Publications

Preprints

  1. Blockchain Security and Privacy Examined: Threats, Challenges, Applications, and Tools
    A. Alghuried, M. Alkinoon, M. Mohaisen, A. Wang, C. Zou, and D. Mohaisen
    DRAFT, 2024.

  2. Semantics-Preserving Node Injection Attacks Against GNN-based ACFG Malware Classifiers
    D. Zapzalka, S. Salem, and D. Mohaisen
    DRAFT, 2024.
    under review, major revision @ IEEE TDSC

  3. Analyzing In-browser Cryptojacking
    M. Saad, D. Mohaisen
    CoRR, 2023.
    Local, 2024.

  4. SHIELD: Thwarting Code Authorship Attribution
    M. Abuhamad, C. Jung, D. Mohaisen, D. Nyang
    CoRR, 2023.

  5. Measuring and Modeling the Free Content Web
    A. Alabduljabbar, R. Ma, A. Abusnaina, R. Jang, S. Chen, D. Nyang, M. Mohaisen
    CoRR, 2023.

Journal and Conference Papers

  1. Analyzing In-browser Cryptojacking
    M. Saad, D. Mohaisen
    [IEEE TDSC], 2024 (to appear).

  2. Exploration of Bitflip’s Effect on DNN Accuracy in Plaintext and Ciphertext
    K. Thomas, M. Santriaji, D. Mohaisen and Y. Solihin
    IEEE Micro Magazine, 2023.

  3. Self-Configurable Stabilized Real-Time Detection Learning for Autonomous Driving Applications
    W. Yun, S. Park, J. Kim, D. Mohaisen
    IEEE Trans. Intell. Transp. Syst., 2023.

  4. Improving the Social Connectivity in Engineering Educational Networks and Implications
    M. Mohaisen, D. Mohaisen
    IEEE Trans. Educ., 2023.

  5. Learning Location from Shared Elevation Profiles in Fitness Apps: A Privacy Perspective
    U. Meteriz-Yildiran, N. Yildiran, J. Kim, D. Mohaisen
    IEEE Trans. Mob. Comput., 2023.

  6. Truthful and performance-optimal computation outsourcing for aerial surveillance platforms via learning-based auction
    S. Jung, J.-H. Kim, D. Mohaisen, J. Kim
    Comput. Networks, 2023.

  7. Three Birds with One Stone: Efficient Partitioning Attacks on Interdependent Cryptocurrency Networks
    M. Saad and D. Mohaisen
    IEEE S&P, 2023.

  8. A Robust Counting Sketch for Data Plane Intrusion Detection
    S. Kim, C. Jung, R. Jang, D. Mohaisen, D. Nyang
    ISOC NDSS, San Diego, California, USA, 2023.

  9. Understanding the Security and Performance of the Web Presence of Hospitals: A Measurement Study
    M. Alkinoon, A. Alabduljabbar, H. Althebeiti, R. Jang, D. Nyang, D. Mohaisen
    IEEE ICCCN, Honolulu, HI, USA, 2023.

  10. Understanding the Privacy Dimension of Wearables through Machine Learning-enabled Inferences
    D. Mohaisen
    ACM SNTA (Keynote), Orlando, 2023

  11. Robust Natural Language Processing: Recent Advances, Challenges, and Future Directions
    M. O., S. Choi, D. Nyang, D. Mohaisen
    CoRR, 2022.

  12. FAT-PIM: Low-Cost Error Detection for Processing-In-Memory
    K. Zubair, S. Jha, D. Mohaisen, C. Hughes, A. Awad
    CoRR, 2022.

  13. Cooperative Multi-Agent Deep Reinforcement Learning for Reliable Surveillance via Autonomous Multi-UAV Control
    W. Yun, S. Park, J. Kim, M. Shin, S. Jung, D. Mohaisen, J.-H. Kim
    CoRR, 2022.

  14. RouteChain: Towards Blockchain-based secure and efficient BGP routing
    M. Saad, A. Anwar, A. Ahmad, H. Alasmary, M. Yuksel, D. Mohaisen
    Comput. Networks, 2022.

  15. WBC image classification and generative models based on convolutional neural network
    C. Jung, M. Abuhamad, D. Mohaisen, K. Han, D. Nyang
    BMC Medical Imaging, 2022.

  16. Understanding Internet of Things malware by analyzing endpoints in their static artifacts
    J. Choi, A. Anwar, A. Alabduljabbar, H. Alasmary, J. Spaulding, A. Wang, S. Chen, D. Nyang, A. Awad, D. Mohaisen
    Comput. Networks, 2022.

  17. ShellCore: Automating Malicious IoT Software Detection Using Shell Commands Representation
    H. Alasmary, A. Anwar, A. Abusnaina, A. Alabduljabbar, M. Abuhamad, A. Wang, D. Nyang, A. Awad, D. Mohaisen
    IEEE Internet Things J., 2022.

  18. Phoenix: Towards Ultra-Low Overhead, Recoverable, and Persistently Secure NVM
    M. Al-Wadi, K. Zubair, D. Mohaisen, A. Awad
    IEEE Trans. Dependable Secur. Comput., 2022.

  19. Investigating the Effect of Traffic Sampling on Machine Learning-Based Network Intrusion Detection Approaches
    K. Alikhanov, R. Jang, M. Abuhamad, D. Mohaisen, D. Nyang, Y. Noh
    IEEE Access, 2022.

  20. GraphShield: Dynamic Large Graphs for Secure Queries With Forward Privacy
    M. Du, S. Wu, Q. Wang, D. Chen, P. Jiang, D. Mohaisen
    IEEE Trans. Knowl. Data Eng., 2022.

  21. Exploring Partitioning Attacks on the Bitcoin Network
    M. Saad, V. Cook, L. Nguyen, M. Thai, D. Mohaisen
    IEEE/ACM Trans. Netw., 2022.

  22. DL-FHMC: Deep Learning-Based Fine-Grained Hierarchical Learning Approach for Robust Malware Classification
    A. Abusnaina, M. Abuhamad, H. Alasmary, A. Anwar, R. Jang, S. Salem, D. Nyang, D. Mohaisen
    IEEE Trans. Dependable Secur. Comput., 2022.

  23. Cooperative Multiagent Deep Reinforcement Learning for Reliable Surveillance via Autonomous Multi-UAV Control
    W. Yun, S. Park, J. Kim, M. Shin, S. Jung, D. Mohaisen, J.-H. Kim
    IEEE Trans. Ind. Informatics, 2022.

  24. Cleaning the NVD: Comprehensive Quality Assessment, Improvements*, and Analyses
    A. Anwar, A. Abusnaina, S. Chen, F. Li, D. Mohaisen
    IEEE Trans. Dependable Secur. Comput., 2022
    DSN (extended abstract), Taipei, Taiwan, Supplemental Volume, 2021

  25. BlockTrail: A Service for Secure and Transparent Blockchain-Driven Audit Trails
    A. Ahmad, M. Saad, M. AlGhamdi, D. Nyang, D. Mohaisen
    IEEE Syst. J., 2022.

