


default search action
Aminollah Khormali
Person information
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j8]Aminollah Khormali
, Jiann-Shiun Yuan
:
Self-Supervised Graph Transformer for Deepfake Detection. IEEE Access 12: 58114-58127 (2024) - 2023
- [i8]Lin Qiu, Aminollah Khormali, Kai Liu:
Deep Biological Pathway Informed Pathology-Genomic Multimodal Survival Prediction. CoRR abs/2301.02383 (2023) - [i7]Aminollah Khormali, Jiann-Shiun Yuan:
Self-Supervised Graph Transformer for Deepfake Detection. CoRR abs/2307.15019 (2023) - 2021
- [j7]Aminollah Khormali, Jiann-Shiun Yuan
:
ADD: Attention-Based DeepFake Detection Approach. Big Data Cogn. Comput. 5(4): 49 (2021) - [j6]Aminollah Khormali, Jeman Park
, Hisham Alasmary
, Afsah Anwar, Muhammad Saad, David Mohaisen:
Domain name system security and privacy: A contemporary survey. Comput. Networks 185: 107699 (2021) - [j5]Aminollah Khormali, Jeman Park
, Hisham Alasmary
, Afsah Anwar, Muhammad Saad, David Mohaisen:
Corrigendum to "Domain name system security and privacy: A contemporary survey" Computer Networks Volume 185 (2020) 107699. Comput. Networks 188: 107814 (2021) - 2020
- [j4]Shayan Taheri
, Aminollah Khormali, Milad Salem
, Jiann-Shiun Yuan
:
Developing a Robust Defensive System against Adversarial Examples Using Generative Adversarial Networks. Big Data Cogn. Comput. 4(2): 11 (2020) - [j3]Milad Salem
, Aminollah Khormali, Arash Keshavarzi Arshadi, Julia Webb, Jiann-Shiun Yuan
:
TranScreen: Transfer Learning on Graph-Based Anti-Cancer Virtual Screening Model. Big Data Cogn. Comput. 4(3): 16 (2020) - [j2]Afsah Anwar, Aminollah Khormali, Jinchun Choi, Hisham Alasmary
, Saeed Salem, DaeHun Nyang, David Mohaisen:
Measuring the Cost of Software Vulnerabilities. EAI Endorsed Trans. Security Safety 7(23): e1 (2020) - [c9]Ahmed Abusnaina, Rhongho Jang
, Aminollah Khormali, DaeHun Nyang, David Mohaisen:
DFD: Adversarial Learning-based Approach to Defend Against Website Fingerprinting. INFOCOM 2020: 2459-2468 - [c8]Aminollah Khormali, Ahmed Abusnaina, Songqing Chen, DaeHun Nyang, David Mohaisen:
From Blue-Sky to Practical Adversarial Learning. TPS-ISA 2020: 118-127 - [i6]Aminollah Khormali, Jeman Park, Hisham Alasmary, Afsah Anwar, David Mohaisen:
Domain Name System Security and Privacy: A Contemporary Survey. CoRR abs/2006.15277 (2020) - [i5]Aminollah Khormali, DaeHun Nyang, David Mohaisen:
Generating Adversarial Examples with an Optimized Quality. CoRR abs/2007.00146 (2020)
2010 – 2019
- 2019
- [j1]Hisham Alasmary
, Aminollah Khormali, Afsah Anwar, Jeman Park
, Jinchun Choi, Ahmed Abusnaina
, Amro Awad
, DaeHun Nyang
, Aziz Mohaisen
:
Analyzing and Detecting Emerging Internet of Things Malware: A Graph-Based Approach. IEEE Internet Things J. 6(5): 8977-8988 (2019) - [c7]Ahmed Abusnaina, Aminollah Khormali, DaeHun Nyang, Murat Yuksel, Aziz Mohaisen:
Examining the Robustness of Learning-Based DDoS Detection in Software Defined Networks. DSC 2019: 1-8 - [c6]Jeman Park
, Aminollah Khormali, Manar Mohaisen, Aziz Mohaisen
:
Where Are You Taking Me? Behavioral Analysis of Open DNS Resolvers. DSN 2019: 493-504 - [c5]Muhammad Saad, Aminollah Khormali, Aziz Mohaisen
:
Dine and Dash: Static, Dynamic, and Economic Analysis of In-Browser Cryptojacking. eCrime 2019: 1-12 - [c4]Ahmed Abusnaina, Aminollah Khormali, Hisham Alasmary
, Jeman Park
, Afsah Anwar, Aziz Mohaisen:
Adversarial Learning Attacks on Graph-based IoT Malware Detection Systems. ICDCS 2019: 1296-1305 - [c3]Ahmed Abusnaina, Aminollah Khormali, Hisham Alasmary
, Jeman Park
, Afsah Anwar, Ulku Meteriz, Aziz Mohaisen:
Breaking graph-based IoT malware detection systems using adversarial examples: poster. WiSec 2019: 290-291 - [i4]Hisham Alasmary, Aminollah Khormali, Afsah Anwar, Jeman Park, Jinchun Choi, DaeHun Nyang, Aziz Mohaisen:
Analyzing, Comparing, and Detecting Emerging Malware: A Graph-based Approach. CoRR abs/1902.03955 (2019) - [i3]Ahmed Abusnaina, Aminollah Khormali, Hisham Alasmary, Jeman Park, Afsah Anwar, Ulku Meteriz, Aziz Mohaisen:
Examining Adversarial Learning against Graph-based IoT Malware Detection Systems. CoRR abs/1902.04416 (2019) - [i2]Aminollah Khormali, Ahmed Abusnaina, Songqing Chen, DaeHun Nyang, Aziz Mohaisen:
COPYCAT: Practical Adversarial Attacks on Visualization-Based Malware Detection. CoRR abs/1909.09735 (2019) - 2018
- [c2]Afsah Anwar, Aminollah Khormali, Aziz Mohaisen:
POSTER: Understanding the Hidden Cost of Software Vulnerabilities: Measurements and Predictions. AsiaCCS 2018: 793-795 - [c1]Afsah Anwar, Aminollah Khormali, DaeHun Nyang, Aziz Mohaisen:
Understanding the Hidden Cost of Software Vulnerabilities: Measurements and Predictions. SecureComm (1) 2018: 377-395 - [i1]Muhammad Saad, Aminollah Khormali, Aziz Mohaisen:
End-to-End Analysis of In-Browser Cryptojacking. CoRR abs/1809.02152 (2018)
Coauthor Index
aka: Aziz Mohaisen

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-04-03 00:21 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint