Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Skip to main content

Showing 1–36 of 36 results for author: Mohaisen, D

Searching in archive cs. Search in all archives.
.
  1. arXiv:2408.03441  [pdf, other

    cs.CR cs.LG

    Simple Perturbations Subvert Ethereum Phishing Transactions Detection: An Empirical Analysis

    Authors: Ahod Alghureid, David Mohaisen

    Abstract: This paper explores the vulnerability of machine learning models, specifically Random Forest, Decision Tree, and K-Nearest Neighbors, to very simple single-feature adversarial attacks in the context of Ethereum fraudulent transaction detection. Through comprehensive experimentation, we investigate the impact of various adversarial attack strategies on model performance metrics, such as accuracy, p… ▽ More

    Submitted 6 August, 2024; originally announced August 2024.

    Comments: 12 pages, 1 figure, 5 tables, accepted for presentation at WISA 2024

  2. arXiv:2408.03426  [pdf, ps, other

    cs.CR

    Dissecting the Infrastructure Used in Web-based Cryptojacking: A Measurement Perspective

    Authors: Ayodeji Adeniran, Kieran Human, David Mohaisen

    Abstract: This paper conducts a comprehensive examination of the infrastructure supporting cryptojacking operations. The analysis elucidates the methodologies, frameworks, and technologies malicious entities employ to misuse computational resources for unauthorized cryptocurrency mining. The investigation focuses on identifying websites serving as platforms for cryptojacking activities. A dataset of 887 web… ▽ More

    Submitted 6 August, 2024; originally announced August 2024.

    Comments: 12 pages, 3 figures, 6 tables, accepted for presentation in WISA 2024

  3. arXiv:2311.15366  [pdf, other

    cs.CR cs.LG

    Untargeted Code Authorship Evasion with Seq2Seq Transformation

    Authors: Soohyeon Choi, Rhongho Jang, DaeHun Nyang, David Mohaisen

    Abstract: Code authorship attribution is the problem of identifying authors of programming language codes through the stylistic features in their codes, a topic that recently witnessed significant interest with outstanding performance. In this work, we present SCAE, a code authorship obfuscation technique that leverages a Seq2Seq code transformer called StructCoder. SCAE customizes StructCoder, a system des… ▽ More

    Submitted 26 November, 2023; originally announced November 2023.

    Comments: 9 pages, 1 figure, 5 tables

  4. arXiv:2311.15363  [pdf, other

    cs.CR

    The Infrastructure Utilization of Free Contents Websites Reveal their Security Characteristics

    Authors: Mohamed Alqadhi, David Mohaisen

    Abstract: Free Content Websites (FCWs) are a significant element of the Web, and realizing their use is essential. This study analyzes FCWs worldwide by studying how they correlate with different network sizes, cloud service providers, and countries, depending on the type of content they offer. Additionally, we compare these findings with those of premium content websites (PCWs). Our analysis concluded that… ▽ More

    Submitted 26 November, 2023; originally announced November 2023.

    Comments: 13 pages, 8 figures, to appear in CSoNet 2023

  5. arXiv:2311.15360  [pdf, other

    cs.CR

    Understanding the Utilization of Cryptocurrency in the Metaverse and Security Implications

    Authors: Ayodeji Adeniran, Mohammed Alkinoon, David Mohaisen

    Abstract: We present our results on analyzing and understanding the behavior and security of various metaverse platforms incorporating cryptocurrencies. We obtained the top metaverse coins with a capitalization of at least 25 million US dollars and the top metaverse domains for the coins, and augmented our data with name registration information (via whois), including the hosting DNS IP addresses, registran… ▽ More

    Submitted 26 November, 2023; originally announced November 2023.

    Comments: 13 pages, 6 figures, 4 tables. To appear in CSoNet 2023

  6. arXiv:2310.03285  [pdf, other

    cs.LG cs.CR

    Burning the Adversarial Bridges: Robust Windows Malware Detection Against Binary-level Mutations

    Authors: Ahmed Abusnaina, Yizhen Wang, Sunpreet Arora, Ke Wang, Mihai Christodorescu, David Mohaisen

    Abstract: Toward robust malware detection, we explore the attack surface of existing malware detection systems. We conduct root-cause analyses of the practical binary-level black-box adversarial malware examples. Additionally, we uncover the sensitivity of volatile features within the detection engines and exhibit their exploitability. Highlighting volatile information channels within the software, we intro… ▽ More

    Submitted 4 October, 2023; originally announced October 2023.

    Comments: 12 pages

  7. arXiv:2305.14531  [pdf, other

    cs.CR

    Understanding the Country-Level Security of Free Content Websites and their Hosting Infrastructure

    Authors: Mohammed Alqadhi, Ali Alkinoon, Saeed Salem, David Mohaisen

    Abstract: This paper examines free content websites (FCWs) and premium content websites (PCWs) in different countries, comparing them to general websites. The focus is on the distribution of malicious websites and their correlation with the national cyber security index (NCSI), which measures a country's cyber security maturity and its ability to deter the hosting of such malicious websites. By analyzing a… ▽ More

    Submitted 23 May, 2023; originally announced May 2023.

    Comments: 10 pages, 2 figures, 4 tables

  8. arXiv:2304.14359  [pdf, other

    cs.CY cs.CR cs.PF

    Measuring and Modeling the Free Content Web

    Authors: Abdulrahman Alabduljabbar, Runyu Ma, Ahmed Abusnaina, Rhongho Jang, Songqing Chen, DaeHun Nyang, and David Mohaisen

    Abstract: Free content websites that provide free books, music, games, movies, etc., have existed on the Internet for many years. While it is a common belief that such websites might be different from premium websites providing the same content types, an analysis that supports this belief is lacking in the literature. In particular, it is unclear if those websites are as safe as their premium counterparts.… ▽ More

    Submitted 26 April, 2023; originally announced April 2023.

    Comments: 30 pages, 3 tables, 9 figures. Under review by Computer Networks

  9. arXiv:2304.13278  [pdf, other

    cs.CR cs.CY cs.PF

    Understanding the Security and Performance of the Web Presence of Hospitals: A Measurement Study

    Authors: Mohammed Alkinoon, Abdulrahman Alabduljabbar, Hattan Althebeiti, Rhongho Jang, DaeHun Nyang, David Mohaisen

    Abstract: Using a total of 4,774 hospitals categorized as government, non-profit, and proprietary hospitals, this study provides the first measurement-based analysis of hospitals' websites and connects the findings with data breaches through a correlation analysis. We study the security attributes of three categories, collectively and in contrast, against domain name, content, and SSL certificate-level feat… ▽ More

    Submitted 26 April, 2023; originally announced April 2023.

    Comments: 10 pages, 5 tables, 10 figures

  10. arXiv:2304.13255  [pdf, other

    cs.CR cs.CY cs.LG cs.SE

    SHIELD: Thwarting Code Authorship Attribution

    Authors: Mohammed Abuhamad, Changhun Jung, David Mohaisen, DaeHun Nyang

    Abstract: Authorship attribution has become increasingly accurate, posing a serious privacy risk for programmers who wish to remain anonymous. In this paper, we introduce SHIELD to examine the robustness of different code authorship attribution approaches against adversarial code examples. We define four attacks on attribution techniques, which include targeted and non-targeted attacks, and realize them usi… ▽ More

    Submitted 25 April, 2023; originally announced April 2023.

    Comments: 12 pages, 13 figures

  11. arXiv:2304.13253  [pdf, other

    cs.CR cs.CY cs.LG cs.SE

    Analyzing In-browser Cryptojacking

    Authors: Muhammad Saad, David Mohaisen

    Abstract: Cryptojacking is the permissionless use of a target device to covertly mine cryptocurrencies. With cryptojacking, attackers use malicious JavaScript codes to force web browsers into solving proof-of-work puzzles, thus making money by exploiting the resources of the website visitors. To understand and counter such attacks, we systematically analyze the static, dynamic, and economic aspects of in-br… ▽ More

    Submitted 25 April, 2023; originally announced April 2023.

    Comments: 14 pages, 11 tables, 8 figures, and 69 references. arXiv admin note: substantial text overlap with arXiv:1809.02152

  12. arXiv:2210.15529  [pdf, other

    cs.CR cs.CY cs.LG

    Learning Location from Shared Elevation Profiles in Fitness Apps: A Privacy Perspective

    Authors: Ulku Meteriz-Yildiran, Necip Fazil Yildiran, Joongheon Kim, David Mohaisen

    Abstract: The extensive use of smartphones and wearable devices has facilitated many useful applications. For example, with Global Positioning System (GPS)-equipped smart and wearable devices, many applications can gather, process, and share rich metadata, such as geolocation, trajectories, elevation, and time. For example, fitness applications, such as Runkeeper and Strava, utilize the information for acti… ▽ More

    Submitted 27 October, 2022; originally announced October 2022.

