Skip to main content

Showing 1–11 of 11 results for author: Ahmed, M E

.
  1. arXiv:2406.03404  [pdf, other

    cs.LG cs.AI cs.CR

    ST-DPGAN: A Privacy-preserving Framework for Spatiotemporal Data Generation

    Authors: Wei Shao, Rongyi Zhu, Cai Yang, Chandra Thapa, Muhammad Ejaz Ahmed, Seyit Camtepe, Rui Zhang, DuYong Kim, Hamid Menouar, Flora D. Salim

    Abstract: Spatiotemporal data is prevalent in a wide range of edge devices, such as those used in personal communication and financial transactions. Recent advancements have sparked a growing interest in integrating spatiotemporal analysis with large-scale language models. However, spatiotemporal data often contains sensitive information, making it unsuitable for open third-party access. To address this cha… ▽ More

    Submitted 4 June, 2024; originally announced June 2024.

  2. arXiv:2308.04115  [pdf, other

    cs.CR cs.SE

    model-based script synthesis for fuzzing

    Authors: Zian Liu, Chao Chen, Muhammad Ejaz Ahmed, Jun Zhang, Dongxi Liu

    Abstract: Kernel fuzzing is important for finding critical kernel vulnerabilities. Close-source (e.g., Windows) operating system kernel fuzzing is even more challenging due to the lack of source code. Existing approaches fuzz the kernel by modeling syscall sequences from traces or static analysis of system codes. However, a common limitation is that they do not learn and mutate the syscall sequences to reac… ▽ More

    Submitted 8 August, 2023; originally announced August 2023.

    Comments: 12 pages, conference paper

  3. arXiv:2308.01463  [pdf, other

    cs.CR

    SemDiff: Binary Similarity Detection by Diffing Key-Semantics Graphs

    Authors: Zian Liu, Zhi Zhang, Siqi Ma, Dongxi Liu, Jun Zhang, Chao Chen, Shigang Liu, Muhammad Ejaz Ahmed, Yang Xiang

    Abstract: Binary similarity detection is a critical technique that has been applied in many real-world scenarios where source code is not available, e.g., bug search, malware analysis, and code plagiarism detection. Existing works are ineffective in detecting similar binaries in cases where different compiling optimizations, compilers, source code versions, or obfuscation are deployed. We observe that all… ▽ More

    Submitted 2 August, 2023; originally announced August 2023.

    Comments: 12 pages, conference paper

  4. arXiv:2204.03214  [pdf, other

    cs.CR cs.AI cs.LG

    Transformer-Based Language Models for Software Vulnerability Detection

    Authors: Chandra Thapa, Seung Ick Jang, Muhammad Ejaz Ahmed, Seyit Camtepe, Josef Pieprzyk, Surya Nepal

    Abstract: The large transformer-based language models demonstrate excellent performance in natural language processing. By considering the transferability of the knowledge gained by these models in one domain to other related domains, and the closeness of natural languages to high-level programming languages, such as C/C++, this work studies how to leverage (large) transformer-based language models in detec… ▽ More

    Submitted 5 September, 2022; v1 submitted 7 April, 2022; originally announced April 2022.

    Comments: 16 pages

  5. arXiv:2204.00985  [pdf, other

    cs.CR cs.LG

    Towards Web Phishing Detection Limitations and Mitigation

    Authors: Alsharif Abuadbba, Shuo Wang, Mahathir Almashor, Muhammed Ejaz Ahmed, Raj Gaire, Seyit Camtepe, Surya Nepal

    Abstract: Web phishing remains a serious cyber threat responsible for most data breaches. Machine Learning (ML)-based anti-phishing detectors are seen as an effective countermeasure, and are increasingly adopted by web-browsers and software products. However, with an average of 10K phishing links reported per hour to platforms such as PhishTank and VirusTotal (VT), the deficiencies of such ML-based solution… ▽ More

    Submitted 3 April, 2022; originally announced April 2022.

