Aminollah Khormali
Cited by
Cited by
Control chart pattern recognition using RBF neural network with new training algorithm and practical features
A Addeh, A Khormali, NA Golilarz
ISA transactions 79, 202-216, 2018
Analyzing and detecting emerging internet of things malware: A graph-based approach
H Alasmary, A Khormali, A Anwar, J Park, J Choi, A Abusnaina, A Awad, ...
IEEE Internet of Things Journal 6 (5), 8977-8988, 2019
Adversarial learning attacks on graph-based IoT malware detection systems
A Abusnaina, A Khormali, H Alasmary, J Park, A Anwar, A Mohaisen
2019 IEEE 39th International Conference on Distributed Computing Systems …, 2019
Dine and dash: Static, dynamic, and economic analysis of in-browser cryptojacking
M Saad, A Khormali, A Mohaisen
2019 APWG Symposium on Electronic Crime Research (eCrime), 1-12, 2019
A novel approach for recognition of control chart patterns: Type-2 fuzzy clustering optimized support vector machine
A Khormali, J Addeh
ISA transactions 63, 256-264, 2016
Domain name system security and privacy: A contemporary survey
A Khormali, J Park, H Alasmary, A Anwar, M Saad, D Mohaisen
Computer Networks 185, 107699, 2021
Dfd: Adversarial learning-based approach to defend against website fingerprinting
A Abusnaina, R Jang, A Khormali, DH Nyang, D Mohaisen
IEEE INFOCOM 2020-IEEE Conference on Computer Communications, 2459-2468, 2020
Where are you taking me? Behavioral analysis of open DNS resolvers
J Park, A Khormali, M Mohaisen, A Mohaisen
2019 49th Annual IEEE/IFIP International Conference on Dependable Systems …, 2019
From Blue-Sky to Practical Adversarial Learning
A Khormali, A Abusnaina, S Chen, DH Nyang, D Mohaisen
2020 Second IEEE International Conference on Trust, Privacy and Security in …, 2020
Optimization of brushless direct current motor design using an intelligent technique
A Shabanian, AAP Tousiwas, M Pourmandi, A Khormali, A Ataei
ISA transactions 57, 311-321, 2015
DFDT: an end-to-end deepfake detection framework using vision transformer
A Khormali, JS Yuan
Applied Sciences 12 (6), 2953, 2022
Add: Attention-based deepfake detection approach
A Khormali, JS Yuan
Big Data and Cognitive Computing 5 (4), 49, 2021
Examining the robustness of learning-based ddos detection in software defined networks
A Abusnaina, A Khormali, DH Nyang, M Yuksel, A Mohaisen
2019 IEEE Conference on Dependable and Secure Computing (DSC), 1-8, 2019
Identification of an industrial gas turbine based on Rowen's model and using Multi-Objective Optimization method
A Khormali, I Yousefi, H Yahyaei, SM Aliyari
2015 3rd RSI International Conference on Robotics and Mechatronics (ICROM …, 2015
Transcreen: transfer learning on graph-based anti-cancer virtual screening model
M Salem, A Khormali, AK Arshadi, J Webb, JS Yuan
Big Data and Cognitive Computing 4 (3), 16, 2020
Understanding the hidden cost of software vulnerabilities: Measurements and predictions
A Anwar, A Khormali, DH Nyang, A Mohaisen
Security and Privacy in Communication Networks: 14th International …, 2018
Developing a robust defensive system against adversarial examples using generative adversarial networks
S Taheri, A Khormali, M Salem, JS Yuan
Big Data and Cognitive Computing 4 (2), 11, 2020
Gas turbine fault detection and identification by using fuzzy clustering methods
AO Khormali, MA Sh
2014 Second RSI/ISM International Conference on Robotics and Mechatronics …, 2014
Deep biological pathway informed pathology-genomic multimodal survival prediction
L Qiu, A Khormali, K Liu
arXiv preprint arXiv:2301.02383, 2023
Self-Supervised Graph Transformer for Deepfake Detection
A Khormali, JS Yuan
arXiv preprint arXiv:2307.15019, 2023
The system can't perform the operation now. Try again later.
Articles 1–20