Search Results for author: Aziz Mohaisen

Found 7 papers, 2 papers with code

W-Net: A CNN-based Architecture for White Blood Cells Image Classification

1 code implementation2 Oct 2019 Changhun Jung, Mohammed Abuhamad, Jumabek Alikhanov, Aziz Mohaisen, Kyungja Han, DaeHun Nyang

Computer-aided methods for analyzing white blood cells (WBC) have become widely popular due to the complexity of the manual process.

Classification General Classification +1

COPYCAT: Practical Adversarial Attacks on Visualization-Based Malware Detection

no code implementations20 Sep 2019 Aminollah Khormali, Ahmed Abusnaina, Songqing Chen, DaeHun Nyang, Aziz Mohaisen

Therefore, we proposed an approach to generate adversarial examples, COPYCAT, which is specifically designed for malware detection systems considering two main goals; achieving a high misclassification rate and maintaining the executability and functionality of the original input.

Adversarial Attack Malware Detection

Exploring the Attack Surface of Blockchain: A Systematic Overview

1 code implementation6 Apr 2019 Muhammad Saad, Jeffrey Spaulding, Laurent Njilla, Charles Kamhoua, Sachin Shetty, DaeHun Nyang, Aziz Mohaisen

In this paper, we systematically explore the attack surface of the Blockchain technology, with an emphasis on public Blockchains.

Cryptography and Security

Detecting and Classifying Android Malware using Static Analysis along with Creator Information

no code implementations2 Mar 2019 Hyunjae Kang, Jae-wook Jang, Aziz Mohaisen, Huy Kang Kim

Guided by this insight, we propose a method to improve on the performance of Android malware detection by incorporating the creator's information as a feature and classify malicious applications into similar groups.

Cryptography and Security

Examining Adversarial Learning against Graph-based IoT Malware Detection Systems

no code implementations12 Feb 2019 Ahmed Abusnaina, Aminollah Khormali, Hisham Alasmary, Jeman Park, Afsah Anwar, Ulku Meteriz, Aziz Mohaisen

The main goal of this study is to investigate the robustness of graph-based Deep Learning (DL) models used for Internet of Things (IoT) malware classification against Adversarial Learning (AL).

Adversarial Attack General Classification +2

Andro-profiler: Detecting and Classifying Android Malware based on Behavioral Profiles

no code implementations4 Jun 2016 Jae-wook Jang, Jaesung Yun, Aziz Mohaisen, JiYoung Woo, Huy Kang Kim

Mass-market mobile security threats have increased recently due to the growth of mobile technologies and the popularity of mobile devices.

Cryptography and Security

Cannot find the paper you are looking for? You can Submit a new open access paper.