    Comments: 16 pages, 12 figures, 10 tables; accepted for publication in IEEE Transactions on Mobile Computing (October 2022). arXiv admin note: substantial text overlap with arXiv:1910.09041

  13. arXiv:2210.12083  [pdf, other

    cs.CR cs.CY

    Do Content Management Systems Impact the Security of Free Content Websites? A Correlation Analysis

    Authors: Mohammed Alaqdhi, Abdulrahman Alabduljabbar, Kyle Thomas, Saeed Salem, DaeHun Nyang, David Mohaisen

    Abstract: This paper investigates the potential causes of the vulnerabilities of free content websites to address risks and maliciousness. Assembling more than 1,500 websites with free and premium content, we identify their content management system (CMS) and malicious attributes. We use frequency analysis at both the aggregate and per category of content (books, games, movies, music, and software), utilizi… ▽ More

    Submitted 21 October, 2022; originally announced October 2022.

    Comments: 7 pages, 1 figure, 6 tables

  14. arXiv:2210.10512  [pdf, ps, other

    cs.CR cs.CY

    Miners in the Cloud: Measuring and Analyzing Cryptocurrency Mining in Public Clouds

    Authors: Ayodeji Adeniran, David Mohaisen

    Abstract: Cryptocurrencies, arguably the most prominent application of blockchains, have been on the rise with a wide mainstream acceptance. A central concept in cryptocurrencies is "mining pools", groups of cooperating cryptocurrency miners who agree to share block rewards in proportion to their contributed mining power. Despite many promised benefits of cryptocurrencies, they are equally utilized for mali… ▽ More

    Submitted 19 October, 2022; originally announced October 2022.

    Comments: 6 pages, 6 tables

  15. arXiv:2210.01260  [pdf, other

    cs.CR cs.LG

    Enriching Vulnerability Reports Through Automated and Augmented Description Summarization

    Authors: Hattan Althebeiti, David Mohaisen

    Abstract: Security incidents and data breaches are increasing rapidly, and only a fraction of them is being reported. Public vulnerability databases, e.g., national vulnerability database (NVD) and common vulnerability and exposure (CVE), have been leading the effort in documenting vulnerabilities and sharing them to aid defenses. Both are known for many issues, including brief vulnerability descriptions. T… ▽ More

    Submitted 3 October, 2022; originally announced October 2022.

    Comments: 13 pages; to appear in WISA 2022

  16. arXiv:2209.14525  [pdf, other

    cs.CV eess.SY

    Self-Configurable Stabilized Real-Time Detection Learning for Autonomous Driving Applications

    Authors: Won Joon Yun, Soohyun Park, Joongheon Kim, David Mohaisen

    Abstract: Guaranteeing real-time and accurate object detection simultaneously is paramount in autonomous driving environments. However, the existing object detection neural network systems are characterized by a tradeoff between computation time and accuracy, making it essential to optimize such a tradeoff. Fortunately, in many autonomous driving environments, images come in a continuous form, providing an… ▽ More

    Submitted 28 September, 2022; originally announced September 2022.

  17. arXiv:2207.12231  [pdf, other

    cs.AR

    FAT-PIM: Low-Cost Error Detection for Processing-In-Memory

    Authors: Kazi Abu Zubair, Sumit Kumar Jha, David Mohaisen, Clayton Hughes, Amro Awad

    Abstract: Processing In Memory (PIM) accelerators are promising architecture that can provide massive parallelization and high efficiency in various applications. Such architectures can instantaneously provide ultra-fast operation over extensive data, allowing real-time performance in data-intensive workloads. For instance, Resistive Memory (ReRAM) based PIM architectures are widely known for their inherent… ▽ More

    Submitted 25 July, 2022; originally announced July 2022.

    Comments: This paper is currently under submission. We arXiv our paper to establish credit for inventing this work

  18. arXiv:2201.05843  [pdf, other

    eess.SY cs.AI cs.LG cs.RO

    Cooperative Multi-Agent Deep Reinforcement Learning for Reliable Surveillance via Autonomous Multi-UAV Control

    Authors: Won Joon Yun, Soohyun Park, Joongheon Kim, MyungJae Shin, Soyi Jung, David A. Mohaisen, Jae-Hyun Kim

    Abstract: CCTV-based surveillance using unmanned aerial vehicles (UAVs) is considered a key technology for security in smart city environments. This paper creates a case where the UAVs with CCTV-cameras fly over the city area for flexible and reliable surveillance services. UAVs should be deployed to cover a large area while minimize overlapping and shadow areas for a reliable surveillance system. However,… ▽ More

    Submitted 15 January, 2022; originally announced January 2022.

