default search action
M. Ejaz Ahmed
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c23]Sajal Halder, Michael Bewong, Arash Mahboubi, Yinhao Jiang, Md. Rafiqul Islam, Md Zahidul Islam, Ryan H. L. Ip, Muhammad Ejaz Ahmed, Gowri Sankar Ramachandran, Muhammad Ali Babar:
Malicious Package Detection using Metadata Information. WWW 2024: 1779-1789 - [i12]Sajal Halder, Michael Bewong, Arash Mahboubi, Yinhao Jiang, Md. Rafiqul Islam, Md Zahidul Islam, Ryan H. L. Ip, Muhammad Ejaz Ahmed, Gowri Sankar Ramachandran, Muhammad Ali Babar:
Malicious Package Detection using Metadata Information. CoRR abs/2402.07444 (2024) - [i11]Wei Shao, Rongyi Zhu, Cai Yang, Chandra Thapa, Muhammad Ejaz Ahmed, Seyit Camtepe, Rui Zhang, Du Yong Kim, Hamid Menouar, Flora D. Salim:
ST-DPGAN: A Privacy-preserving Framework for Spatiotemporal Data Generation. CoRR abs/2406.03404 (2024) - 2023
- [j11]Marina Maayah, Ahlam Abunada, Khawla Al-Janahi, Muhammad Ejaz Ahmed, Junaid Qadir:
LimitAccess: on-device TinyML based robust speech recognition and age classification. Discov. Artif. Intell. 3(1) (2023) - [c22]Mahathir Almashor, M. Ejaz Ahmed, Benjamin Pick, Jason Xue, Sharif Abuadbba, Raj Gaire, Shuo Wang, Seyit Camtepe, Surya Nepal:
Unraveling Threat Intelligence Through the Lens of Malicious URL Campaigns. AINTEC 2023: 78-86 - [i10]Zian Liu, Zhi Zhang, Siqi Ma, Dongxi Liu, Jun Zhang, Chao Chen, Shigang Liu, Muhammad Ejaz Ahmed, Yang Xiang:
SemDiff: Binary Similarity Detection by Diffing Key-Semantics Graphs. CoRR abs/2308.01463 (2023) - [i9]Zian Liu, Chao Chen, Muhammad Ejaz Ahmed, Jun Zhang, Dongxi Liu:
model-based script synthesis for fuzzing. CoRR abs/2308.04115 (2023) - 2022
- [j10]Chaoran Li, Xiao Chen, Derui Wang, Sheng Wen, Muhammad Ejaz Ahmed, Seyit Camtepe, Yang Xiang:
Backdoor Attack on Machine Learning Based Android Malware Detectors. IEEE Trans. Dependable Secur. Comput. 19(5): 3357-3370 (2022) - [c21]Chandra Thapa, Seung Ick Jang, Muhammad Ejaz Ahmed, Seyit Camtepe, Josef Pieprzyk, Surya Nepal:
Transformer-Based Language Models for Software Vulnerability Detection. ACSAC 2022: 481-496 - [c20]Soolin Kim, Jusop Choi, Muhammad Ejaz Ahmed, Surya Nepal, Hyoungshick Kim:
VulDeBERT: A Vulnerability Detection System Using BERT. ISSRE Workshops 2022: 69-74 - [c19]Chaoran Li, Xiao Chen, Ruoxi Sun, Minhui Xue, Sheng Wen, Muhammad Ejaz Ahmed, Seyit Camtepe, Yang Xiang:
Cross-language Android permission specification. ESEC/SIGSOFT FSE 2022: 772-783 - [i8]Alsharif Abuadbba, Shuo Wang, Mahathir Almashor, Muhammad Ejaz Ahmed, Raj Gaire, Seyit Camtepe, Surya Nepal:
Towards Web Phishing Detection Limitations and Mitigation. CoRR abs/2204.00985 (2022) - [i7]Chandra Thapa, Seung Ick Jang, Muhammad Ejaz Ahmed, Seyit Camtepe, Josef Pieprzyk, Surya Nepal:
Transformer-Based Language Models for Software Vulnerability Detection: Performance, Model's Security and Platforms. CoRR abs/2204.03214 (2022) - [i6]Mahathir Almashor, M. Ejaz Ahmed, Benjamin Pick, Sharif Abuadbba, Jason Xue, Raj Gaire, Shuo Wang, Seyit Camtepe, Surya Nepal:
Unraveling Threat Intelligence Through the Lens of Malicious URL Campaigns. CoRR abs/2208.12449 (2022) - 2021
- [c18]Bedeuro Kim, Alsharif Abuadbba, Yansong Gao, Yifeng Zheng, Muhammad Ejaz Ahmed, Surya Nepal, Hyoungshick Kim:
Decamouflage: A Framework to Detect Image-Scaling Attacks on CNN. DSN 2021: 63-74 - [c17]Muhammad Ejaz Ahmed, Hyoungshick Kim, Seyit Camtepe, Surya Nepal:
Peeler: Profiling Kernel-Level Events to Detect Ransomware. ESORICS (1) 2021: 240-260 - [i5]Muhammad Ejaz Ahmed, Hyoungshick Kim, Seyit Camtepe, Surya Nepal:
Peeler: Profiling Kernel-Level Events to Detect Ransomware. CoRR abs/2101.12434 (2021) - [i4]Mahathir Almashor, M. Ejaz Ahmed, Benjamin Pick, Sharif Abuadbba, Raj Gaire, Seyit Camtepe, Surya Nepal:
Characterizing Malicious URL Campaigns. CoRR abs/2108.12726 (2021) - [i3]Chaoran Li, Xiao Chen, Ruoxi Sun, Jason Xue, Sheng Wen, Muhammad Ejaz Ahmed, Seyit Camtepe, Yang Xiang:
NatiDroid: Cross-Language Android Permission Specification. CoRR abs/2111.08217 (2021) - 2020
- [c16]Muhammad Ejaz Ahmed, Il-Youp Kwak, Jun Ho Huh, Iljoo Kim, Taekkyung Oh, Hyoungshick Kim:
Void: A fast and light voice liveness detection system. USENIX Security Symposium 2020: 2685-2702 - [i2]Bedeuro Kim, Alsharif Abuadbba, Yansong Gao, Yifeng Zheng, Muhammad Ejaz Ahmed, Hyoungshick Kim, Surya Nepal:
Decamouflage: A Framework to Detect Image-Scaling Attacks on Convolutional Neural Networks. CoRR abs/2010.03735 (2020)
2010 – 2019
- 2019
- [j9]Amjad Ali, Muhammad Ejaz Ahmed, Farman Ali, Nguyen Hoang Tran, Dusit Niyato, Sangheon Pack:
NOn-parametric Bayesian channEls cLustering (NOBEL) Scheme for Wireless Multimedia Cognitive Radio Networks. IEEE J. Sel. Areas Commun. 37(10): 2293-2305 (2019) - [j8]Muhammad Ejaz Ahmed, Saeed Ullah, Hyoungshick Kim:
Statistical Application Fingerprinting for DDoS Attack Mitigation. IEEE Trans. Inf. Forensics Secur. 14(6): 1471-1484 (2019) - 2018
- [j7]Muhammad Ejaz Ahmed, Dong In Kim, Kae Won Choi:
Traffic-Aware Optimal Spectral Access in Wireless Powered Cognitive Radio Networks. IEEE Trans. Mob. Comput. 17(3): 733-745 (2018) - [j6]Hae Sol Lee, Muhammad Ejaz Ahmed, Dong In Kim:
Optimal Spectrum Sensing Policy in RF-Powered Cognitive Radio Networks. IEEE Trans. Veh. Technol. 67(10): 9557-9570 (2018) - [c15]Muhammad Ejaz Ahmed, Surya Nepal, Hyoungshick Kim:
MEDUSA: Malware Detection Using Statistical Analysis of System's Behavior. CIC 2018: 272-278 - [c14]Hae Sol Lee, Muhammad Ejaz Ahmed, Dong In Kim:
Traffic-Aware Optimal Spectrum Sensing Policy in Wireless-Powered Cognitive Radio Networks. IMCOM 2018: 66:1-66:7 - [i1]Hae Sol Lee, Muhammad Ejaz Ahmed, Dong In Kim:
Optimal Spectrum Sensing Policy with Traffic Classification in RF-Powered CRNs. CoRR abs/1803.09193 (2018) - 2017
- [j5]Muhammad Ejaz Ahmed, Dong In Kim, Jin Young Kim, Yoan Shin:
Energy-Arrival-Aware Detection Threshold in Wireless-Powered Cognitive Radio Networks. IEEE Trans. Veh. Technol. 66(10): 9201-9213 (2017) - [c13]Hae Sol Lee, Muhammad Ejaz Ahmed, Dong In Kim:
