User profiles for Muhammad Ejaz Ahmed

Muhammad Ejaz Ahmed

- Verified email at data61.csiro.au - Cited by 778

Muhammad Ejaz Ahmed

- Verified email at ngha.med.sa - Cited by 225

Transformer-based language models for software vulnerability detection

C Thapa, SI Jang, ME Ahmed, S Camtepe… - Proceedings of the 38th …, 2022 - dl.acm.org
The large transformer-based language models demonstrate excellent performance in natural
language processing. By considering the transferability of the knowledge gained by these …

Void: A fast and light voice liveness detection system

ME Ahmed, IY Kwak, JH Huh, I Kim, T Oh… - 29th USENIX Security …, 2020 - usenix.org
Due to the open nature of voice assistants' input channels, adversaries could easily record
people's use of voice commands, and replay them to spoof voice assistants. To mitigate such …

Statistical application fingerprinting for DDoS attack mitigation

ME Ahmed, S Ullah, H Kim - IEEE Transactions on Information …, 2018 - ieeexplore.ieee.org
Because of the dynamic nature of network traffic patterns, such as new traffic application
arrivals or flash events, it is becoming increasingly difficult for conventional anomaly detection …

Backdoor attack on machine learning based android malware detectors

…, X Chen, D Wang, S Wen, ME Ahmed… - … on dependable and …, 2021 - ieeexplore.ieee.org
Muhammad Ejaz Ahmed received the MS degree in information technology from the
National University of Sciences and Technology (NUST), Islamabad, Pakistan, in 2011, and the …

Mitigating DNS query-based DDoS attacks with machine learning on software-defined networking

ME Ahmed, H Kim, M Park - MILCOM 2017-2017 IEEE Military …, 2017 - ieeexplore.ieee.org
Securing Internet of Things is a challenge because of its multiple points of vulnerability. In
particular, Distributed Denial of Service (DDoS) attacks on IoT devices pose a major security …

Peeler: Profiling kernel-level events to detect ransomware

ME Ahmed, H Kim, S Camtepe, S Nepal - … 4–8, 2021, Proceedings, Part I …, 2021 - Springer
Because the recent ransomware families are becoming progressively more advanced, it is
challenging to detect ransomware using static features only. However, their behaviors are still …

Meningioma presenting with spontaneous subdural hematoma: a report of two cases and literature review

…, M Abbas, B Fallatah, A Alkhaibary, ME Ahmed… - World Neurosurgery, 2019 - Elsevier
Background Although meningiomas are considered benign, encapsulated brain tumors,
their distinct intracranial location can lead to devastating complications. Although a highly …

Vuldebert: A vulnerability detection system using bert

S Kim, J Choi, ME Ahmed, S Nepal… - 2022 IEEE International …, 2022 - ieeexplore.ieee.org
Deep learning technologies recently received much attention to detect vulnerable code patterns
accurately. This paper proposes a new deep learning-based vulnerability detection tool …

Computed tomographic angiography and cerebral blood volume can predict final infarct volume and outcome after recanalization

C Lum, ME Ahmed, S Patro, R Thornhill, M Hogan… - Stroke, 2014 - Am Heart Assoc
Background and Purpose— Recanalization rates are higher in acute anterior stroke treated
with stent-retrievers when compared with older techniques. However, some still have …

Preventing DNS amplification attacks using the history of DNS queries with SDN

S Kim, S Lee, G Cho, ME Ahmed, J Jeong… - … Security–ESORICS 2017 …, 2017 - Springer
Abstract Domain Name System (DNS) amplification attack is a sophisticated Distributed
Denial of Service (DDoS) attack by sending a huge volume of DNS name lookup requests to …