    Comments: 10 pages, 6 figures, Accepted for publication in IEEE Transactions on Industrial Informatics (TII)

  19. arXiv:2201.00768  [pdf, other

    cs.CL cs.AI cs.CR cs.HC cs.LG

    Robust Natural Language Processing: Recent Advances, Challenges, and Future Directions

    Authors: Marwan Omar, Soohyeon Choi, DaeHun Nyang, David Mohaisen

    Abstract: Recent natural language processing (NLP) techniques have accomplished high performance on benchmark datasets, primarily due to the significant improvement in the performance of deep learning. The advances in the research community have led to great enhancements in state-of-the-art production systems for NLP tasks, such as virtual assistants, speech recognition, and sentiment analysis. However, suc… ▽ More

    Submitted 3 January, 2022; originally announced January 2022.

    Comments: Survey; 2 figures, 4 tables

  20. arXiv:2111.02759  [pdf, other

    cs.NI

    Count-Less: A Counting Sketch for the Data Plane of High Speed Switches

    Authors: SunYoung Kim, Changhun Jung, RhongHo Jang, David Mohaisen, DaeHun Nyang

    Abstract: Demands are increasing to measure per-flow statistics in the data plane of high-speed switches. Measuring flows with exact counting is infeasible due to processing and memory constraints, but a sketch is a promising candidate for collecting approximately per-flow statistics in data plane in real-time. Among them, Count-Min sketch is a versatile tool to measure spectral density of high volume data… ▽ More

    Submitted 4 November, 2021; originally announced November 2021.

    Comments: 16 pages, 14 figures

  21. Automated Feature-Topic Pairing: Aligning Semantic and Embedding Spaces in Spatial Representation Learning

    Authors: Dongjie Wang, Kunpeng Liu, David Mohaisen, Pengyang Wang, Chang-Tien Lu, Yanjie Fu

    Abstract: Automated characterization of spatial data is a kind of critical geographical intelligence. As an emerging technique for characterization, Spatial Representation Learning (SRL) uses deep neural networks (DNNs) to learn non-linear embedded features of spatial data for characterization. However, SRL extracts features by internal layers of DNNs, and thus suffers from lacking semantic labels. Texts of… ▽ More

    Submitted 22 September, 2021; originally announced September 2021.

    Comments: SIGSPATIAL 2021

  22. arXiv:2108.13373  [pdf, other

    cs.CR cs.LG

    ML-based IoT Malware Detection Under Adversarial Settings: A Systematic Evaluation

    Authors: Ahmed Abusnaina, Afsah Anwar, Sultan Alshamrani, Abdulrahman Alabduljabbar, RhongHo Jang, Daehun Nyang, David Mohaisen

    Abstract: The rapid growth of the Internet of Things (IoT) devices is paralleled by them being on the front-line of malicious attacks. This has led to an explosion in the number of IoT malware, with continued mutations, evolution, and sophistication. These malicious software are detected using machine learning (ML) algorithms alongside the traditional signature-based methods. Although ML-based detectors imp… ▽ More

    Submitted 30 August, 2021; originally announced August 2021.

    Comments: 11 pages

  23. arXiv:2103.14221  [pdf, other

    cs.CR

    ShellCore: Automating Malicious IoT Software Detection by Using Shell Commands Representation

    Authors: Hisham Alasmary, Afsah Anwar, Ahmed Abusnaina, Abdulrahman Alabduljabbar, Mohammad Abuhamad, An Wang, DaeHun Nyang, Amro Awad, David Mohaisen

    Abstract: The Linux shell is a command-line interpreter that provides users with a command interface to the operating system, allowing them to perform a variety of functions. Although very useful in building capabilities at the edge, the Linux shell can be exploited, giving adversaries a prime opportunity to use them for malicious activities. With access to IoT devices, malware authors can abuse the Linux s… ▽ More

    Submitted 25 March, 2021; originally announced March 2021.

