Control chart pattern recognition using RBF neural network with new training algorithm and practical features A Addeh, A Khormali, NA Golilarz ISA transactions 79, 202-216, 2018 | 134 | 2018 |
Analyzing and detecting emerging internet of things malware: A graph-based approach H Alasmary, A Khormali, A Anwar, J Park, J Choi, A Abusnaina, A Awad, ... IEEE Internet of Things Journal 6 (5), 8977-8988, 2019 | 124 | 2019 |
Adversarial learning attacks on graph-based IoT malware detection systems A Abusnaina, A Khormali, H Alasmary, J Park, A Anwar, A Mohaisen 2019 IEEE 39th International Conference on Distributed Computing Systems …, 2019 | 92* | 2019 |
Dine and dash: Static, dynamic, and economic analysis of in-browser cryptojacking M Saad, A Khormali, A Mohaisen 2019 APWG Symposium on Electronic Crime Research (eCrime), 1-12, 2019 | 74* | 2019 |
A novel approach for recognition of control chart patterns: Type-2 fuzzy clustering optimized support vector machine A Khormali, J Addeh ISA transactions 63, 256-264, 2016 | 64 | 2016 |
Domain name system security and privacy: A contemporary survey A Khormali, J Park, H Alasmary, A Anwar, M Saad, D Mohaisen Computer Networks 185, 107699, 2021 | 39 | 2021 |
Dfd: Adversarial learning-based approach to defend against website fingerprinting A Abusnaina, R Jang, A Khormali, DH Nyang, D Mohaisen IEEE INFOCOM 2020-IEEE Conference on Computer Communications, 2459-2468, 2020 | 35 | 2020 |
Where are you taking me? Behavioral analysis of open DNS resolvers J Park, A Khormali, M Mohaisen, A Mohaisen 2019 49th Annual IEEE/IFIP International Conference on Dependable Systems …, 2019 | 34 | 2019 |
From Blue-Sky to Practical Adversarial Learning A Khormali, A Abusnaina, S Chen, DH Nyang, D Mohaisen 2020 Second IEEE International Conference on Trust, Privacy and Security in …, 2020 | 30* | 2020 |
Optimization of brushless direct current motor design using an intelligent technique A Shabanian, AAP Tousiwas, M Pourmandi, A Khormali, A Ataei ISA transactions 57, 311-321, 2015 | 29 | 2015 |
DFDT: an end-to-end deepfake detection framework using vision transformer A Khormali, JS Yuan Applied Sciences 12 (6), 2953, 2022 | 21 | 2022 |
Add: Attention-based deepfake detection approach A Khormali, JS Yuan Big Data and Cognitive Computing 5 (4), 49, 2021 | 17 | 2021 |
Examining the robustness of learning-based ddos detection in software defined networks A Abusnaina, A Khormali, DH Nyang, M Yuksel, A Mohaisen 2019 IEEE Conference on Dependable and Secure Computing (DSC), 1-8, 2019 | 16 | 2019 |
Identification of an industrial gas turbine based on Rowen's model and using Multi-Objective Optimization method A Khormali, I Yousefi, H Yahyaei, SM Aliyari 2015 3rd RSI International Conference on Robotics and Mechatronics (ICROM …, 2015 | 10 | 2015 |
Transcreen: transfer learning on graph-based anti-cancer virtual screening model M Salem, A Khormali, AK Arshadi, J Webb, JS Yuan Big Data and Cognitive Computing 4 (3), 16, 2020 | 8 | 2020 |
Understanding the hidden cost of software vulnerabilities: Measurements and predictions A Anwar, A Khormali, DH Nyang, A Mohaisen Security and Privacy in Communication Networks: 14th International …, 2018 | 8* | 2018 |
Developing a robust defensive system against adversarial examples using generative adversarial networks S Taheri, A Khormali, M Salem, JS Yuan Big Data and Cognitive Computing 4 (2), 11, 2020 | 7 | 2020 |
Gas turbine fault detection and identification by using fuzzy clustering methods AO Khormali, MA Sh 2014 Second RSI/ISM International Conference on Robotics and Mechatronics …, 2014 | 7 | 2014 |
Deep biological pathway informed pathology-genomic multimodal survival prediction L Qiu, A Khormali, K Liu arXiv preprint arXiv:2301.02383, 2023 | 4 | 2023 |
Self-Supervised Graph Transformer for Deepfake Detection A Khormali, JS Yuan arXiv preprint arXiv:2307.15019, 2023 | 1 | 2023 |