  26. A One-Page Text Entry Method Optimized for Rectangle Smartwatches
    R. Jang, C. Jung, D. Mohaisen, K. Lee, D. Nyang
    IEEE Trans. Mob. Comput., 2022.

  27. A Large-Scale Behavioral Analysis of the Open DNS Resolvers on the Internet
    J. Park, R. Jang, M. Mohaisen, D. Mohaisen
    IEEE/ACM Trans. Netw., 2022.

  28. A Keylogging Inference Attack on Air-Tapping Keyboards in Virtual Environments
    U. Meteriz-Yildiran, N. Yildiran, A. Awad, D. Mohaisen
    IEEE VR, Christchurch, New Zealand, 2022.
    🏅 Best Paper Candidate

  29. Understanding the Security of Free Content Websites by Analyzing their SSL Certificates: A Comparative Study
    A. Alabduljabbar, R. Ma, S. Choi, R. Jang, S. Chen, D. Mohaisen
    ACM CySSS@AsiaCCS, Nagasaki, 2022.

  30. Systematically Evaluating the Robustness of ML-based IoT Malware Detection Systems
    A. Abusnaina, A. Anwar, S. Alshamrani, A. Alabduljabbar, R. Jang, D. Nyang, D. Mohaisen
    RAID, Limassol, Cyprus, 2022.

  31. Quantifying the Performance of Adversarial Training on Language Models with Distribution Shifts
    M. O., S. Choi, D. Nyang, D. Mohaisen
    ACM CySSS@AsiaCCS, Nagasaki, Japan, 2022.

  32. Minimizing Noise in HyperLogLog-Based Spread Estimation of Multiple Flows
    D. Dao, R. Jang, C. Jung, D. Mohaisen, D. Nyang
    IEEE DSN, Baltimore, MD, USA, 2022.

  33. Minerva: Rethinking Secure Architectures for the Era of Fabric-Attached Memory Architectures
    M. Al-Wadi, R. Wang, D. Mohaisen, C. Hughes, S. Hammond, A. Awad
    IEEE IPDPS, Virtual Event / Lyon, France, 2022.

  34. Miners in the Cloud: Measuring and Analyzing Cryptocurrency Mining in Public Clouds
    A. Adeniran, D. Mohaisen
    CSoNet, Virtual Event, 2022.

  35. Measuring the Privacy Dimension of Free Content Websites through Automated Privacy Policy Analysis and Annotation
    A. Alabduljabbar, D. Mohaisen
    SocialNLP@WWW, Virtual Event / Lyon, France, 2022.

  36. Making Adversarially-Trained Language Models Forget with Model Retraining: A Case Study on Hate Speech Detection
    M. O., D. Mohaisen
    SocialNLP@WWW, Virtual Event / Lyon, France, 2022.

  37. Hierarchical Reinforcement Learning using Gaussian Random Trajectory Generation in Autonomous Furniture Assembly
    W. Yun, D. Mohaisen, S. Jung, J.-K. Kim, J. Kim
    ACM CIKM, Atlanta, GA, USA, 2022.

  38. Filesystem Encryption or Direct-Access for NVM Filesystems? Let’s Have Both!
    K. Zubair, D. Mohaisen, A. Awad,
    IEEE HPCA, Seoul, South Korea, 2022.

  39. Enriching Vulnerability Reports Through Automated and Augmented Description Summarization
    H. Althebeiti, D. Mohaisen
    WISA, 2022.

  40. Do Content Management Systems Impact the Security of Free Content Websites?
    M. Alqadhi, A. Alabduljabbar, K. Thomas, S. Salem, D. Nyang, D. Mohaisen
    CSoNet, Virtual Event, 2022.

  41. AutoDefense: Reinforcement Learning Based Autoreactive Defense Against Network Attacks
    Y. Mi, D. Mohaisen, A. Wang
    IEEE CNS, Austin, TX, USA, 2022.

  42. AiRType: An Air-tapping Keyboard for Augmented Reality Environments
    N. Yildiran, U. Meteriz-Yildiran, D. Mohaisen
    IEEE VR, Christchurch, New Zealand, 2022.

  43. AcousticType: Smartwatch-Enabled Cross-Device Text Entry Method Using Keyboard Acoustics
    U. Meteriz-Yidiran, N. Yildiran, D. Mohaisen
    ACM CHI, New Orleans, LA, USA, Extended Abstracts, 2022.

  44. A Scalable and Dynamic ACL System for In-Network Defense
    C. Jung, S. Kim, R. Jang, D. Mohaisen, D. Nyang
    ACM CCS, Los Angeles, CA, USA, 2022.

  45. Towards Semantically-Rich Spatial Network Representation Learning via Automated Feature Topic Pairing
    D. Wang, K. Liu, D. Mohaisen, P. Wang, C.-T. Lu, Y. Fu
    Frontiers Big Data, 2021.

  46. Towards Low-Cost Mechanisms to Enable Restoration of Encrypted Non-Volatile Memories
    M. Ye, K. Zubair, D. Mohaisen, A. Awad
    IEEE Trans. Dependable Secur. Comput., 2021.

  47. TLDR: Deep Learning-Based Automated Privacy Policy Annotation with Key Policy Highlights
    A. Alabduljabbar, A. Abusnaina, U. Meteriz-Yildiran, D. Mohaisen
    ACM WPES, Virtual Event, Korea, 2021.

  48. Systemically Evaluating the Robustness of ML-based IoT Malware Detectors
    A. Abusnaina, A. Anwar, S. Alshamrani, A. Alabduljabbar, R. Jang, D. Nyang, D. Mohaisen
    IEEE DSN, Taipei, Taiwan, Supplemental Volume, 2021
    🏅 Best Paper Award (Extended Abstract)

  49. SyncAttack: Double-spending in Bitcoin Without Mining Power
    M. Saad, S. Chen, D. Mohaisen
    ACM CCS, Virtual Event, Republic of Korea, 2021

  50. Sensor-Based Continuous Authentication of Smartphones’ Users Using Behavioral Biometrics
    M. Abuhamad, A. Abusnaina, D. Nyang, D. Mohaisen
    IEEE Internet Things J., 2021.

  51. Security Breaches in the Healthcare Domain: A Spatiotemporal Analysis
    M. Alkinoon, M. O., M. Mohaisen, D. Mohaisen
    CSoNet, Virtual Event, 2021.

  52. SSD-Assisted Ransomware Detection and Data Recovery Techniques
    S. Baek, Y. Jung, D. Mohaisen, S. Lee, D. Nyang
    IEEE Trans. Computers, 2021.

  53. SIA: Smartwatch-Enabled Inference Attacks on Physical Keyboards Using Acoustic Signals
    U. Meteriz-Yildiran, N. Yildiran, D. Mohaisen
    ACM WPES, Virtual Event, Korea, 2021.

  54. Root Cause Analyses for the Deteriorating Bitcoin Network Synchronization
    M. Saad, S. Chen, D. Mohaisen
    IEEE ICDCS, Washington DC, USA, 2021.

