiers of Information
                  Technology, Abbottabad, Pakistan, December 16-18, 2009},
  pages        = {12:1--12:8},
  publisher    = {{ACM}},
  year         = {2009},
  url          = {https://doi.org/10.1145/1838002.1838015},
  doi          = {10.1145/1838002.1838015},
  timestamp    = {Thu, 29 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fit/AhmedQB09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics