Adversarial-aware deep learning system based on a secondary classical machine learning verification approach M Alkhowaiter, H Kholidy, MA Alyami, A Alghamdi, C Zou Sensors 23 (14), 6287, 2023 | 24 | 2023 |
Military data space: Challenges, opportunities, and use cases PHL Rettore, P Zißner, M Alkhowaiter, C Zou, P Sevenich IEEE Communications Magazine, 2023 | 10 | 2023 |
Evaluating perceptual hashing algorithms in detecting image manipulation over social media platforms M Alkhowaiter, K Almubarak, C Zou 2022 IEEE International Conference on Cyber Security and Resilience (CSR …, 2022 | 10 | 2022 |
MAC-layer traffic shaping defense against WiFi device fingerprinting attacks M Alyami, M Alkhowaiter, M Al Ghanim, C Zou, Y Solihin 2022 IEEE Symposium on Computers and Communications (ISCC), 1-7, 2022 | 10 | 2022 |
Energy-efficient routing protocols for UWSNs: A comprehensive review of taxonomy, challenges, opportunities, future research directions, and machine learning perspectives SU Khan, ZU Khan, M Alkhowaiter, J Khan, S Ullah Journal of King Saud University-Computer and Information Sciences, 102128, 2024 | 9 | 2024 |
Random segmentation: New traffic obfuscation against packet-size-based side-channel attacks M Alyami, A Alghamdi, MA Alkhowaiter, C Zou, Y Solihin Electronics 12 (18), 3816, 2023 | 4 | 2023 |
Image authentication using self-supervised learning to detect manipulation over social network platforms M Alkhowaiter, K Almubarak, M Alyami, A Alghamdi, C Zou MILCOM 2022-2022 IEEE Military Communications Conference (MILCOM), 672-678, 2022 | 4 | 2022 |
Military Data Space: Challenges, Opportunities, and Use Cases PH Lopes Rettore, P Zißner, M Alkhowaiter, C Zou, P Sevenich | | 2024 |
Detecting Manipulated and Adversarial Images: A Comprehensive Study of Real-world Applications M Alkhowaiter University of Central Florida, Orlando, Florida, 2023 | | 2023 |
Evaluation of Perceptual Hashing Algorithms Against Image Manipulation Over Social Media Platforms M Alkhowaiter, K Almubarak, C Zou | | |