  55. Revisiting Nakamoto Consensus in Asynchronous Networks
    M. Saad, A. Anwar, S. Ravi, D. Mohaisen
    ACM CCS, Virtual Event, Republic of Korea, 2021.

  56. ProMT: optimizing integrity tree updates for write-intensive pages in secure NVMs.
    M. Al-Wadi, D. Mohaisen, A. Awad
    ACM ICS, Virtual Event, USA, 2021.
    🏅 Best Paper Award Nominee

  57. Performance Evaluation of Consensus Protocols in Blockchain-based Audit Systems
    A. Ahmad, M. Saad, J. Kim, D. Nyang, D. Mohaisen
    ICOIN, Jeju Island, South Korea, 2021.

  58. Measuring Healthcare Data Breaches
    M. Alkinoon, Sung Choi, D. Mohaisen
    WISA, Jeju Island, South Korea, Revised Selected Papers, 2021.

  59. ML-based IoT Malware Detection Under Adversarial Settings: A Systematic Evaluation
    A. Abusnaina, A. Anwar, S. Alshamrani, A. Alabduljabbar, R. Jang, D. Nyang, D. Mohaisen
    CoRR, 2021.

  60. Large-scale and Robust Code Authorship Identification with Deep Feature Learning
    M. Abuhamad, T. AbuHmed, D. Mohaisen, D. Nyang
    ACM Trans. Priv. Secur., 2021.

  61. Hate, Obscenity, and Insults: Measuring the Exposure of Children to Inappropriate Comments in YouTube
    S. Alshamrani, A. Abusnaina, M. Abuhamad, D. Nyang, D. Mohaisen
    CoRR, 2021.

  62. Empirically comparing the performance of blockchain’s consensus algorithms
    A. Ahmad, A. Alabduljabbar, M. Saad, D. Nyang, J. Kim, D. Mohaisen
    IET Blockchain, 2021.

  63. Domain name system security and privacy: A contemporary survey
    A. Khormali, J. Park, H. Alasmary, A. Anwar, M. Saad, D. Mohaisen
    Comput. Networks, 2021.

  64. Count-Less: A Counting Sketch for the Data Plane of High Speed Switches
    Sunyoung Kim, C. Jung, R. Jang, D. Mohaisen, D. Nyang
    CoRR, 2021.

  65. Contra-: Mechanisms for countering spam attacks on blockchain’s memory pools*
    M. Saad, J. Kim, D. Nyang, D. Mohaisen,
    J. Netw. Comput. Appl., 2021.

  66. Bitcoin Price Forecasting via Ensemble-based LSTM Deep Learning Networks
    Myungjae Shin, D. Mohaisen, J. Kim
    ICOIN, Jeju Island, South Korea, 2021.

  67. Automated Privacy Policy Annotation with Information Highlighting Made Practical Using Deep Representations
    A. Alabduljabbar, A. Abusnaina, U. Meteriz-Yildiran, D. Mohaisen
    ACM CCS, Virtual Event, Republic of Korea, 2021.

  68. Adversarial Example Detection Using Latent Neighborhood Graph
    A. Abusnaina, Y. Wu, S. Arora, Y. Wang, Fei Wang, H. Yang, D. Mohaisen
    IEEE ICCV, Montreal, QC, Canada, 2021.

  69. A network-independent tool-based usable authentication system for Internet of Things devices
    C. Jung, J. Choi, R. Jang, D. Mohaisen, D. Nyang
    Comput. Secur., 2021.

  70. Understanding the Proxy Ecosystem: A Comparative Analysis of Residential and Open Proxies on the Internet
    J. Choi, M. Abuhamad, A. Abusnaina, A. Anwar, S. Alshamrani, J. Park, D. Nyang, D. Mohaisen,
    IEEE Access, 2020.

  71. “Understanding the Potential Risks of Sharing Elevation Information on Fitness Applications.”
    U. Meteriz, Necip Yildiran, J. Kim, D. Mohaisen
    IEEE ICDCS, Singapore, 2020.

  72. Toward Characterizing Blockchain-Based Cryptocurrencies for Highly Accurate Predictions
    M. Saad, J. Choi, D. Nyang, J. Kim, D. Mohaisen
    IEEE Syst. J., 2020
    🏅 Best Paper Award
    Also in IEEE INFOCOM Workshops, Honolulu, HI, USA, 2018

  73. “Statically Dissecting Internet of Things Malware: Analysis, Characterization, and Detection.”
    A. Anwar, H. Alasmary, J. Park, A. Wang, S. Chen, D. Mohaisen
    ICICS, Copenhagen, Denmark, 2020.

  74. Soteria: Detecting Adversarial Examples in Control Flow Graph-based Malware Classifiers
    H. Alasmary, A. Abusnaina, R. Jang, M. Abuhamad, A. Anwar, D. Nyang, D. Mohaisen,
    IEEE ICDCS, Singapore, 2020.

  75. SketchFlow: Per-Flow Systematic Sampling Using Sketch Saturation Event
    R. Jang, D. Min, S. Moon, D. Mohaisen, D. Nyang
    IEEE INFOCOM, Toronto, ON, Canada, 2020.

  76. Self-adaptive power control with deep reinforcement learning for millimeter-wave Internet-of-vehicles video caching
    D. Kwon, J. Kim, D. Mohaisen, W. Lee
    J. Commun. Networks, 2020.

  77. Reinforced Edge Selection using Deep Learning for Robust Surveillance in Unmanned Aerial Vehicles
    S. Park, J. Park, D. Mohaisen, J. Kim
    CoRR, 2020.

  78. Multi-(chi): Identifying Multiple Authors from Source Code Files
    M. Abuhamad, T. AbuHmed, D. Nyang, D. Mohaisen
    Proc. Priv. Enhancing Technol., 2020.

  79. Measuring the Cost of Software Vulnerabilities
    A. Anwar, A. Khormali, J. Choi, H. Alasmary, S. Salem, D. Nyang, D. Mohaisen
    EAI Endorsed Trans. Security Safety, 2020
    Also in EAI SecureComm (full paper), Singapore, 2018
    Also in ACM AsiaCCS (poster), Incheon, Republic of Korea, 2018

  80. Look-Aside at Your Own Risk: Privacy Implications of DNSSEC Look-Aside Validation
    D. Mohaisen, Z. Gu, K. Ren, Z. Li, C. Kamhoua, L. Njilla, D. Nyang
    IEEE Trans. Dependable Secur. Comput., 2020.

  81. Investigating Online Toxicity in Users Interactions with the Mainstream Media Channels on YouTube
    S. Alshamrani, M. Abuhamad, A. Abusnaina, D. Mohaisen
    SocialNLP@CIKM, Galway, Ireland, 2020.

  82. Insights into Attacks’ Progression: Prediction of Spatio-Temporal Behavior of DDoS Attacks
    A. Abusnaina, M. Abuhamad, D. Nyang, S. Chen, A. Wang, D. Mohaisen
    WISA, Jeju Island, South Korea, Revised Selected Papers, 2020.

  83. Hiding in Plain Sight: A Measurement and Analysis of Kids’ Exposure to Malicious URLs on YouTube
    S. Alshamrani, A. Abusnaina, D. Mohaisen
    CoRR, 2020.

  84. Generating Adversarial Examples with an Optimized Quality
    A. Khormali, D. Nyang, D. Mohaisen
    CoRR, 2020.

  85. From Blue-Sky to Practical Adversarial Learning
    A. Khormali, A. Abusnaina, S. Chen, D. Nyang, D. Mohaisen
    IEEE TPS-ISA, Atlanta, GA, USA, 2020.

  86. Exploring the Attack Surface of Blockchain: A Comprehensive Survey
    M. Saad, J. Spaulding, L. Njilla, C. Kamhoua, S. Shetty, D. Nyang, D. Mohaisen
    IEEE Commun. Surv. Tutorials, 2020.

  87. DFD: Adversarial Learning-based Approach to Defend Against Website Fingerprinting
    A. Abusnaina, R. Jang, A. Khormali, D. Nyang, D. Mohaisen
    IEEE INFOCOM, Toronto, ON, Canada, 2020.

  88. Contra-: Mechanisms for Countering Spam Attacks on Blockchain Memory Pools*
    M. Saad, J. Kim, D. Nyang, D. Mohaisen
    CoRR, 2020.

  89. Catch Me If You Can: Rogue Access Point Detection Using Intentional Channel Interference
    R. Jang, J. Kang, D. Mohaisen, D. Nyang
    IEEE Trans. Mob. Comput., 2020.

  90. Assessing the effectiveness of pulsing denial of service attacks under realistic network synchronization assumptions
    J. Park, M. Mohaisen, D. Nyang, D. Mohaisen
    Comput. Networks, 2020.

  91. An Analysis of Users Engagement on Twitter During the COVID-19 Pandemic: Topical Trends and Sentiments
    S. Alshamrani, A. Abusnaina, M. Abuhamad, A. Lee, D. Nyang, D. Mohaisen
    CSoNet, Dallas, TX, USA, 2020.

  92. AUToSen: Deep-Learning-Based Implicit Continuous Authentication Using Smartphone Sensors
    M. Abuhamad, T. AbuHmed, D. Mohaisen, D. Nyang
    IEEE Internet Things J., 2020.

  93. A Data-Driven Study of DDoS Attacks and Their Dynamics
    A. Wang, W. Chang, S. Chen, D. Mohaisen
    IEEE Trans. Dependable Secur. Comput., 2020.

  94. XLF: A Cross-layer Framework to Secure the Internet of Things (IoT)
    A. Wang, D. Mohaisen, S. Chen
    IEEE ICDCS, Dallas, TX, USA, 2019.

  95. Where Are You Taking Me? Behavioral Analysis of Open DNS Resolvers
    J. Park, A. Khormali, M. Mohaisen, D. Mohaisen
    IEEE DSN, Portland, OR, USA, 2019
    Also ACM CoNEXT (poster), Orlando, FL, USA, 2019.

  96. Two-Stage IoT Device Scheduling With Dynamic Programming for Energy Internet Systems
    Laihyuk Park, Chunghyun Lee, J. Kim, D. Mohaisen, Sungrae Cho
    IEEE Internet Things J., 2019.

  97. Transparency in the New gTLD Era: Evaluating the DNS Centralized Zone Data Service
    J. Park, J. Choi, D. Nyang, D. Mohaisen
    IEEE Trans. Netw. Serv. Manag., 2019.

  98. Thriving on chaos: Proactive detection of command and control domains in internet of things-scale botnets using DRIFT
    J. Spaulding, J. Park, J. Kim, D. Nyang, D. Mohaisen
    Trans. Emerg. Telecommun. Technol., 2019.

  99. Subgraph-Based Adversarial Examples Against Graph-Based IoT Malware Detection Systems
    A. Abusnaina, H. Alasmary, M. Abuhamad, S. Salem, D. Nyang, D. Mohaisen
    CSoNet, Ho Chi Minh City, Vietnam, 2019.

  100. Secure and transparent audit logs with emphBlockAudit
    A. Ahmad, M. Saad, D. Mohaisen
    J. Netw. Comput. Appl., 2019.

  101. Scaling Up Anomaly Detection Using In-DRAM Working Set of Active Flows Table
    R. Jang, S. Moon, Y. Noh, D. Mohaisen, D. Nyang
    CoRR, 2019.

  102. RouteChain: Towards Blockchain-based Secure and Efficient BGP Routing
    M. Saad, A. Anwar, A. Ahmad, H. Alasmary, M. Yuksel, D. Mohaisen
    IEEE ICBC, Seoul, Korea (South), 2019.

  103. Privacy-Preserving Deep Learning Computation for Geo-Distributed Medical Big-Data Platforms
    J. Jeon, J. Kim, J. Kim, K. Kim, D. Mohaisen, J.-K. Kim
    IEEE DSN, Portland, OR, USA, Supplemental Volume, 2019.

  104. Pricing Data Tampering in Automated Fare Collection with NFC-Equipped Smartphones
    F. Dang, E. Zhai, Z. Li, P. Zhou, D. Mohaisen, K. Bian, Q. Wen, M. Li
    IEEE Trans. Mob. Comput., 2019
    Also in IEEE INFOCOM, Atlanta, GA, USA, 2017

  105. Partitioning Attacks on Bitcoin: Colliding Space, Time, and Logic
    M. Saad, V. Cook, Lan Nguyen, M. Thai, D. Mohaisen
    IEEE ICDCS, Dallas, TX, USA, 2019.

  106. Mempool optimization for Defending Against DDoS Attacks in PoW-based Blockchain Systems
    M. Saad, L. Njilla, C. Kamhoua, J. Kim, D. Nyang, D. Mohaisen
    IEEE ICBC, Seoul, Korea (South), 2019.

  107. IoT malware ecosystem in the wild: a glimpse into analysis and exposures
    J. Choi, A. Anwar, H. Alasmary, J. Spaulding, D. Nyang, D. Mohaisen
    ACM/IEEE SEC, Arlington, Virginia, USA, 2019.

  108. InstaMeasure: Instant Per-flow Detection Using Large In-DRAM Working Set of Active Flows
    R. Jang, S. Moon, Y. Noh, D. Mohaisen, D. Nyang
    IEEE ICDCS, Dallas, TX, USA, 2019.

  109. Honor among Thieves: Towards Understanding the Dynamics and Interdependencies in IoT Botnets
    J. Choi, A. Abusnaina, A. Anwar, A. Wang, S. Chen, D. Nyang, D. Mohaisen
    IEEE DSC, Hangzhou, China, 2019.

  110. Fighting Fake News Propagation with Blockchains
    M. Saad, A. Ahmad, D. Mohaisen
    IEEE CNS, Washington, DC, USA, 2019.

  111. A. Abusnaina, A. Khormali, D. Nyang, M. Yuksel, D. Mohaisen
    Examining the Robustness of Learning-Based DDoS Detection in Software Defined Networks
    IEEE DSC, Hangzhou, China, 2019
    🏅 Best Ppaper – Runner Up
    Also in ACM CoNEXT (poster), Orlando, FL, USA, 2019

  112. Dine and Dash: Static, Dynamic, and Economic Analysis of In-Browser Cryptojacking
    M. Saad, A. Khormali, D. Mohaisen
    eCrime, Pittsburgh, PA, USA, 2019.

  113. Detecting and Classifying Android Malware using Static Analysis along with Creator Information
    H.-J. Kang, J.-w. Jang, D. Mohaisen, H. Kim,
    CoRR, 2019.

  114. Cyber Deception in the Internet of Battlefield Things: Techniques, Instances, and Assessments
    J. Park, D. Mohaisen, C. Kamhoua, Michael Weisman, Nandi Leslie, L. Njilla
    WISA, Jeju Island, South Korea, Revised Selected Papers, 2019.

  115. Countering Selfish Mining in Blockchains
    M. Saad, L. Njilla, C. Kamhoua, D. Mohaisen
    IEEE ICNC, Honolulu, HI, USA, 2019.

  116. Computer Systems Have 99 Problems, Let’s Not Make Machine Learning Another One
    D. Mohaisen, S. Chen
    IEEE ISA, 2019.

  117. COPYCAT: Practical Adversarial Attacks on Visualization-Based Malware Detection
    A. Khormali, A. Abusnaina, S. Chen, D. Nyang, Aziz Mohaisen
    CoRR, 2019.

  118. “Poster: Breaking graph-based IoT malware detection systems using adversarial examples.”
    A. Abusnaina, A. Khormali, H. Alasmary, J. Park, A. Anwar, U. Meteriz, D. Mohaisen
    ACM WiSec, Miami, Florida, USA, 2019.

  119. “BlockTrail: A Scalable Multichain Solution for Blockchain-Based Audit Trails.”
    A. Ahmad, M. Saad, L. Njilla, C. Kamhoua, M. Bassiouni, D. Mohaisen
    IEEE ICC, Shanghai, China, 2019.

  120. Android Malware Detection Using Complex-Flows
    Feng Shen, Justin Vecchio, D. Mohaisen, S. Ko, Lukasz Ziarek
    IEEE Trans. Mob. Comput., 2019
    Also appeared in IEEE ICDCS (short paper), Atlanta, GA, USA, 2017
    Also appeared in ACM MobiSys (poster), Niagara Falls, NY, USA, 2017

  121. Poster: Analyzing endpoints in the internet of things malware
    J. Choi, A. Anwar, H. Alasmary, J. Spaulding, D. Nyang, D. Mohaisen
    ACM WiSec, Miami, Florida, USA, 2019.

  122. Analyzing and Detecting Emerging Internet of Things Malware: A Graph-Based Approach
    H. Alasmary, A. Khormali, A. Anwar, J. Park, J. Choi, A. Abusnaina, Amro Awad, D. Nyang, D. Mohaisen
    IEEE Internet Things J., 2019.

  123. Adversarial Learning Attacks on Graph-based IoT Malware Detection Systems
    A. Abusnaina, A. Khormali, H. Alasmary, J. Park, A. Anwar, D. Mohaisen
    IEEE ICDCS, Dallas, TX, USA, 2019.

  124. Poster: A cost-effective anomaly detection system using in-DRAM working set of active flows table
    R. Jang, S. Moon, Y. Noh, D. Mohaisen, D. Nyang
    ACM WiSec, Miami, Florida, USA, 2019.

  125. A Privacy-Preserving Longevity Study of Tor’s Hidden Services
    A. Sanatinia, J. Park, E.-O. Blass, D. Mohaisen, G. Noubir
    CoRR, 2019.

  126. XMSS: eXtended Merkle Signature Scheme
    Andreas Hulsing, D. Butin, Stefan{-}Lukas Gazdag, Joost Rijneveld, D. Mohaisen
    IETF RFC, 2018.

  127. Two-Thumbs-Up: Physical protection for PIN entry secure against recording attacks
    D. Nyang, H. Kim, W. Lee, S. Kang, G. Cho, M. Lee, D. Mohaisen
    Comput. Secur., 2018.

  128. Towards Blockchain-Driven, Secure and Transparent Audit Logs
    A. Ahmad, M. Saad, M. Bassiouni, D. Mohaisen
    DLoT@MobiQuitous, New York City, NY, USA, 2018
    🏅 Best Paper Award

  129. Timing is Almost Everything: Realistic Evaluation of the Very Short Intermittent DDoS Attacks
    J. Park, D. Nyang, D. Mohaisen
    IEEE PST, Belfast, Northern Ireland, Uk, 2018.

  130. ShmCaffe: A Distributed Deep Learning Platform with Shared Memory Buffer for HPC Architecture
    S. Ahn, J. Kim, E. Lim, W. Choi, D. Mohaisen, S. Kang
    IEEE ICDCS, Vienna, Austria, 2018.

  131. SSD-Insider: Internal Defense of Solid-State Drive against Ransomware with Perfect Data Recovery
    S. Baek, Y. Jung, D. Mohaisen, S. Lee, D. Nyang
    IEEE ICDCS, Vienna, Austria, 2018.

  132. QOI: Assessing Participation in Threat Information Sharing
    J. Park, H. Alasmary, O. Al-Ibrahim, C. Kamhoua, K. Kwiat, L. Njilla, D. Mohaisen
    IEEE ICASSP, Calgary, AB, Canada, 2018.

  133. Proactive detection of algorithmically generated malicious domains
    J. Spaulding, J. Park, J. Kim, D. Mohaisen
    ICOIN, Chiang Mai, Thailand, 2018.

  134. POSTER: Deterring DDoS Attacks on Blockchain-based Cryptocurrencies through Mempool Optimization
    M. Saad, My Thai, D. Mohaisen
    ACM AsiaCCS, Incheon, Republic of Korea, 2018.

  135. Neural Network Syntax Analyzer for Embedded Standardized Deep Learning
    M. Shin, J. Kim, D. Mohaisen, J. Park, K. Lee
    EMDL@MobiSys, Munich, Germany, 2018.

  136. Network-based Analysis and Classification of Malware using Behavioral Artifacts Ordering
    D. Mohaisen, O. Alrawi, J. Park, J. Kim, D. Nyang, M. Mohaisen
    EAI Endorsed Trans. Security Safety, 2018.

  137. Large-Scale and Language-Oblivious Code Authorship Identification
    M. Abuhamad, T. AbuHmed, D. Mohaisen, D. Nyang
    ACM CCS, Toronto, ON, Canada, 2018.

  138. Interference-Aware Adaptive Beam Alignment for Hyper-Dense IEEE 802.11ax Internet-of-Things Networks
    D. Kwon, Sang{-}Wook Kim, J. Kim, D. Mohaisen
    Sensors, 2018.

  139. Graph-Based Comparison of IoT and Android Malware
    H. Alasmary, A. Anwar, J. Park, J. Choi, D. Nyang, D. Mohaisen
    CSoNet, Shanghai, China, 2018.

  140. Digitalseal: a Transaction Authentication Tool for Online and Offline Transactions
    C. Jung, J. Kang, D. Mohaisen, D. Nyang
    IEEE ICASSP, Calgary, AB, Canada, 2018.

  141. Delving Into Internet DDoS Attacks by Botnets: Characterization and Analysis
    A. Wang, W. Chang, S. Chen, D. Mohaisen
    IEEE/ACM Trans. Netw., 2018.

  142. Defending Internet of Things Against Malicious Domain Names using D-FENS
    J. Spaulding, D. Mohaisen
    IEEE/ACM SEC Workshops, Seattle, WA, USA, 2018.

  143. Countering Selfish Mining in Blockchains
    M. Saad, L. Njilla, C. Kamhoua, D. Mohaisen
    IEEE ICNC, 2018.

  144. ABC: Enabling Smartphone Authentication with Built-in Camera
    Z. Ba, S. Piao, X. Fu, D. Koutsonikolas, D. Mohaisen, K. Ren
    ISOC NDSS, San Diego, California, USA, 2018.

  145. You’ve Been Tricked! A User Study of the Effectiveness of Typosquatting Techniques
    J. Spaulding, S. Upadhyaya, D. Mohaisen
    IEEE ICDCS, Atlanta, GA, USA, 2017.

  146. You Can Hear But You Cannot Steal: Defending Against Voice Impersonation Attacks on Smartphones
    Si Chen, K. Ren, S. Piao, C. Wang, Q. Wang, J. Weng, L. Su, D. Mohaisen
    IEEE ICDCS 2017, Atlanta, GA, USA, 2017.

  147. When Smart TV Meets CRN: Privacy-Preserving Fine-Grained Spectrum Access
    C. Guan, D. Mohaisen, Z. Sun, L. Su, K. Ren, Y. Yang
    IEEE ICDCS 2017, Atlanta, GA, USA, 2017.

  148. Understanding the effectiveness of typosquatting techniques
    J. Spaulding, D. Nyang, D. Mohaisen
    ACM/IEEE HotWeb 2017, San Jose / Silicon Valley, CA, USA, 2017.

  149. Understanding Adversarial Strategies from Bot Recruitment to Scheduling
    W. Chang, D. Mohaisen, A. Wang, S. Chen
    EAI SecureComm, Niagara Falls, ON, Canada, 2017.

  150. Poster: Two-level network monitoring and management in WLAN using software-defined networking
    R. Jang, D. Cho, D. Mohaisen, Y. Noh, D. Nyang
    ACM WiSec, Boston, MA, USA, 2017.

  151. SecGDB: Graph Encryption for Exact Shortest Distance Queries with Efficient Updates
    Q. Wang, K. Ren, M. Du, Q. Li, D. Mohaisen
    Financial Crypto, Sliema, Malta, Revised Selected Papers, 2017.

  152. Rogue Access Point Detector Using Characteristics of Channel Overlapping in 802.11n
    R. Jang, J. Kang, D. Mohaisen, D. Nyang
    IEEE ICDCS, Atlanta, GA, USA, 2017.

  153. Rethinking information sharing for threat intelligence
    D. Mohaisen, O. Al-Ibrahim, C. Kamhoua, K. Kwiat, L. Njilla
    ACM/IEEE HotWeb, San Jose / Silicon Valley, CA, USA, 2017.

  154. Privacy Implications of DNSSEC Look-Aside Validation
    D. Mohaisen, Z. Gu, K. Ren
    IEEE ICDCS, Atlanta, GA, USA, 2017.
    Also in IEEE PAC, 2017 (poster).

  155. Performance of deep learning computation with TensorFlow software library in GPU-capable multi-core computing platforms
    Y. Mo, J. Kim, J.-K. Kim, D. Mohaisen, W. Lee
    IEEE ICUFN, Milan, Italy, 2017.

  156. Leakage of .onion at the DNS Root: Measurements, Causes, and Countermeasures
    D. Mohaisen, K. Ren
    IEEE/ACM Trans. Netw., 2017.

  157. Highly-accurate rogue access point detection using intentional channel interference: poster
    R. Jang, J. Kang, D. Mohaisen, D. Nyang
    ACM WiSec, Boston, MA, USA, 2017.

  158. Distributed and reliable decision-making for cloud-enabled mobile service platforms
    J. Kim, D. Mohaisen
    Int. J. Distributed Sens. Networks, 2017.

  159. Crime Scene Reconstruction: Online Gold Farming Network Analysis
    H. Kwon, D. Mohaisen, J. Woo, Y. Kim, E. Lee, H. Kim,
    IEEE Trans. Inf. Forensics Secur., 2017.

  160. An Adversary-Centric Behavior Modeling of DDoS Attacks
    A. Wang, D. Mohaisen, S. Chen
    IEEE ICDCS, Atlanta, GA, USA, 2017.

  161. You are a Game Bot!: Uncovering Game Bots in MMORPGs via Self-similarity in the Wild E. Lee, J. Woo, H. Kim, D. Mohaisen, H. Kim
    ISOC NDSS, San Diego, California, USA, 2016.

  162. Transparency in the New gTLD Era: Evaluating the DNS Centralized Zone Data Service
    A. Kang, S. Jeong, S. Ko, K. Ren, D. Mohaisen
    IEEE/ACM HotWeb, Washington, DC, USA, 2016.

  163. The Landscape of Domain Name Typosquatting: Techniques and Countermeasures
    J. Spaulding, S. Upadhyaya, D. Mohaisen
    ARES, Salzburg, Austria, 2016.

  164. Private Over-Threshold Aggregation Protocols over Distributed Datasets
    M. Kim, D. Mohaisen, J. Cheon, Y. Kim
    IEEE Trans. Knowl. Data Eng., 2016.

  165. Multimodal Game Bot Detection using User Behavioral Characteristics
    A. Kang, S. Jeong, D. Mohaisen, H. Kim
    CoRR, 2016.

  166. Measuring and Analyzing Trends in Recent Distributed Denial of Service Attacks
    A. Wang, D. Mohaisen, W. Chang, S. Chen
    WISA, Jeju Island, Korea, Revised Selected Papers, 2016.

  167. Mal-Netminer: Malware Classification Approach based on Social Network Analysis of System Call Graph
    J.-w. Jang, J. Woo, D. Mohaisen, J. Yun, H. Kim
    CoRR, 2016.

  168. Chains of Distrust: Towards Understanding Certificates Used for Signing Malicious Applications
    O. Alrawi, D. Mohaisen
    WWW Companion, Montreal, Canada, 2016.

  169. Andro-profiler: Detecting and Classifying Android Malware based on Behavioral Profiles
    J.-w. Jang, J. Yun, D. Mohaisen, J. Woo, H. Kim
    CoRR, 2016.

  170. Andro-Dumpsys: Anti-malware system based on the similarity of malware creator and malware centric information
    J.-w. Jang, H.-J. Kang, J. Woo, D. Mohaisen, H. Kim
    Comput. Secur., 2016.

  171. A Longitudinal Analysis of .i2p Leakage in the Public DNS Infrastructure
    S. Jeong, A. Kang, J. Kim, H. Kim, D. Mohaisen
    ACM SIGCOMM (poster), Florianopolis, Brazil, 2016.

  172. Transaction authentication using complementary colors
    Y. Maeng, D. Mohaisen, M. Lee, D. Nyang
    Comput. Secur., 2015.

  173. Towards Automatic and Lightweight Detection and Classification of Malicious Web Contents
    D. Mohaisen
    ACM/IEEE HotWeb, Washington, DC, USA, 2015.

  174. Timing Attacks on Access Privacy in Information Centric Networks and Countermeasures
    D. Mohaisen, H. Mekky, X. Zhang, H. Xie, Y. Kim
    IEEE Trans. Dependable Secur. Comput., 2015.

  175. Separation of benign and malicious network events for accurate malware family classification
    H. Mekky, D. Mohaisen, Z.-L. Zhang
    IEEE CNS, Florence, Italy, 2015.
    ACM CCS (poster), Scottsdale, AZ, USA, 2014.

  176. Measuring Botnets in the Wild: Some New Trends
    W. Chang, D. Mohaisen, A. Wang, S. Chen
    ACM ASIACCS, Singapore, 2015.

  177. Detecting and Classifying Android Malware Using Static Analysis along with Creator Information
    H.-J. Kang, J.-w. Jang, D. Mohaisen, H. Kim
    Int. J. Distributed Sens. Networks, 2015.

  178. Delving into Internet DDoS Attacks by Botnets: Characterization and Analysis
    A. Wang, D. Mohaisen, W. Chang, S. Chen
    IEEE DSN, Rio de Janeiro, Brazil, 2015.

  179. Capturing DDoS Attack Dynamics Behind the Scenes
    A. Wang, D. Mohaisen, W. Chang, S. Chen
    DIMVA, Milan, Italy, 2015.

  180. Andro-AutoPsy: Anti-malware system based on similarity matching of malware and malware creator-centric information
    J.-w. Jang, Hyunjae Kang, J. Woo, D. Mohaisen, H. Kim
    Digit. Investig., 2015.

  181. AMAL: High-fidelity, behavior-based automated malware analysis and classification
    D. Mohaisen, O. Alrawi, M. Mohaisen
    Comput. Secur., 2015.

  182. Trustworthy Distributed Computing on Social Networks
    D. Mohaisen, H. Tran, A. Chandra, Y. Kim
    IEEE Trans. Serv. Comput., 2014.

  183. Parallel QRD-M encoder for multi-user MIMO systems
    M. Mohaisen, D. Mohaisen, M. Debbah
    Telecommun. Syst., 2014.

  184. POSTER: How Distributed Are Today’s DDoS Attacks?
    A. Wang, W. Chang, D. Mohaisen, S. Chen
    ACM CCS, Scottsdale, AZ, USA, 2014.

  185. Name Server Switching: Anomaly Signatures, Usage, Clustering, and Prediction
    D. Mohaisen, M. Bhuiyan, Y. Labrou
    WISA, Jeju Island, Korea, Revised Selected Papers, 2014.

  186. Metadata-Driven Threat Classification of Network Endpoints Appearing in Malware
    A. West, D. Mohaisen
    DIMVA, Egham, UK, 2014.

  187. Measuring the Leakage of Onion at the Root: A measurement of Tor’s .onion pseudo-TLD in the global domain name system
    M. Thomas, D. Mohaisen
    ACM WPES, Scottsdale, AZ, USA, 2014.

  188. Kindred domains: detecting and clustering botnet domains using DNS traffic
    M. Thomas, D. Mohaisen
    WWW, Seoul, Republic of Korea, Companion Volume, 2014.

  189. Keylogging-Resistant Visual Authentication Protocols
    D. Nyang, D. Mohaisen, J. Kang
    IEEE Trans. Mob. Comput., 2014.

  190. Fast and Low-Power Link Setup for IEEE 802.15.3c Multi-Gigabit/s Wireless Sensor Networks
    J. Kim, D. Mohaisen, J.-K. Kim
    IEEE Commun. Lett., 2014.

  191. Chatter: Classifying malware families using system event ordering
    D. Mohaisen, A. West, A. Mankin, O. Alrawi
    IEEE CNS, San Francisco, CA, USA, 2014.

  192. Characterizing botnets-as-a-service
    W. Chang, A. Wang, D. Mohaisen, S. Chen
    ACM SIGCOMM, Chicago, IL, USA, 2014.

  193. AV-Meter: An Evaluation of Antivirus Scans and Labels
    D. Mohaisen, O. Alrawi
    DIMVA, Egham, UK, 2014.

  194. AMAL: High-Fidelity, Behavior-Based Automated Malware Analysis and Classification
    D. Mohaisen, O. Alrawi
    WISA, Jeju Island, Korea, Revised Selected Papers, 2014
    🏅 Best Paper Award

  195. A. Kosba, D. Mohaisen, A. West, T. Tonn, H. Kim
    ADAM: Automated Detection and Attribution of Malicious Webpages
    WISA, Jeju Island, Korea, Revised Selected Papers, 2014.

  196. A Private Walk in the Clouds: Using End-to-End Encryption between Cloud Applications in a Personal Domain
    Y. Song, H. Kim, D. Mohaisen
    TrustBus, Munich, Germany, 2014.

  197. Unveiling Zeus: automated classification of malware samples
    D. Mohaisen, O. Alrawi
    WWW, Rio de Janeiro, Brazil, Companion Volume, 2013.

  198. Trustworthy distributed computing on social networks
    D. Mohaisen, H. Tran, A. Chandra, Y. Kim
    ACM ASIACCS, Hangzhou, China, 2013.

  199. Trading Optimality for Scalability in Large-Scale Opportunistic Routing
    Y. Li, D. Mohaisen, Z.-L. Zhang
    IEEE Trans. Veh. Technol., 2013.

  200. Towards a Methodical Evaluation of Antivirus Scans and Labels
    D. Mohaisen, O. Alrawi, M. Larson, D. McPherson
    WISA, Jeju Island, Korea, Revised Selected Papers, 2013.

  201. Secure Encounter-Based Mobile Social Networks: Requirements, Designs, and Tradeoffs
    D. Mohaisen, D. Kune, E. Vasserman, M. Kim, Y. Kim
    IEEE Trans. Dependable Secur. Comput., 2013
    Also in ACM CCS (poster), Chicago, Illinois, USA, 2010.

  202. Protecting access privacy of cached contents in information centric networks
    D. Mohaisen, X. Zhang, M. Schuchard, H. Xie, Y. Kim
    ACM AsiaCCS, Hangzhou, China, 2013.

  203. Improving Social Network-Based Sybil Defenses by Rewiring and Augmenting Social Graphs
    D. Mohaisen, S. Hollenbeck
    WISA, Jeju Island, Korea, Revised Selected Papers, 2013.

