Følg
Aminollah Khormali, Ph.D.
Titel
Citeret af
Citeret af
År
Analyzing and detecting emerging internet of things malware: A graph-based approach
H Alasmary, A Khormali, A Anwar, J Park, J Choi, A Abusnaina, A Awad, ...
IEEE Internet of Things Journal 6 (5), 8977-8988, 2019
1842019
Control chart pattern recognition using RBF neural network with new training algorithm and practical features
A Addeh, A Khormali, NA Golilarz
ISA transactions 79, 202-216, 2018
1482018
Adversarial learning attacks on graph-based IoT malware detection systems
A Abusnaina, A Khormali, H Alasmary, J Park, A Anwar, A Mohaisen
2019 IEEE 39th International Conference on Distributed Computing Systems …, 2019
131*2019
Dine and dash: Static, dynamic, and economic analysis of in-browser cryptojacking
M Saad, A Khormali, A Mohaisen
2019 APWG Symposium on Electronic Crime Research (eCrime), 1-12, 2019
88*2019
A novel approach for recognition of control chart patterns: Type-2 fuzzy clustering optimized support vector machine
A Khormali, J Addeh
ISA transactions 63, 256-264, 2016
682016
Domain name system security and privacy: A contemporary survey
A Khormali, J Park, H Alasmary, A Anwar, M Saad, D Mohaisen
Computer Networks 185, 107699, 2021
652021
Dfd: Adversarial learning-based approach to defend against website fingerprinting
A Abusnaina, R Jang, A Khormali, DH Nyang, D Mohaisen
IEEE INFOCOM 2020-IEEE Conference on Computer Communications, 2459-2468, 2020
582020
Where are you taking me? Behavioral analysis of open DNS resolvers
J Park, A Khormali, M Mohaisen, A Mohaisen
2019 49th Annual IEEE/IFIP International Conference on Dependable Systems …, 2019
492019
From Blue-Sky to Practical Adversarial Learning
A Khormali, A Abusnaina, S Chen, DH Nyang, D Mohaisen
2020 Second IEEE International Conference on Trust, Privacy and Security in …, 2020
46*2020
DFDT: an end-to-end deepfake detection framework using vision transformer
A Khormali, JS Yuan
Applied Sciences 12 (6), 2953, 2022
452022
Add: Attention-based deepfake detection approach
A Khormali, JS Yuan
Big Data and Cognitive Computing 5 (4), 49, 2021
382021
Optimization of brushless direct current motor design using an intelligent technique
A Shabanian, AAP Tousiwas, M Pourmandi, A Khormali, A Ataei
ISA transactions 57, 311-321, 2015
342015
Examining the robustness of learning-based ddos detection in software defined networks
A Abusnaina, A Khormali, DH Nyang, M Yuksel, A Mohaisen
2019 IEEE Conference on Dependable and Secure Computing (DSC), 1-8, 2019
242019
Understanding the hidden cost of software vulnerabilities: Measurements and predictions
A Anwar, A Khormali, DH Nyang, A Mohaisen
Security and Privacy in Communication Networks: 14th International …, 2018
15*2018
Transcreen: transfer learning on graph-based anti-cancer virtual screening model
M Salem, A Khormali, AK Arshadi, J Webb, JS Yuan
Big Data and Cognitive Computing 4 (3), 16, 2020
132020
Developing a robust defensive system against adversarial examples using generative adversarial networks
S Taheri, A Khormali, M Salem, JS Yuan
Big Data and Cognitive Computing 4 (2), 11, 2020
122020
Self-supervised graph Transformer for deepfake detection
A Khormali, JS Yuan
IEEE Access, 2024
102024
Identification of an industrial gas turbine based on Rowen's model and using Multi-Objective Optimization method
A Khormali, I Yousefi, H Yahyaei, SM Aliyari
2015 3rd RSI International Conference on Robotics and Mechatronics (ICROM …, 2015
102015
Gas turbine fault detection and identification by using fuzzy clustering methods
AO Khormali, MA Sh
2014 Second RSI/ISM International Conference on Robotics and Mechatronics …, 2014
72014
Deep biological pathway informed pathology-genomic multimodal survival prediction
L Qiu, A Khormali, K Liu
arXiv preprint arXiv:2301.02383, 2023
62023
Systemet kan ikke foretage handlingen nu. Prøv igen senere.
Artikler 1–20