Analyzing and detecting emerging internet of things malware: A graph-based approach H Alasmary, A Khormali, A Anwar, J Park, J Choi, A Abusnaina, A Awad, ... IEEE Internet of Things Journal 6 (5), 8977-8988, 2019 | 184 | 2019 |
Control chart pattern recognition using RBF neural network with new training algorithm and practical features A Addeh, A Khormali, NA Golilarz ISA transactions 79, 202-216, 2018 | 148 | 2018 |
Adversarial learning attacks on graph-based IoT malware detection systems A Abusnaina, A Khormali, H Alasmary, J Park, A Anwar, A Mohaisen 2019 IEEE 39th International Conference on Distributed Computing Systems …, 2019 | 131* | 2019 |
Dine and dash: Static, dynamic, and economic analysis of in-browser cryptojacking M Saad, A Khormali, A Mohaisen 2019 APWG Symposium on Electronic Crime Research (eCrime), 1-12, 2019 | 88* | 2019 |
A novel approach for recognition of control chart patterns: Type-2 fuzzy clustering optimized support vector machine A Khormali, J Addeh ISA transactions 63, 256-264, 2016 | 68 | 2016 |
Domain name system security and privacy: A contemporary survey A Khormali, J Park, H Alasmary, A Anwar, M Saad, D Mohaisen Computer Networks 185, 107699, 2021 | 65 | 2021 |
Dfd: Adversarial learning-based approach to defend against website fingerprinting A Abusnaina, R Jang, A Khormali, DH Nyang, D Mohaisen IEEE INFOCOM 2020-IEEE Conference on Computer Communications, 2459-2468, 2020 | 58 | 2020 |
Where are you taking me? Behavioral analysis of open DNS resolvers J Park, A Khormali, M Mohaisen, A Mohaisen 2019 49th Annual IEEE/IFIP International Conference on Dependable Systems …, 2019 | 49 | 2019 |
From Blue-Sky to Practical Adversarial Learning A Khormali, A Abusnaina, S Chen, DH Nyang, D Mohaisen 2020 Second IEEE International Conference on Trust, Privacy and Security in …, 2020 | 46* | 2020 |
DFDT: an end-to-end deepfake detection framework using vision transformer A Khormali, JS Yuan Applied Sciences 12 (6), 2953, 2022 | 45 | 2022 |
Add: Attention-based deepfake detection approach A Khormali, JS Yuan Big Data and Cognitive Computing 5 (4), 49, 2021 | 38 | 2021 |
Optimization of brushless direct current motor design using an intelligent technique A Shabanian, AAP Tousiwas, M Pourmandi, A Khormali, A Ataei ISA transactions 57, 311-321, 2015 | 34 | 2015 |
Examining the robustness of learning-based ddos detection in software defined networks A Abusnaina, A Khormali, DH Nyang, M Yuksel, A Mohaisen 2019 IEEE Conference on Dependable and Secure Computing (DSC), 1-8, 2019 | 24 | 2019 |
Understanding the hidden cost of software vulnerabilities: Measurements and predictions A Anwar, A Khormali, DH Nyang, A Mohaisen Security and Privacy in Communication Networks: 14th International …, 2018 | 15* | 2018 |
Transcreen: transfer learning on graph-based anti-cancer virtual screening model M Salem, A Khormali, AK Arshadi, J Webb, JS Yuan Big Data and Cognitive Computing 4 (3), 16, 2020 | 13 | 2020 |
Developing a robust defensive system against adversarial examples using generative adversarial networks S Taheri, A Khormali, M Salem, JS Yuan Big Data and Cognitive Computing 4 (2), 11, 2020 | 12 | 2020 |
Self-supervised graph Transformer for deepfake detection A Khormali, JS Yuan IEEE Access, 2024 | 10 | 2024 |
Identification of an industrial gas turbine based on Rowen's model and using Multi-Objective Optimization method A Khormali, I Yousefi, H Yahyaei, SM Aliyari 2015 3rd RSI International Conference on Robotics and Mechatronics (ICROM …, 2015 | 10 | 2015 |
Gas turbine fault detection and identification by using fuzzy clustering methods AO Khormali, MA Sh 2014 Second RSI/ISM International Conference on Robotics and Mechatronics …, 2014 | 7 | 2014 |
Deep biological pathway informed pathology-genomic multimodal survival prediction L Qiu, A Khormali, K Liu arXiv preprint arXiv:2301.02383, 2023 | 6 | 2023 |