  204. Dynamix: anonymity on dynamic social structures
    D. Mohaisen, Y. Kim
    ACM AsiaCCS, Hangzhou, China, 2013.

  205. Poster: Characterization of the dynamics and interactions of domain names and name serve
    M. Bhuiyan, D. Mohaisen, Y. Labrou, M. Hasan
    IEEE CNS, National Harbor, MD, USA, 2013.

  206. Poster: Babble: Identifying malware by its dialects
    D. Mohaisen, O. Alrawi, A. West, A. Mankin
    IEEE CNS, National Harbor, MD, USA, 2013.

  207. Poster: ADAM: Automated detection and attribution of malicious webpages
    A. Kosba, D. Mohaisen, A. West, T. Tonn
    IEEE CNS, National Harbor, MD, USA, 2013
    🏅 Best Poster Award

  208. Protecting access privacy of cached contents in information centric networks
    D. Mohaisen, X. Zhang, M. Schuchard, H. Xie, Y. Kim
    ACM CCS, Raleigh, NC, USA, 2012.

  209. Private Over-Threshold Aggregation Protocols
    M. Kim, D. Mohaisen, J. Cheon, Y. Kim
    ICISC, Seoul, Korea, Revised Selected Papers, 2012.

  210. On the mixing time of directed social graphs and security implications
    D. Mohaisen, H. Tran, N. Hopper, Y. Kim
    ACM AsiaCCS, Seoul, Korea, 2012.

  211. Measuring bias in the mixing time of social graphs due to graph sampling
    D. Mohaisen, PengK. Luo, Y. Li, Y. Kim, Z.-L. Zhang
    IEEE MILCOM, Orlando, FL, USA, 2012.

  212. DEOS: Dynamic energy-oriented scheduling for sustainable wireless sensor networks
    T. Zhu, D. Mohaisen, Y. Ping, D. Towsley
    IEEE INFOCOM, Orlando, FL, USA, 2012.

  213. Collaboration in social network-based information dissemination
    D. Mohaisen, T. AbuHmed, T. Zhu, M. Mohaisen
    IEEE ICC, Ottawa, ON, Canada, 2012.

  214. Understanding Social Networks Properties for Trustworthy Computing
    D. Mohaisen, H. Tran, N. Hopper, Y. Kim
    IEEE ICDCS Workshops, Minneapolis, Minnesota, USA, 2011.

  215. Parallel QRD-M Encoder for Decentralized Multi-User MIMO Systems
    M. Mohaisen, D. Mohaisen, Y. Li, P. Luo
    IEEE ICC, Kyoto, Japan, 2011.

  216. Losing Control of the Internet: Using the Data Plane to Attack the Control Plane
    M. Schuchard, D. Mohaisen, D. Kune, N. Hopper, Y. Kim, E. Vasserman
    ISOC NDSS, San Diego, California, USA, 2011.
    Also ACM CCS (poster), Chicago, Illinois, USA, 2010.

  217. Keep your friends close: Incorporating trust into social network-based Sybil defenses
    D. Mohaisen, N. Hopper, Y. Kim
    IEEE INFOCOM, Shanghai, China, 2011.
    Also ACM CCS (poster), Chicago, Illinois, USA, 2010.

  218. Privacy Preserving Association Rule Mining Revisited: Privacy Enhancement and Resources Efficiency
    D. Mohaisen, N. Jho, D. Hong, D. Nyang
    IEICE Trans. Inf. Syst., 2010.

  219. Measuring the mixing time of social graphs
    D. Mohaisen, A. Yun, Y. Kim
    ACM IMC, Melbourne, Australia, 2010.

  220. Augmented Rotation-Based Transformation for Privacy-Preserving Data Clustering
    D. Hong, D. Mohaisen
    ETRI Journal, 2010.

  221. Mitigating the ICA Attack against Rotation Based Transformation for Privacy Preserving Clustering
    D. Mohaisen, D. Hong
    ETRI Journal, 2009.

  222. Hierarchical Grid-based Pairwise Key Pre-distribution in Wireless Sensor Networks
    D. Mohaisen, D. Nyang, K. Lee
    Int. J. Netw. Secur., 2009.

  223. Data Randomization for Lightweight Secure Data Aggregation in Sensor Network
    D. Mohaisen, I. Jeong, D. Hong, N. Jho, D. Nyang
    UIC, Oslo, Norway, 2008.

  224. A Survey on Deep Packet Inspection for Intrusion Detection Systems
    T. AbuHmed, D. Mohaisen, D. Nyang
    Korea Telecommunication Magazine, 2008.

  225. Structures for Communication-Efficient Public Key Revocation in Ubiquitous Sensor Network
    D. Mohaisen, D. Nyang, Y. Maeng, K. Lee
    IEEE MSN, Beijing, China 2007.

  226. Secret Key Revocation in Sensor Networks
    Y. Maeng, D. Mohaisen, D. Nyang
    UIC, Hong Kong, China, 2007.

  227. On Grid-Based Key Pre-distribution: Toward a Better Connectivity in Wireless Sensor Network
    D. Mohaisen, Y. Maeng, D. Nyang
    PAKDD, Nanjing, China, Revised Selected Papers, 2007.

  228. Cooperative Public Key Authentication Protocol in Wireless Sensor Network
    D. Nyang, D. Mohaisen
    UIC, Wuhan, China, 2006.

  229. Hierarchical Grid-Based Pairwise Key Predistribution Scheme for Wireless Sensor Networks
    D. Mohaisen, D. Nyang
    EWSN, Zurich, Switzerland, 2006.

Editorship

  1. D. Mohaisen, R. Jin: Proceedings of the 10th International Conference on Computational Data and Social Networks, CSoNet 2021, Virtual Event, November 15-17, 2021. Lecture Notes in Computer Science 13116, Springer 2021, ISBN 978-3-030-91433-2

  2. D. Mohaisen, Z.-L. Zhang: Proceedings of the 15th International Conference on Emerging Networking Experiments And Technologies, CoNEXT 2019, Orlando, FL, USA, December 09-12, 2019. ACM 2019, ISBN 978-1-4503-6998-5

  3. S. Chen, K.-K. Choo, X. Fu, W. Lou, D. Mohaisen: Proceedings of the 15th EAI International Conference Security and Privacy in Communication Networks, SecureComm 2019, Part I, Orlando, FL, USA, October 23-25, 2019. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering 304, Springer 2019, ISBN 978-3-030-37227-9

  4. S. Chen, K.-K. Choo, X. Fu, W. Lou, D. Mohaisen: Proceedings of the 15th EAI International Conference Security and Privacy in Communication Networks, SecureComm 2019, Part II, Orlando, FL, USA, October 23-25, 2019. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering 305, Springer 2019, ISBN 978-3-030-37230-9

  5. D. Mohaisen, Q. Wang: Proceedings of the 6th International Workshop on Security in Cloud Computing, SCC@AsiaCCS 2018, Incheon, Republic of Korea, June 04-08, 2018. ACM 2018