Search Results for author: Muhammad Ikram

Found 6 papers, 0 papers with code

BotSSCL: Social Bot Detection with Self-Supervised Contrastive Learning

no code implementations6 Feb 2024 Mohammad Majid Akhtar, Navid Shadman Bhuiyan, Rahat Masood, Muhammad Ikram, Salil S. Kanhere

To address these challenges, we propose a novel framework for social Bot detection with Self-Supervised Contrastive Learning (BotSSCL).

Contrastive Learning

False Information, Bots and Malicious Campaigns: Demystifying Elements of Social Media Manipulations

no code implementations24 Aug 2023 Mohammad Majid Akhtar, Rahat Masood, Muhammad Ikram, Salil S. Kanhere

While researchers from various disciplines have investigated different manipulation-triggering elements of OSNs (such as understanding information diffusion on OSNs or detecting automated behavior of accounts), these works have not been consolidated to present a comprehensive overview of the interconnections among these elements.

SPGNN-API: A Transferable Graph Neural Network for Attack Paths Identification and Autonomous Mitigation

no code implementations31 May 2023 Houssem Jmal, Firas Ben Hmida, Nardine Basta, Muhammad Ikram, Mohamed Ali Kaafar, Andy Walker

Attack paths are the potential chain of malicious activities an attacker performs to compromise network assets and acquire privileges through exploiting network vulnerabilities.

Machine Learning-based Automatic Annotation and Detection of COVID-19 Fake News

no code implementations7 Sep 2022 Mohammad Majid Akhtar, Bibhas Sharma, Ishan Karunanayake, Rahat Masood, Muhammad Ikram, Salil S. Kanhere

Existing work neglects the presence of bots that act as a catalyst in the spread and focuses on fake news detection in 'articles shared in posts' rather than the post (textual) content.

Fake News Detection Misinformation

Security and Privacy in IoT Using Machine Learning and Blockchain: Threats & Countermeasures

no code implementations10 Feb 2020 Nazar Waheed, Xiangjian He, Muhammad Ikram, Saad Sajid Hashmi, Muhammad Usman

In this paper, we provide a summary of research efforts made in the past few years, starting from 2008 to 2019, addressing security and privacy issues using ML algorithms and BCtechniques in the IoT domain.

BIG-bench Machine Learning

DaDiDroid: An Obfuscation Resilient Tool for Detecting Android Malware via Weighted Directed Call Graph Modelling

no code implementations22 May 2019 Muhammad Ikram, Pierrick Beaume, Mohamed Ali Kaafar

We examine the graph features of mobile apps code by building weighted directed graphs of the API calls, and verify that malicious apps often share structural similarities that can be used to differentiate them from benign apps, even under a heavily "polluted" training set where a large majority of the apps are obfuscated.

Cryptography and Security

Cannot find the paper you are looking for? You can Submit a new open access paper.