    Comments: 12 pages

  6. arXiv:2111.08217  [pdf, other

    cs.CR

    NatiDroid: Cross-Language Android Permission Specification

    Authors: Chaoran Li, Xiao Chen, Ruoxi Sun, Jason Xue, Sheng Wen, Muhammad Ejaz Ahmed, Seyit Camtepe, Yang Xiang

    Abstract: The Android system manages access to sensitive APIs by permission enforcement. An application (app) must declare proper permissions before invoking specific Android APIs. However, there is no official documentation providing the complete list of permission-protected APIs and the corresponding permissions to date. Researchers have spent significant efforts extracting such API protection map** fro… ▽ More

    Submitted 15 November, 2021; originally announced November 2021.

  7. arXiv:2103.11547  [pdf, other

    cs.DL cs.SI econ.GN physics.soc-ph

    Grand challenges and emergent modes of convergence science

    Authors: Alexander M. Petersen, Mohammed E. Ahmed, Ioannis Pavlidis

    Abstract: To address complex problems, scholars are increasingly faced with challenges of integrating diverse knowledge domains. We analyzed the evolution of this convergence paradigm in the broad ecosystem of brain science, which provides a real-time testbed for evaluating two modes of cross-domain integration - subject area exploration via expansive learning and cross-disciplinary collaboration among doma… ▽ More

    Submitted 21 March, 2021; originally announced March 2021.

    Comments: 15 pages, 5 figures; Supplementary Information: 25 pages, 12 Figures and 5 Tables

    Journal ref: Humanities and Social Sciences Communications, 8, 194 (2021)

  8. arXiv:2101.12434  [pdf, ps, other

    cs.CR

    Peeler: Profiling Kernel-Level Events to Detect Ransomware

    Authors: Muhammad Ejaz Ahmed, Hyoungshick Kim, Seyit Camtepe, Surya Nepal

    Abstract: Ransomware is a growing threat that typically operates by either encrypting a victim's files or locking a victim's computer until the victim pays a ransom. However, it is still challenging to detect such malware timely with existing traditional malware detection techniques. In this paper, we present a novel ransomware detection system, called "Peeler" (Profiling kErnEl -Level Events to detect Rans… ▽ More

    Submitted 29 January, 2021; originally announced January 2021.

    Comments: 15 pages, 10 figures

  9. arXiv:2010.03735  [pdf, other

    cs.CV

    Decamouflage: A Framework to Detect Image-Scaling Attacks on Convolutional Neural Networks

    Authors: Bedeuro Kim, Alsharif Abuadbba, Yansong Gao, Yifeng Zheng, Muhammad Ejaz Ahmed, Hyoungshick Kim, Surya Nepal

    Abstract: As an essential processing step in computer vision applications, image resizing or scaling, more specifically downsampling, has to be applied before feeding a normally large image into a convolutional neural network (CNN) model because CNN models typically take small fixed-size images as inputs. However, image scaling functions could be adversarially abused to perform a newly revealed attack calle… ▽ More

    Submitted 7 October, 2020; originally announced October 2020.

  10. arXiv:2006.00804  [pdf, other

    cs.SI cs.CL cs.IR

    COVID-19: Social Media Sentiment Analysis on Reopening

    Authors: Mohammed Emtiaz Ahmed, Md Rafiqul Islam Rabin, Farah Naz Chowdhury

    Abstract: The novel coronavirus (COVID-19) pandemic is the most talked topic in social media platforms in 2020. People are using social media such as Twitter to express their opinion and share information on a number of issues related to the COVID-19 in this stay at home order. In this paper, we investigate the sentiment and emotion of peoples in the United States on the subject of reopening. We choose the… ▽ More

    Submitted 1 June, 2020; originally announced June 2020.

    Comments: 8 pages, 4 figures, 1 table

  11. arXiv:1803.09193  [pdf, ps, other

    cs.IT

    Optimal Spectrum Sensing Policy with Traffic Classification in RF-Powered CRNs

    Authors: Hae Sol Lee, Muhammad Ejaz Ahmed, Dong In Kim

    Abstract: An orthogonal frequency division multiple access (OFDMA)-based primary user (PU) network is considered, which provides different spectral access/energy harvesting opportunities in RF-powered cognitive radio networks (CRNs). In this scenario, we propose an optimal spectrum sensing policy for opportunistic spectrum access/energy harvesting under both the PU collision and energy causality constraints… ▽ More

    Submitted 6 April, 2018; v1 submitted 24 March, 2018; originally announced March 2018.

    Comments: 14 pages, 12 figures