Optimal spectrum sensing policy in RF-powered cognitive radio networks. APCC 2017: 1-6 - [c12]M. Ejaz Ahmed, Hyoungshick Kim:
DDoS Attack Mitigation in Internet of Things Using Software Defined Networking. BigDataService 2017: 271-276 - [c11]Muhammad Ejaz Ahmed, Hyoungshick Kim:
Poster: Adversarial Examples for Classifiers in High-Dimensional Network Data. CCS 2017: 2467-2469 - [c10]Soyoung Kim, Sora Lee, Geumhwan Cho, Muhammad Ejaz Ahmed, Jaehoon (Paul) Jeong, Hyoungshick Kim:
Preventing DNS Amplification Attacks Using the History of DNS Queries with SDN. ESORICS (2) 2017: 135-152 - [c9]M. Ejaz Ahmed, Dong In Kim:
Traffic-pattern aware opportunistic wireless energy harvesting in cognitive radio networks. ICC 2017: 1-6 - [c8]Muhammad Ejaz Ahmed, Hyoungshick Kim, Moosung Park:
Mitigating DNS query-based DDoS attacks with machine learning on software-defined networking. MILCOM 2017: 11-16 - 2016
- [c7]M. Ejaz Ahmed, Dong In Kim:
Traffic and energy-aware access in wireless powered cognitive radio networks. WCNC 2016: 1-6 - [c6]M. Ejaz Ahmed, Dong In Kim:
Traffic and energy-aware access in wireless powered cognitive radio networks. WCNC Workshops 2016: 340-345 - 2015
- [j4]Mohammad Jalil Piran, M. Ejaz Ahmed, Amjad Ali, Ju Bin Song, Doug Young Suh:
Channel Allocation Based on Content Characteristics for Video Transmission in Time-Domain-Based Multichannel Cognitive Radio Networks. Mob. Inf. Syst. 2015: 934715:1-934715:7 (2015) - 2014
- [j3]Amjad Ali, M. Ejaz Ahmed, Mohammad Jalil Piran, Doug Young Suh:
Resource Optimization Scheme for Multimedia-Enabled Wireless Mesh Networks. Sensors 14(8): 14500-14525 (2014) - [j2]M. Ejaz Ahmed, Ju Bin Song, Zhu Han, Doug Young Suh:
Sensing-Transmission Edifice Using Bayesian Nonparametric Traffic Clustering in Cognitive Radio Networks. IEEE Trans. Mob. Comput. 13(9): 2141-2155 (2014) - [c5]M. Ejaz Ahmed, Ju Bin Song, Zhu Han:
Mitigating malicious attacks using Bayesian nonparametric clustering in collaborative cognitive radio networks. GLOBECOM 2014: 999-1004 - 2013
- [c4]M. Ejaz Ahmed, Ju Bin Song, Zhu Han:
Traffic pattern-based reward maximization for secondary user in dynamic spectrum access. WCNC 2013: 291-296 - 2012
- [j1]M. Ejaz Ahmed, Ju Bin Song:
Non-Parametric Bayesian Human Motion Recognition Using a Single MEMS Tri-Axial Accelerometer. Sensors 12(10): 13185-13211 (2012) - [c3]M. Ejaz Ahmed, Ju Bin Song, Nam Tuan Nguyen, Zhu Han:
Nonparametric Bayesian identification of primary users' payloads in cognitive radio networks. ICC 2012: 1586-1591 - [c2]Guanzhe Zhao, M. Ejaz Ahmed, Rukun Mao, Ju Bin Song, Husheng Li:
Channel allocation under uncertain primary users for delay sensitive secondary users. WCNC 2012: 1337-1342
2000 – 2009
- 2009
- [c1]M. Ejaz Ahmed, Junaid Qadir, Adeel Baig:
Channel assignment in cognitive radio networks: comparison and analysis. FIT 2009: 12:1-12:8
Coauthor Index
aka: Seyit Camtepe
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-18 19:33 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint