David Mohaisen
University of Central Florida
H-index: 47
North America-United States
Top articles of David Mohaisen
Title | Journal | Author(s) | Publication Date |
---|---|---|---|
Defending AirType Against Inference Attacks Using 3D In-Air Keyboard Layouts: Design and Evaluation | Information Security Applications: 24th International Conference, WISA 2023, Jeju Island, South Korea, August 23–25, 2023, Revised Selected Papers | Hattan Althebeiti Ran Gedawy Ahod Alghuried Daehun Nyang David Mohaisen | 2024/1/10 |
Blockchain Security and Privacy Examined: Threats, Challenges, Applications, and Tools | Ahod Alghuried Mohammed Alkinoon Manar Mohaisen An Wang Cliff C Zou | 2024 | |
Analyzing In-browser Cryptojacking | IEEE Transactions on Dependable and Secure Computing | Muhammad Saad David Mohaisen | 2024/3/18 |
Semantics-Preserving Node Injection Attacks Against GNN-based ACFG Malware Classifiers | Dylan Zapzalka Saeed Salem David Mohaisen | 2024 | |
Methods and systems for domain name data networking | 2023/11/21 | ||
Truthful and performance-optimal computation outsourcing for aerial surveillance platforms via learning-based auction | Computer Networks | Soyi Jung Jae-Hyun Kim David Mohaisen Joongheon Kim | 2023/4 |
Three Birds with One Stone: Efficient Partitioning Attacks on Interdependent Cryptocurrency Networks | Muhammad Saad David Mohaisen | 2023/6 | |
Poster: Mujaz: A Summarization-based Approach for Normalized Vulnerability Description | Hattan Althebeiti Brett Fazio William Chen David Mohaisen | 2023/11/15 | |
Untargeted Code Authorship Evasion with Seq2Seq Transformation | Soohyeon Choi Rhongho Jang DaeHun Nyang David Mohaisen | 2023/12/11 | |
A Robust Counting Sketch for Data Plane Intrusion Detection | Sian Kim Changhun Jung RhongHo Jang David Mohaisen Dae Hun Nyang | 2023 | |
Revisiting the Deep Learning-Based Eavesdropping Attacks via Facial Dynamics from VR Motion Sensors | Information and Communications Security: 25th International Conference, ICICS 2023, Tianjin, China, November 18–20, 2023, Proceedings | David Mohaisen | 2023/10/19 |
Access control for named domain networking | 2023/2/28 | ||
The Infrastructure Utilization of Free Contents Websites Reveal Their Security Characteristics | Mohamed Alqadhi David Mohaisen | 2023/12/11 | |
Understanding the Security and Performance of the Web Presence of Hospitals: A Measurement Study | Mohammed Alkinoon Abdulrahman Alabduljabbar Hattan Althebeiti Rhongho Jang DaeHun Nyang | 2023/4/26 | |
Understanding the Country-Level Security of Free Content Websites and their Hosting Infrastructure | Mohammed Alqadhi Ali Alkinoon Saeed Salem David Mohaisen | 2023/10/9 | |
Burning the adversarial bridges: Robust windows malware detection against binary-level mutations | arXiv preprint arXiv:2310.03285 | Ahmed Abusnaina Yizhen Wang Sunpreet Arora Ke Wang Mihai Christodorescu | 2023/10/5 |
Understanding the Utilization of Cryptocurrency in the Metaverse and Security Implications | Ayodeji Adeniran Mohammed Alkinoon David Mohaisen | 2023/12/11 | |
SHIELD: Thwarting Code Authorship Attribution | arXiv preprint arXiv:2304.13255 | Mohammed Abuhamad Changhun Jung David Mohaisen DaeHun Nyang | 2023/4/26 |
Understanding the Privacy Dimension of Wearables through Machine Learning-enabled Inferences | David Mohaisen | 2023/7/28 | |
Entangled Clouds: Measuring the Hosting Infrastructure of the Free Contents Web | Mohammed Alqadhi Mohammed Alkinoon Jie Lin Ahmed Abdalaal David Mohaisen | 2023/11/26 |