Stop the war!
Остановите войну!
for scientists:
default search action
BibTeX records: M. Ejaz Ahmed
@article{DBLP:journals/corr/abs-2402-07444, author = {Sajal Halder and Michael Bewong and Arash Mahboubi and Yinhao Jiang and Md Rafiqul Islam and Md Zahidul Islam and Ryan H. L. Ip and Muhammad Ejaz Ahmed and Gowri Sankar Ramachandran and Muhammad Ali Babar}, title = {Malicious Package Detection using Metadata Information}, journal = {CoRR}, volume = {abs/2402.07444}, year = {2024}, url = {https://doi.org/10.48550/arXiv.2402.07444}, doi = {10.48550/ARXIV.2402.07444}, eprinttype = {arXiv}, eprint = {2402.07444}, timestamp = {Fri, 10 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2402-07444.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dai/MaayahAAA023, author = {Marina Maayah and Ahlam Abunada and Khawla Al{-}Janahi and Muhammad Ejaz Ahmed and Junaid Qadir}, title = {LimitAccess: on-device TinyML based robust speech recognition and age classification}, journal = {Discov. Artif. Intell.}, volume = {3}, number = {1}, year = {2023}, url = {https://doi.org/10.1007/s44163-023-00051-x}, doi = {10.1007/S44163-023-00051-X}, timestamp = {Fri, 05 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dai/MaayahAAA023.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/aintec/AlmashorAPXA0WC23, author = {Mahathir Almashor and M. Ejaz Ahmed and Benjamin Pick and Jason Xue and Sharif Abuadbba and Raj Gaire and Shuo Wang and Seyit Camtepe and Surya Nepal}, title = {Unraveling Threat Intelligence Through the Lens of Malicious {URL} Campaigns}, booktitle = {Proceedings of the 18th Asian Internet Engineering Conference, {AINTEC} 2023, Hanoi, Vietnam, December 12-14, 2023}, pages = {78--86}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3630590.3630600}, doi = {10.1145/3630590.3630600}, timestamp = {Fri, 29 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/aintec/AlmashorAPXA0WC23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2308-01463, author = {Zian Liu and Zhi Zhang and Siqi Ma and Dongxi Liu and Jun Zhang and Chao Chen and Shigang Liu and Muhammad Ejaz Ahmed and Yang Xiang}, title = {SemDiff: Binary Similarity Detection by Diffing Key-Semantics Graphs}, journal = {CoRR}, volume = {abs/2308.01463}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2308.01463}, doi = {10.48550/ARXIV.2308.01463}, eprinttype = {arXiv}, eprint = {2308.01463}, timestamp = {Mon, 21 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2308-01463.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2308-04115, author = {Zian Liu and Chao Chen and Muhammad Ejaz Ahmed and Jun Zhang and Dongxi Liu}, title = {model-based script synthesis for fuzzing}, journal = {CoRR}, volume = {abs/2308.04115}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2308.04115}, doi = {10.48550/ARXIV.2308.04115}, eprinttype = {arXiv}, eprint = {2308.04115}, timestamp = {Tue, 22 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2308-04115.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/LiCWWACX22, author = {Chaoran Li and Xiao Chen and Derui Wang and Sheng Wen and Muhammad Ejaz Ahmed and Seyit Camtepe and Yang Xiang}, title = {Backdoor Attack on Machine Learning Based Android Malware Detectors}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {19}, number = {5}, pages = {3357--3370}, year = {2022}, url = {https://doi.org/10.1109/TDSC.2021.3094824}, doi = {10.1109/TDSC.2021.3094824}, timestamp = {Sat, 10 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/LiCWWACX22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/ThapaJACPN22, author = {Chandra Thapa and Seung Ick Jang and Muhammad Ejaz Ahmed and Seyit Camtepe and Josef Pieprzyk and Surya Nepal}, title = {Transformer-Based Language Models for Software Vulnerability Detection}, booktitle = {Annual Computer Security Applications Conference, {ACSAC} 2022, Austin, TX, USA, December 5-9, 2022}, pages = {481--496}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3564625.3567985}, doi = {10.1145/3564625.3567985}, timestamp = {Sun, 25 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/ThapaJACPN22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/issre/KimCANK22, author = {Soolin Kim and Jusop Choi and Muhammad Ejaz Ahmed and Surya Nepal and Hyoungshick Kim}, title = {VulDeBERT: {A} Vulnerability Detection System Using {BERT}}, booktitle = {{IEEE} International Symposium on Software Reliability Engineering Workshops, {ISSRE} 2022 - Workshops, Charlotte, NC, USA, October 31 - Nov. 3, 2022}, pages = {69--74}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/ISSREW55968.2022.00042}, doi = {10.1109/ISSREW55968.2022.00042}, timestamp = {Tue, 03 Jan 2023 17:09:36 +0100}, biburl = {https://dblp.org/rec/conf/issre/KimCANK22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sigsoft/Li0SXWAC022, author = {Chaoran Li and Xiao Chen and Ruoxi Sun and Minhui Xue and Sheng Wen and Muhammad Ejaz Ahmed and Seyit Camtepe and Yang Xiang}, editor = {Abhik Roychoudhury and Cristian Cadar and Miryung Kim}, title = {Cross-language Android permission specification}, booktitle = {Proceedings of the 30th {ACM} Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering, {ESEC/FSE} 2022, Singapore, Singapore, November 14-18, 2022}, pages = {772--783}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3540250.3549142}, doi = {10.1145/3540250.3549142}, timestamp = {Tue, 26 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sigsoft/Li0SXWAC022.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2204-00985, author = {Alsharif Abuadbba and Shuo Wang and Mahathir Almashor and Muhammad Ejaz Ahmed and Raj Gaire and Seyit Camtepe and Surya Nepal}, title = {Towards Web Phishing Detection Limitations and Mitigation}, journal = {CoRR}, volume = {abs/2204.00985}, year = {2022}, url = {https://doi.org/10.48550/arXiv.2204.00985}, doi = {10.48550/ARXIV.2204.00985}, eprinttype = {arXiv}, eprint = {2204.00985}, timestamp = {Fri, 29 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2204-00985.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2204-03214, author = {Chandra Thapa and Seung Ick Jang and Muhammad Ejaz Ahmed and Seyit Camtepe and Josef Pieprzyk and Surya Nepal}, title = {Transformer-Based Language Models for Software Vulnerability Detection: Performance, Model's Security and Platforms}, journal = {CoRR}, volume = {abs/2204.03214}, year = {2022}, url = {https://doi.org/10.48550/arXiv.2204.03214}, doi = {10.48550/ARXIV.2204.03214}, eprinttype = {arXiv}, eprint = {2204.03214}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2204-03214.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2208-12449, author = {Mahathir Almashor and M. Ejaz Ahmed and Benjamin Pick and Sharif Abuadbba and Jason Xue and Raj Gaire and Shuo Wang and Seyit Camtepe and Surya Nepal}, title = {Unraveling Threat Intelligence Through the Lens of Malicious {URL} Campaigns}, journal = {CoRR}, volume = {abs/2208.12449}, year = {2022}, url = {https://doi.org/10.48550/arXiv.2208.12449}, doi = {10.48550/ARXIV.2208.12449}, eprinttype = {arXiv}, eprint = {2208.12449}, timestamp = {Fri, 29 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2208-12449.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dsn/KimAGZANK21, author = {Bedeuro Kim and Alsharif Abuadbba and Yansong Gao and Yifeng Zheng and Muhammad Ejaz Ahmed and Surya Nepal and Hyoungshick Kim}, title = {Decamouflage: {A} Framework to Detect Image-Scaling Attacks on {CNN}}, booktitle = {51st Annual {IEEE/IFIP} International Conference on Dependable Systems and Networks, {DSN} 2021, Taipei, Taiwan, June 21-24, 2021}, pages = {63--74}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/DSN48987.2021.00023}, doi = {10.1109/DSN48987.2021.00023}, timestamp = {Mon, 09 Aug 2021 14:50:25 +0200}, biburl = {https://dblp.org/rec/conf/dsn/KimAGZANK21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/AhmedKCN21, author = {Muhammad Ejaz Ahmed and Hyoungshick Kim and Seyit Camtepe and Surya Nepal}, editor = {Elisa Bertino and Haya Schulmann and Michael Waidner}, title = {Peeler: Profiling Kernel-Level Events to Detect Ransomware}, booktitle = {Computer Security - {ESORICS} 2021 - 26th European Symposium on Research in Computer Security, Darmstadt, Germany, October 4-8, 2021, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {12972}, pages = {240--260}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-88418-5\_12}, doi = {10.1007/978-3-030-88418-5\_12}, timestamp = {Tue, 17 Oct 2023 10:41:56 +0200}, biburl = {https://dblp.org/rec/conf/esorics/AhmedKCN21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2101-12434, author = {Muhammad Ejaz Ahmed and Hyoungshick Kim and Seyit Camtepe and Surya Nepal}, title = {Peeler: Profiling Kernel-Level Events to Detect Ransomware}, journal = {CoRR}, volume = {abs/2101.12434}, year = {2021}, url = {https://arxiv.org/abs/2101.12434}, eprinttype = {arXiv}, eprint = {2101.12434}, timestamp = {Tue, 02 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2101-12434.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2108-12726, author = {Mahathir Almashor and M. Ejaz Ahmed and Benjamin Pick and Sharif Abuadbba and Raj Gaire and Seyit Camtepe and Surya Nepal}, title = {Characterizing Malicious {URL} Campaigns}, journal = {CoRR}, volume = {abs/2108.12726}, year = {2021}, url = {https://arxiv.org/abs/2108.12726}, eprinttype = {arXiv}, eprint = {2108.12726}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2108-12726.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2111-08217, author = {Chaoran Li and Xiao Chen and Ruoxi Sun and Jason Xue and Sheng Wen and Muhammad Ejaz Ahmed and Seyit Camtepe and Yang Xiang}, title = {NatiDroid: Cross-Language Android Permission Specification}, journal = {CoRR}, volume = {abs/2111.08217}, year = {2021}, url = {https://arxiv.org/abs/2111.08217}, eprinttype = {arXiv}, eprint = {2111.08217}, timestamp = {Tue, 26 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2111-08217.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/AhmedKHKOK20, author = {Muhammad Ejaz Ahmed and Il{-}Youp Kwak and Jun Ho Huh and Iljoo Kim and Taekkyung Oh and Hyoungshick Kim}, editor = {Srdjan Capkun and Franziska Roesner}, title = {Void: {A} fast and light voice liveness detection system}, booktitle = {29th {USENIX} Security Symposium, {USENIX} Security 2020, August 12-14, 2020}, pages = {2685--2702}, publisher = {{USENIX} Association}, year = {2020}, url = {https://www.usenix.org/conference/usenixsecurity20/presentation/ahmed-muhammad}, timestamp = {Fri, 29 Jan 2021 22:08:55 +0100}, biburl = {https://dblp.org/rec/conf/uss/AhmedKHKOK20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2010-03735, author = {Bedeuro Kim and Alsharif Abuadbba and Yansong Gao and Yifeng Zheng and Muhammad Ejaz Ahmed and Hyoungshick Kim and Surya Nepal}, title = {Decamouflage: {A} Framework to Detect Image-Scaling Attacks on Convolutional Neural Networks}, journal = {CoRR}, volume = {abs/2010.03735}, year = {2020}, url = {https://arxiv.org/abs/2010.03735}, eprinttype = {arXiv}, eprint = {2010.03735}, timestamp = {Tue, 13 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2010-03735.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jsac/AliAATNP19, author = {Amjad Ali and Muhammad Ejaz Ahmed and Farman Ali and Nguyen Hoang Tran and Dusit Niyato and Sangheon Pack}, title = {NOn-parametric Bayesian channEls cLustering {(NOBEL)} Scheme for Wireless Multimedia Cognitive Radio Networks}, journal = {{IEEE} J. Sel. Areas Commun.}, volume = {37}, number = {10}, pages = {2293--2305}, year = {2019}, url = {https://doi.org/10.1109/JSAC.2019.2933943}, doi = {10.1109/JSAC.2019.2933943}, timestamp = {Sun, 30 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jsac/AliAATNP19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/AhmedUK19, author = {Muhammad Ejaz Ahmed and Saeed Ullah and Hyoungshick Kim}, title = {Statistical Application Fingerprinting for DDoS Attack Mitigation}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {14}, number = {6}, pages = {1471--1484}, year = {2019}, url = {https://doi.org/10.1109/TIFS.2018.2879616}, doi = {10.1109/TIFS.2018.2879616}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/AhmedUK19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tmc/AhmedKC18, author = {Muhammad Ejaz Ahmed and Dong In Kim and Kae Won Choi}, title = {Traffic-Aware Optimal Spectral Access in Wireless Powered Cognitive Radio Networks}, journal = {{IEEE} Trans. Mob. Comput.}, volume = {17}, number = {3}, pages = {733--745}, year = {2018}, url = {https://doi.org/10.1109/TMC.2017.2734660}, doi = {10.1109/TMC.2017.2734660}, timestamp = {Tue, 06 Mar 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tmc/AhmedKC18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tvt/LeeAK18, author = {Hae Sol Lee and Muhammad Ejaz Ahmed and Dong In Kim}, title = {Optimal Spectrum Sensing Policy in RF-Powered Cognitive Radio Networks}, journal = {{IEEE} Trans. Veh. Technol.}, volume = {67}, number = {10}, pages = {9557--9570}, year = {2018}, url = {https://doi.org/10.1109/TVT.2018.2857853}, doi = {10.1109/TVT.2018.2857853}, timestamp = {Thu, 25 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tvt/LeeAK18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/coinco/AhmedNK18, author = {Muhammad Ejaz Ahmed and Surya Nepal and Hyoungshick Kim}, title = {{MEDUSA:} Malware Detection Using Statistical Analysis of System's Behavior}, booktitle = {4th {IEEE} International Conference on Collaboration and Internet Computing, {CIC} 2018, Philadelphia, PA, USA, October 18-20, 2018}, pages = {272--278}, publisher = {{IEEE} Computer Society}, year = {2018}, url = {https://doi.org/10.1109/CIC.2018.00044}, doi = {10.1109/CIC.2018.00044}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/coinco/AhmedNK18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icuimc/LeeAK18, author = {Hae Sol Lee and Muhammad Ejaz Ahmed and Dong In Kim}, title = {Traffic-Aware Optimal Spectrum Sensing Policy in Wireless-Powered Cognitive Radio Networks}, booktitle = {Proceedings of the 12th International Conference on Ubiquitous Information Management and Communication, {IMCOM} 2018, Langkawi, Malaysia, January 05-07, 2018}, pages = {66:1--66:7}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3164541.3164555}, doi = {10.1145/3164541.3164555}, timestamp = {Wed, 21 Nov 2018 12:44:20 +0100}, biburl = {https://dblp.org/rec/conf/icuimc/LeeAK18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1803-09193, author = {Hae Sol Lee and Muhammad Ejaz Ahmed and Dong In Kim}, title = {Optimal Spectrum Sensing Policy with Traffic Classification in RF-Powered CRNs}, journal = {CoRR}, volume = {abs/1803.09193}, year = {2018}, url = {http://arxiv.org/abs/1803.09193}, eprinttype = {arXiv}, eprint = {1803.09193}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1803-09193.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tvt/AhmedKKS17, author = {Muhammad Ejaz Ahmed and Dong In Kim and Jin Young Kim and Yoan Shin}, title = {Energy-Arrival-Aware Detection Threshold in Wireless-Powered Cognitive Radio Networks}, journal = {{IEEE} Trans. Veh. Technol.}, volume = {66}, number = {10}, pages = {9201--9213}, year = {2017}, url = {https://doi.org/10.1109/TVT.2017.2705244}, doi = {10.1109/TVT.2017.2705244}, timestamp = {Thu, 25 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tvt/AhmedKKS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/apcc/LeeAK17, author = {Hae Sol Lee and Muhammad Ejaz Ahmed and Dong In Kim}, title = {Optimal spectrum sensing policy in RF-powered cognitive radio networks}, booktitle = {23rd Asia-Pacific Conference on Communications, {APCC} 2017, Perth, Australia, December 11-13, 2017}, pages = {1--6}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.23919/APCC.2017.8304016}, doi = {10.23919/APCC.2017.8304016}, timestamp = {Wed, 16 Oct 2019 14:14:54 +0200}, biburl = {https://dblp.org/rec/conf/apcc/LeeAK17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/bigdataservice/AhmedK17, author = {M. Ejaz Ahmed and Hyoungshick Kim}, title = {DDoS Attack Mitigation in Internet of Things Using Software Defined Networking}, booktitle = {Third {IEEE} International Conference on Big Data Computing Service and Applications, BigDataService 2017, Redwood City, CA, USA, April 6-9, 2017}, pages = {271--276}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://doi.org/10.1109/BigDataService.2017.41}, doi = {10.1109/BIGDATASERVICE.2017.41}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/bigdataservice/AhmedK17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/AhmedK17, author = {Muhammad Ejaz Ahmed and Hyoungshick Kim}, editor = {Bhavani Thuraisingham and David Evans and Tal Malkin and Dongyan Xu}, title = {Poster: Adversarial Examples for Classifiers in High-Dimensional Network Data}, booktitle = {Proceedings of the 2017 {ACM} {SIGSAC} Conference on Computer and Communications Security, {CCS} 2017, Dallas, TX, USA, October 30 - November 03, 2017}, pages = {2467--2469}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3133956.3138853}, doi = {10.1145/3133956.3138853}, timestamp = {Wed, 29 Jun 2022 15:37:41 +0200}, biburl = {https://dblp.org/rec/conf/ccs/AhmedK17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/KimLCAJK17, author = {Soyoung Kim and Sora Lee and Geumhwan Cho and Muhammad Ejaz Ahmed and Jaehoon (Paul) Jeong and Hyoungshick Kim}, editor = {Simon N. Foley and Dieter Gollmann and Einar Snekkenes}, title = {Preventing {DNS} Amplification Attacks Using the History of {DNS} Queries with {SDN}}, booktitle = {Computer Security - {ESORICS} 2017 - 22nd European Symposium on Research in Computer Security, Oslo, Norway, September 11-15, 2017, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {10493}, pages = {135--152}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-66399-9\_8}, doi = {10.1007/978-3-319-66399-9\_8}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/esorics/KimLCAJK17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icc/AhmedK17, author = {M. Ejaz Ahmed and Dong In Kim}, title = {Traffic-pattern aware opportunistic wireless energy harvesting in cognitive radio networks}, booktitle = {{IEEE} International Conference on Communications, {ICC} 2017, Paris, France, May 21-25, 2017}, pages = {1--6}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.1109/ICC.2017.7996350}, doi = {10.1109/ICC.2017.7996350}, timestamp = {Wed, 16 Oct 2019 14:14:50 +0200}, biburl = {https://dblp.org/rec/conf/icc/AhmedK17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/milcom/AhmedKP17, author = {Muhammad Ejaz Ahmed and Hyoungshick Kim and Moosung Park}, title = {Mitigating {DNS} query-based DDoS attacks with machine learning on software-defined networking}, booktitle = {2017 {IEEE} Military Communications Conference, {MILCOM} 2017, Baltimore, MD, USA, October 23-25, 2017}, pages = {11--16}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.1109/MILCOM.2017.8170802}, doi = {10.1109/MILCOM.2017.8170802}, timestamp = {Wed, 16 Oct 2019 14:14:52 +0200}, biburl = {https://dblp.org/rec/conf/milcom/AhmedKP17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wcnc/AhmedK16a, author = {M. Ejaz Ahmed and Dong In Kim}, title = {Traffic and energy-aware access in wireless powered cognitive radio networks}, booktitle = {{IEEE} Wireless Communications and Networking Conference, {WCNC} 2016, Doha, Qatar, April 3-6, 2016}, pages = {1--6}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/WCNC.2016.7564693}, doi = {10.1109/WCNC.2016.7564693}, timestamp = {Wed, 16 Oct 2019 14:14:50 +0200}, biburl = {https://dblp.org/rec/conf/wcnc/AhmedK16a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wcnc/AhmedK16, author = {M. Ejaz Ahmed and Dong In Kim}, title = {Traffic and energy-aware access in wireless powered cognitive radio networks}, booktitle = {{IEEE} Wireless Communications and Networking Conference Workshops, {WCNC} Workshops 2016, Doha, Qatar, April 3-6, 2016}, pages = {340--345}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/WCNCW.2016.7552722}, doi = {10.1109/WCNCW.2016.7552722}, timestamp = {Wed, 16 Oct 2019 14:14:50 +0200}, biburl = {https://dblp.org/rec/conf/wcnc/AhmedK16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/mis/PiranAASS15, author = {Mohammad Jalil Piran and M. Ejaz Ahmed and Amjad Ali and Ju Bin Song and Doug Young Suh}, title = {Channel Allocation Based on Content Characteristics for Video Transmission in Time-Domain-Based Multichannel Cognitive Radio Networks}, journal = {Mob. Inf. Syst.}, volume = {2015}, pages = {934715:1--934715:7}, year = {2015}, url = {https://doi.org/10.1155/2015/934715}, doi = {10.1155/2015/934715}, timestamp = {Thu, 01 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/mis/PiranAASS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sensors/AliAPS14, author = {Amjad Ali and M. Ejaz Ahmed and Mohammad Jalil Piran and Doug Young Suh}, title = {Resource Optimization Scheme for Multimedia-Enabled Wireless Mesh Networks}, journal = {Sensors}, volume = {14}, number = {8}, pages = {14500--14525}, year = {2014}, url = {https://doi.org/10.3390/s140814500}, doi = {10.3390/S140814500}, timestamp = {Thu, 27 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sensors/AliAPS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tmc/AhmedSHS14, author = {M. Ejaz Ahmed and Ju Bin Song and Zhu Han and Doug Young Suh}, title = {Sensing-Transmission Edifice Using Bayesian Nonparametric Traffic Clustering in Cognitive Radio Networks}, journal = {{IEEE} Trans. Mob. Comput.}, volume = {13}, number = {9}, pages = {2141--2155}, year = {2014}, url = {https://doi.org/10.1109/TMC.2013.156}, doi = {10.1109/TMC.2013.156}, timestamp = {Wed, 05 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tmc/AhmedSHS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/globecom/AhmedSH14, author = {M. Ejaz Ahmed and Ju Bin Song and Zhu Han}, title = {Mitigating malicious attacks using Bayesian nonparametric clustering in collaborative cognitive radio networks}, booktitle = {{IEEE} Global Communications Conference, {GLOBECOM} 2014, Austin, TX, USA, December 8-12, 2014}, pages = {999--1004}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/GLOCOM.2014.7036939}, doi = {10.1109/GLOCOM.2014.7036939}, timestamp = {Wed, 05 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/globecom/AhmedSH14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wcnc/AhmedSH13, author = {M. Ejaz Ahmed and Ju Bin Song and Zhu Han}, title = {Traffic pattern-based reward maximization for secondary user in dynamic spectrum access}, booktitle = {2013 {IEEE} Wireless Communications and Networking Conference (WCNC), Shanghai, Shanghai, China, April 7-10, 2013}, pages = {291--296}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/WCNC.2013.6554579}, doi = {10.1109/WCNC.2013.6554579}, timestamp = {Wed, 05 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wcnc/AhmedSH13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sensors/AhmedS12, author = {M. Ejaz Ahmed and Ju Bin Song}, title = {Non-Parametric Bayesian Human Motion Recognition Using a Single {MEMS} Tri-Axial Accelerometer}, journal = {Sensors}, volume = {12}, number = {10}, pages = {13185--13211}, year = {2012}, url = {https://doi.org/10.3390/s121013185}, doi = {10.3390/S121013185}, timestamp = {Wed, 14 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/sensors/AhmedS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icc/AhmedSNH12, author = {M. Ejaz Ahmed and Ju Bin Song and Nam Tuan Nguyen and Zhu Han}, title = {Nonparametric Bayesian identification of primary users' payloads in cognitive radio networks}, booktitle = {Proceedings of {IEEE} International Conference on Communications, {ICC} 2012, Ottawa, ON, Canada, June 10-15, 2012}, pages = {1586--1591}, publisher = {{IEEE}}, year = {2012}, url = {https://doi.org/10.1109/ICC.2012.6364306}, doi = {10.1109/ICC.2012.6364306}, timestamp = {Wed, 05 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icc/AhmedSNH12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wcnc/ZhaoAMSL12, author = {Guanzhe Zhao and M. Ejaz Ahmed and Rukun Mao and Ju Bin Song and Husheng Li}, title = {Channel allocation under uncertain primary users for delay sensitive secondary users}, booktitle = {2012 {IEEE} Wireless Communications and Networking Conference, {WCNC} 2012, Paris, France, April 1-4, 2012}, pages = {1337--1342}, publisher = {{IEEE}}, year = {2012}, url = {https://doi.org/10.1109/WCNC.2012.6213987}, doi = {10.1109/WCNC.2012.6213987}, timestamp = {Wed, 16 Oct 2019 14:14:50 +0200}, biburl = {https://dblp.org/rec/conf/wcnc/ZhaoAMSL12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fit/AhmedQB09, author = {M. Ejaz Ahmed and Junaid Qadir and Adeel Baig}, editor = {Sajjad Ahmad Madani}, title = {Channel assignment in cognitive radio networks: comparison and analysis}, booktitle = {{FIT} '09, 7th International Conference on Frontiers of Information Technology, Abbottabad, Pakistan, December 16-18, 2009}, pages = {12:1--12:8}, publisher = {{ACM}}, year = {2009}, url = {https://doi.org/10.1145/1838002.1838015}, doi = {10.1145/1838002.1838015}, timestamp = {Thu, 29 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fit/AhmedQB09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.