no code implementations • 26 Nov 2023 • Soohyeon Choi, RhongHo Jang, DaeHun Nyang, David Mohaisen
Code authorship attribution is the problem of identifying authors of programming language codes through the stylistic features in their codes, a topic that recently witnessed significant interest with outstanding performance.
no code implementations • 26 Apr 2023 • Mohammed Abuhamad, Changhun Jung, David Mohaisen, DaeHun Nyang
For the targeted attacks, we show the possibility of impersonating a programmer using targeted-adversarial perturbations with a success rate ranging from 66\% to 88\% for different authorship attribution techniques under several adversarial scenarios.
no code implementations • 3 Jan 2022 • marwan omar, Soohyeon Choi, DaeHun Nyang, David Mohaisen
Recent natural language processing (NLP) techniques have accomplished high performance on benchmark datasets, primarily due to the significant improvement in the performance of deep learning.
no code implementations • 30 Aug 2021 • Ahmed Abusnaina, Afsah Anwar, Sultan Alshamrani, Abdulrahman Alabduljabbar, RhongHo Jang, DaeHun Nyang, David Mohaisen
Additionally, our analysis of the industry-standard malware detectors shows their instability to the malware mutations.
no code implementations • 3 Mar 2021 • Sultan Alshamrani, Ahmed Abusnaina, Mohammed Abuhamad, DaeHun Nyang, David Mohaisen
Social media has become an essential part of the daily routines of children and adolescents.
no code implementations • 30 Jun 2020 • Aminollah Khormali, DaeHun Nyang, David Mohaisen
However, deep learning models are vulnerable to Adversarial Examples (AEs), carefully crafted samples to deceive those models.
no code implementations • 23 Jan 2020 • Mohammed Abuhamad, Ahmed Abusnaina, DaeHun Nyang, David Mohaisen
This task is made possible with today's smartphones' embedded sensors that enable continuous and implicit user authentication by capturing behavioral biometrics and traits.
1 code implementation • 2 Oct 2019 • Changhun Jung, Mohammed Abuhamad, Jumabek Alikhanov, Aziz Mohaisen, Kyungja Han, DaeHun Nyang
Computer-aided methods for analyzing white blood cells (WBC) have become widely popular due to the complexity of the manual process.
no code implementations • 20 Sep 2019 • Aminollah Khormali, Ahmed Abusnaina, Songqing Chen, DaeHun Nyang, Aziz Mohaisen
Therefore, we proposed an approach to generate adversarial examples, COPYCAT, which is specifically designed for malware detection systems considering two main goals; achieving a high misclassification rate and maintaining the executability and functionality of the original input.
1 code implementation • 6 Apr 2019 • Muhammad Saad, Jeffrey Spaulding, Laurent Njilla, Charles Kamhoua, Sachin Shetty, DaeHun Nyang, Aziz Mohaisen
In this paper, we systematically explore the attack surface of the Blockchain technology, with an emphasis on public Blockchains.
Cryptography and Security
no code implementations • 1 Mar 2008 • Tamer Abuhmed, Abedelaziz Mohaisen, DaeHun Nyang
Deep packet inspection is widely recognized as a powerful way which is used for intrusion detection systems for inspecting, deterring and deflecting malicious at- tacks over the network.