Ahmed, Muhammad Ejaz
2115  results:
Search for persons X
?
1

Malicious Package Detection using Metadata Information:

, In: Proceedings of the ACM on Web Conference 2024,
Halder, Sajal ; Bewong, Michael ; Mahboubi, Arash... - p. 1779-1789 , 2024
 
?
5

Transformer-Based Language Models for Software Vulnerabilit..:

, In: Annual Computer Security Applications Conference,
 
?
6

Backdoor Attack on Machine Learning Based Android Malware D..:

Li, Chaoran ; Chen, Xiao ; Wang, Derui...
IEEE Transactions on Dependable and Secure Computing.  19 (2022)  5 - p. 3357-3370 , 2022
 
?
7

VulDeBERT: A Vulnerability Detection System Using BERT:

, In: 2022 IEEE International Symposium on Software Reliability Engineering Workshops (ISSREW),
Kim, Soolin ; Choi, Jusop ; Ahmed, Muhammad Ejaz.. - p. 69-74 , 2022
 
?
8

Cross-language Android permission specification:

, In: Proceedings of the 30th ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering,
Li, Chaoran ; Chen, Xiao ; Sun, Ruoxi... - p. 772-783 , 2022
 
?
9

Peeler: Profiling Kernel-Level Events to Detect Ransomware:

, In: Computer Security – ESORICS 2021; Lecture Notes in Computer Science,
 
?
12

Traffic-Aware Optimal Spectrum Sensing Policy in Wireless-P..:

, In: Proceedings of the 12th International Conference on Ubiquitous Information Management and Communication,
 
?
13

Traffic-Aware Optimal Spectral Access in Wireless Powered C..:

Ahmed, Muhammad Ejaz ; Kim, Dong In ; Choi, Kae Won
IEEE Transactions on Mobile Computing.  17 (2018)  3 - p. 733-745 , 2018
 
?
14

Poster : Adversarial Examples for Classifiers in High-Di..:

, In: Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security,
Ahmed, Muhammad Ejaz ; Kim, Hyoungshick - p. 2467-2469 , 2017
 
1-15