  24. arXiv:2103.14217  [pdf, other

    cs.CR

    Understanding Internet of Things Malware by Analyzing Endpoints in their Static Artifacts

    Authors: Afsah Anwar, Jinchun Choi, Abdulrahman Alabduljabbar, Hisham Alasmary, Jeffrey Spaulding, An Wang, Songqing Chen, DaeHun Nyang, Amro Awad, David Mohaisen

    Abstract: The lack of security measures among the Internet of Things (IoT) devices and their persistent online connection gives adversaries a prime opportunity to target them or even abuse them as intermediary targets in larger attacks such as distributed denial-of-service (DDoS) campaigns. In this paper, we analyze IoT malware and focus on the endpoints reachable on the public Internet, that play an essent… ▽ More

    Submitted 25 March, 2021; originally announced March 2021.

  25. arXiv:2103.09050  [pdf, other

    cs.CY cs.LG

    Hate, Obscenity, and Insults: Measuring the Exposure of Children to Inappropriate Comments in YouTube

    Authors: Sultan Alshamrani, Ahmed Abusnaina, Mohammed Abuhamad, Daehun Nyang, David Mohaisen

    Abstract: Social media has become an essential part of the daily routines of children and adolescents. Moreover, enormous efforts have been made to ensure the psychological and emotional well-being of young users as well as their safety when interacting with various social media platforms. In this paper, we investigate the exposure of those users to inappropriate comments posted on YouTube videos targeting… ▽ More

    Submitted 3 March, 2021; originally announced March 2021.

  26. arXiv:2101.00330  [pdf, other

    cs.CR cs.DC

    e-PoS: Making Proof-of-Stake Decentralized and Fair

    Authors: Muhammad Saad, Zhan Qin, Kui Ren, DaeHun Nyang, David Mohaisen

    Abstract: Blockchain applications that rely on the Proof-of-Work (PoW) have increasingly become energy inefficient with a staggering carbon footprint. In contrast, energy-efficient alternative consensus protocols such as Proof-of-Stake (PoS) may cause centralization and unfairness in the blockchain system. To address these challenges, we propose a modular version of PoS-based blockchain systems called epos… ▽ More

    Submitted 1 January, 2021; originally announced January 2021.

    Journal ref: IEEE Transactions on Parallel and Distributed Systems, 2021

  27. arXiv:2009.09647  [pdf, other

    cs.DC

    Reinforced Edge Selection using Deep Learning for Robust Surveillance in Unmanned Aerial Vehicles

    Authors: Soohyun Park, Jeman Park, David Mohaisen, Joongheon Kim

    Abstract: In this paper, we propose a novel deep Q-network (DQN)-based edge selection algorithm designed specifically for real-time surveillance in unmanned aerial vehicle (UAV) networks. The proposed algorithm is designed under the consideration of delay, energy, and overflow as optimizations to ensure real-time properties while striking a balance for other environment-related parameters. The merit of the… ▽ More

    Submitted 21 September, 2020; originally announced September 2020.

  28. arXiv:2009.09579  [pdf, other

    cs.NE cs.AI cs.LG

    On the Performance of Generative Adversarial Network (GAN) Variants: A Clinical Data Study

    Authors: Jaesung Yoo, Jeman Park, An Wang, David Mohaisen, Joongheon Kim

    Abstract: Generative Adversarial Network (GAN) is a useful type of Neural Networks in various types of applications including generative models and feature extraction. Various types of GANs are being researched with different insights, resulting in a diverse family of GANs with a better performance in each generation. This review focuses on various GANs categorized by their common traits.

    Submitted 20 September, 2020; originally announced September 2020.

  29. arXiv:2009.07923  [pdf, other

    cs.SI

    Hiding in Plain Sight: A Measurement and Analysis of Kids' Exposure to Malicious URLs on YouTube

    Authors: Sultan Alshamrani, Ahmed Abusnaina, David Mohaisen

    Abstract: The Internet has become an essential part of children's and adolescents' daily life. Social media platforms are used as educational and entertainment resources on daily bases by young users, leading enormous efforts to ensure their safety when interacting with various social media platforms. In this paper, we investigate the exposure of those users to inappropriate and malicious content in comment… ▽ More

    Submitted 16 September, 2020; originally announced September 2020.

    Comments: 6 pages, accepted at the Third ACM/IEEE Workshop on Hot Topics on Web of Things

  30. arXiv:2007.00146  [pdf, other

    cs.CV cs.LG

    Generating Adversarial Examples with an Optimized Quality

    Authors: Aminollah Khormali, DaeHun Nyang, David Mohaisen

    Abstract: Deep learning models are widely used in a range of application areas, such as computer vision, computer security, etc. However, deep learning models are vulnerable to Adversarial Examples (AEs),carefully crafted samples to deceive those models. Recent studies have introduced new adversarial attack methods, but, to the best of our knowledge, none provided guaranteed quality for the crafted examples… ▽ More

    Submitted 30 June, 2020; originally announced July 2020.

  31. arXiv:2006.15277  [pdf, other

    cs.NI

    Domain Name System Security and Privacy: A Contemporary Survey

    Authors: Aminollah Khormali, Jeman Park, Hisham Alasmary, Afsah Anwar, David Mohaisen

    Abstract: The domain name system (DNS) is one of the most important components of today's Internet, and is the standard naming convention between human-readable domain names and machine-routable IP addresses of Internet resources. However, due to the vulnerability of DNS to various threats, its security and functionality have been continuously challenged over the course of time. Although, researchers have a… ▽ More

    Submitted 27 June, 2020; originally announced June 2020.

  32. arXiv:2006.15074  [pdf, other

    cs.CR

    Cleaning the NVD: Comprehensive Quality Assessment, Improvements, and Analyses

    Authors: Afsah Anwar, Ahmed Abusnaina, Songqing Chen, Frank Li, David Mohaisen

    Abstract: Vulnerability databases are vital sources of information on emergent software security concerns. Security professionals, from system administrators to developers to researchers, heavily depend on these databases to track vulnerabilities and analyze security trends. How reliable and accurate are these databases though? In this paper, we explore this question with the National Vulnerability Databa… ▽ More

    Submitted 26 June, 2020; originally announced June 2020.

    Comments: 13 pages, 5 figures, 16 tables

  33. arXiv:2005.07145  [pdf, other

    cs.CR

    A Deep Learning-based Fine-grained Hierarchical Learning Approach for Robust Malware Classification

    Authors: Ahmed Abusnaina, Mohammed Abuhamad, Hisham Alasmary, Afsah Anwar, Rhongho Jang, Saeed Salem, DaeHun Nyang, David Mohaisen

    Abstract: The wide acceptance of Internet of Things (IoT) for both household and industrial applications is accompanied by several security concerns. A major security concern is their probable abuse by adversaries towards their malicious intent. Understanding and analyzing IoT malicious behaviors is crucial, especially with their rapid growth and adoption in wide-range of applications. However, recent studi… ▽ More

    Submitted 15 May, 2020; v1 submitted 14 May, 2020; originally announced May 2020.

    Comments: 15 pages

  34. arXiv:2005.04842  [pdf, other

    cs.CR

    Contra-*: Mechanisms for Countering Spam Attacks on Blockchain's Memory Pools

    Authors: Muhammad Saad, Joongheon Kim, DaeHun Nyang, David Mohaisen

    Abstract: Blockchain-based cryptocurrencies, such as Bitcoin, have seen on the rise in their popularity and value, making them a target to several forms of Denial-of-Service (DoS) attacks, and calling for a better understanding of their attack surface from both security and distributed systems standpoints. In this paper, and in the pursuit of understanding the attack surface of blockchains, we explore a new… ▽ More

    Submitted 1 January, 2021; v1 submitted 10 May, 2020; originally announced May 2020.

    Journal ref: Journal of Network and Computer Applications, 2021

  35. arXiv:2001.08578  [pdf, other

    cs.CR cs.HC cs.LG

    Sensor-based Continuous Authentication of Smartphones' Users Using Behavioral Biometrics: A Contemporary Survey

    Authors: Mohammed Abuhamad, Ahmed Abusnaina, DaeHun Nyang, David Mohaisen

    Abstract: Mobile devices and technologies have become increasingly popular, offering comparable storage and computational capabilities to desktop computers allowing users to store and interact with sensitive and private information. The security and protection of such personal information are becoming more and more important since mobile devices are vulnerable to unauthorized access or theft. User authentic… ▽ More

    Submitted 10 May, 2020; v1 submitted 23 January, 2020; originally announced January 2020.

    Comments: 19 pages

  36. arXiv:1911.12593  [pdf, ps, other

    cs.CY cs.CR cs.LG

    Computer Systems Have 99 Problems, Let's Not Make Machine Learning Another One

    Authors: David Mohaisen, Songqing Chen

    Abstract: Machine learning techniques are finding many applications in computer systems, including many tasks that require decision making: network optimization, quality of service assurance, and security. We believe machine learning systems are here to stay, and to materialize on their potential we advocate a fresh look at various key issues that need further attention, including security as a requirement… ▽ More

    Submitted 28 November, 2019; originally announced November 2019.

    Comments: 5 pages; 0 figures; 0 tables. To appear in IEEE TPS 2019 (vision track)