Follow
Muhammad Ejaz Ahmed
Muhammad Ejaz Ahmed
CSIRO's Data61
Verified email at data61.csiro.au
Title
Cited by
Cited by
Year
DDoS attack mitigation in Internet of Things using software defined networking
ME Ahmed, H Kim
2017 IEEE third international conference on big data computing service and …, 2017
1052017
Statistical application fingerprinting for DDoS attack mitigation
ME Ahmed, S Ullah, H Kim
IEEE Transactions on Information Forensics and Security 14 (6), 1471-1484, 2018
822018
Void: A fast and light voice liveness detection system
ME Ahmed, IY Kwak, JH Huh, I Kim, T Oh, H Kim
29th USENIX Security Symposium (USENIX Security 20), 2685-2702, 2020
772020
Mitigating DNS query-based DDoS attacks with machine learning on software-defined networking
ME Ahmed, H Kim, M Park
MILCOM 2017-2017 IEEE Military Communications Conference (MILCOM), 11-16, 2017
632017
Transformer-based language models for software vulnerability detection
C Thapa, SI Jang, ME Ahmed, S Camtepe, J Pieprzyk, S Nepal
Proceedings of the 38th Annual Computer Security Applications Conference …, 2022
412022
Backdoor attack on machine learning based android malware detectors
C Li, X Chen, D Wang, S Wen, ME Ahmed, S Camtepe, Y Xiang
IEEE Transactions on dependable and secure computing 19 (5), 3357-3370, 2021
412021
Preventing DNS amplification attacks using the history of DNS queries with SDN
S Kim, S Lee, G Cho, ME Ahmed, J Jeong, H Kim
Computer Security–ESORICS 2017: 22nd European Symposium on Research in …, 2017
332017
Peeler: Profiling kernel-level events to detect ransomware
ME Ahmed, H Kim, S Camtepe, S Nepal
Computer Security–ESORICS 2021: 26th European Symposium on Research in …, 2021
282021
Energy-arrival-aware detection threshold in wireless-powered cognitive radio networks
ME Ahmed, DI Kim, JY Kim, Y Shin
IEEE Transactions on Vehicular Technology 66 (10), 9201-9213, 2017
282017
Sensing-transmission edifice using bayesian nonparametric traffic clustering in cognitive radio networks
ME Ahmed, JB Song, Z Han, DY Suh
IEEE Transactions on Mobile Computing 13 (9), 2141-2155, 2013
222013
Resource optimization scheme for multimedia-enabled wireless mesh networks
A Ali, ME Ahmed, MJ Piran, DY Suh
Sensors 14 (8), 14500-14525, 2014
212014
Traffic-aware optimal spectral access in wireless powered cognitive radio networks
ME Ahmed, DI Kim, KW Choi
IEEE Transactions on Mobile Computing 17 (3), 733-745, 2017
172017
Mitigating malicious attacks using Bayesian nonparametric clustering in collaborative cognitive radio networks
ME Ahmed, JB Song, Z Han
2014 IEEE Global Communications Conference, 999-1004, 2014
142014
Vuldebert: A vulnerability detection system using bert
S Kim, J Choi, ME Ahmed, S Nepal, H Kim
2022 IEEE International Symposium on Software Reliability Engineering …, 2022
132022
Medusa: Malware detection using statistical analysis of system's behavior
ME Ahmed, S Nepal, H Kim
2018 IEEE 4th International Conference on Collaboration and Internet …, 2018
132018
Optimal spectrum sensing policy in RF-powered cognitive radio networks
HS Lee, ME Ahmed, DI Kim
IEEE Transactions on Vehicular Technology 67 (10), 9557-9570, 2018
132018
Nonparametric Bayesian identification of primary users' payloads in cognitive radio networks
ME Ahmed, JB Song, NT Nguyen, Z Han
2012 IEEE International Conference on Communications (ICC), 1586-1591, 2012
132012
Synthesis, characterization and performance evaluation of poly octadecyl methacrylate and poly octadecyl methacrylatecomethylmethacrylate as an additive for lubricating oil
M Ahmed, A Mohammed, M Ahamad
IOSR journal of applied chemistry 10 (04), 50-58, 2017
122017
Decamouflage: A framework to detect image-scaling attacks on CNN
B Kim, A Abuadbba, Y Gao, Y Zheng, ME Ahmed, S Nepal, H Kim
2021 51st Annual IEEE/IFIP International Conference on Dependable Systems …, 2021
11*2021
Poster: Adversarial examples for classifiers in high-dimensional network data
ME Ahmed, H Kim
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications …, 2017
102017
The system can't perform the operation now. Try again later.
Articles 1–20