default search action
Sherif Saad
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2025
- [j12]Inoussa Mouiche, Sherif Saad:
Entity and relation extractions for threat intelligence knowledge graphs. Comput. Secur. 148: 104120 (2025) - 2024
- [j11]Hadeer Ahmed, Issa Traoré, Sherif Saad, Mohammad Mamun:
Effect of Text Augmentation and Adversarial Training on Fake News Detection. IEEE Trans. Comput. Soc. Syst. 11(4): 4775-4789 (2024) - [c26]Aly M. Kassem, Sherif Saad:
Finding a Needle in the Adversarial Haystack: A Targeted Paraphrasing Approach For Uncovering Edge Cases with Minimal Distribution Distortion. EACL (1) 2024: 552-572 - [c25]Inoussa Mouiche, Sherif Saad:
TI-NERmerger: Semi-Automated Framework for Integrating NER Datasets in Cybersecurity. SECRYPT 2024: 357-370 - [i7]Aly M. Kassem, Sherif Saad:
Finding a Needle in the Adversarial Haystack: A Targeted Paraphrasing Approach For Uncovering Edge Cases with Minimal Distribution Distortion. CoRR abs/2401.11373 (2024) - [i6]Aly M. Kassem, Omar Mahmoud, Niloofar Mireshghallah, Hyunwoo Kim, Yulia Tsvetkov, Yejin Choi, Sherif Saad, Santu Rana:
Alpaca against Vicuna: Using LLMs to Uncover Memorization of LLMs. CoRR abs/2403.04801 (2024) - 2023
- [j10]Ikjot Saini, Sherif Saad, Arunita Jaekel:
Evaluating the effectiveness of pseudonym changing strategies for location privacy in vehicular ad-hoc network. Secur. Priv. 6(4) (2023) - [c24]Aly M. Kassem, Omar Mahmoud, Sherif Saad:
Preserving Privacy Through Dememorization: An Unlearning Technique For Mitigating Memorization Risks In Language Models. EMNLP 2023: 4360-4379 - [c23]Ala' Alqaisi, Sherif Saad, Mohammad Mamun:
Trustworthy Decentralized Last-Mile Delivery Framework Using Blockchain. ICSBT 2023: 54-65 - [c22]Kevin Shi, Sherif Saad:
Automated Feature Engineering for AutoML Using Genetic Algorithms. SECRYPT 2023: 450-459 - [i5]Shiv Sondhi, Sherif Saad, Kevin Shi, Mohammad Saiful Islam Mamun, Issa Traoré:
Evaluating Permissioned Blockchain Using Stochastic Modeling and Chaos Engineering. CoRR abs/2301.07527 (2023) - 2022
- [j9]Ikjot Saini, Sherif Saad, Arunita Jaekel:
A comprehensive pseudonym changing scheme for improving location privacy in vehicular networks. Internet Things 19: 100559 (2022) - [c21]Haytham Elmiligi, Sherif Saad:
Predicting the Outcome of Soccer Matches Using Machine Learning and Statistical Analysis. CCWC 2022: 1-8 - [c20]Haytham Elmiligi, Sherif Saad:
iProfile: Collecting and Analyzing Keystroke Dynamics from Android Users. ICISSP 2022: 621-628 - 2021
- [j8]Ashraf Neisari, Luis Rueda, Sherif Saad:
Spam review detection using self-organizing maps and convolutional neural networks. Comput. Secur. 106: 102274 (2021) - [j7]Hadeer Ahmed, Issa Traoré, Sherif Saad, Mohammad Mamun:
Automated detection of unstructured context-dependent sensitive information using deep learning. Internet Things 16: 100444 (2021) - [c19]Shiv Sondhi, Sherif Saad, Kevin Shi, Mohammad Mamun, Issa Traoré:
Chaos Engineering For Understanding Consensus Algorithms Performance in Permissioned Blockchains. DASC/PiCom/CBDCom/CyberSciTech 2021: 51-59 - [i4]Shiv Sondhi, Sherif Saad, Kevin Shi, Mohammad Mamun, Issa Traoré:
Chaos Engineering For Understanding Consensus Algorithms Performance in Permissioned Blockchains. CoRR abs/2108.08441 (2021) - 2020
- [c18]Ikjot Saini, Sherif Saad, Arunita Jaekel:
A Context Aware and Traffic Adaptive Privacy Scheme in VANETs. CAVS 2020: 1-5 - [c17]Vijay Rajasekar, Shiv Sondhi, Sherif Saad, Shady Mohammed:
Emerging Design Patterns for Blockchain Applications. ICSOFT 2020: 242-249 - [i3]William Briguglio, Sherif Saad:
Interpreting Machine Learning Malware Detectors Which Leverage N-gram Analysis. CoRR abs/2001.10916 (2020)
2010 – 2019
- 2019
- [j6]Ikjot Saini, Sherif Saad, Arunita Jaekel:
A Comprehensive Review of Pseudonym Changing Strategies in Vehicular Networks. Int. J. Netw. Secur. 21(5): 785-796 (2019) - [c16]William Briguglio, Sherif Saad:
Interpreting Machine Learning Malware Detectors Which Leverage N-gram Analysis. FPS 2019: 82-97 - [c15]Mohammed Alshahrani, Issa Traoré, Sherif Saad:
Lightweight IoT Mutual Authentication Scheme Based on Transient Identities and Transactions History. FPS 2019: 387-397 - [c14]Sherif Saad, William Briguglio, Haytham Elmiligi:
The Curious Case of Machine Learning in Malware Detection. ICISSP 2019: 528-535 - [c13]Sherif Saad, Farhan Mahmood, William Briguglio, Haytham Elmiligi:
JSLess: A Tale of a Fileless Javascript Memory-Resident Malware. ISPEC 2019: 113-131 - [i2]Sherif Saad, William Briguglio, Haytham Elmiligi:
The Curious Case of Machine Learning In Malware Detection. CoRR abs/1905.07573 (2019) - [i1]Sherif Saad, Farhan Mahmood, William Briguglio, Haytham Elmiligi:
JSLess: A Tale of a Fileless Javascript Memory-Resident Malware. CoRR abs/1911.11276 (2019) - 2018
- [j5]Hadeer Ahmed, Issa Traoré, Sherif Saad:
Detecting opinion spams and fake news using text classification. Secur. Priv. 1(1) (2018) - [c12]Ikjot Saini, Sherif Saad, Arunita Jaekel:
Speed Based Attacker Placement for Evaluating Location Privacy in VANET. ADHOCNETS 2018: 215-224 - [c11]Sowndarya Krishnamoorthy, Luis Rueda, Sherif Saad, Haytham Elmiligi:
Identification of User Behavioral Biometrics for Authentication Using Keystroke Dynamics and Machine Learning. ICBEA 2018: 50-57 - [c10]Ikjot Saini, Sherif Saad, Arunita Jaekel:
Identifying Vulnerabilities and Attacking Capabilities Against Pseudonym Changing Schemes in VANET. ISDDC 2018: 1-15 - 2017
- [c9]Hadeer Ahmed, Issa Traoré, Sherif Saad:
Detection of Online Fake News Using N-Gram Analysis and Machine Learning Techniques. ISDDC 2017: 127-138 - 2015
- [j4]Marcelo Luiz Brocardo, Issa Traoré, Sherif Saad, Isaac Woungang:
Verifying Online User Identity using Stylometric Analysis for Short Messages. J. Networks 10(12): 675-683 (2015) - 2014
- [j3]Marcelo Luiz Brocardo, Issa Traoré, Sherif Saad, Isaac Woungang:
Verifying Online User Identity using Stylometric Analysis for Short Messages. J. Networks 9(12): 3347-3355 (2014) - [c8]Sherif Saad, Issa Traoré, Marcelo Luiz Brocardo:
Context-aware intrusion alerts verification approach. IAS 2014: 53-59 - 2013
- [j2]David Zhao, Issa Traoré, Bassam Sayed, Wei Lu, Sherif Saad, Ali A. Ghorbani, Daniel Garant:
Botnet detection based on traffic behavior analysis and flow intervals. Comput. Secur. 39: 2-16 (2013) - [j1]Sherif Saad, Issa Traoré:
Semantic aware attack scenarios reconstruction. J. Inf. Secur. Appl. 18(1): 53-67 (2013) - [c7]Marcelo Luiz Brocardo, Issa Traoré, Sherif Saad, Isaac Woungang:
Authorship verification for short messages using stylometry. CITS 2013: 1-6 - 2012
- [c6]Sherif Saad, Issa Traoré:
Extracting Attack Scenarios Using Intrusion Semantics. FPS 2012: 278-292 - [c5]David Zhao, Issa Traoré, Ali A. Ghorbani, Bassam Sayed, Sherif Saad, Wei Lu:
Peer to Peer Botnet Detection Based on Flow Intervals. SEC 2012: 87-102 - 2011
- [c4]Sherif Saad, Issa Traoré:
A semantic analysis approach to manage IDS alerts flooding. IAS 2011: 156-161 - [c3]Sherif Saad, Issa Traoré, Ali A. Ghorbani, Bassam Sayed, David Zhao, Wei Lu, John Felix, Payman Hakimian:
Detecting P2P botnets through network behavior analysis and machine learning. PST 2011: 174-180 - 2010
- [c2]Sherif Saad, Issa Traoré:
Method ontology for intelligent network forensics analysis. PST 2010: 7-14 - [c1]Sherif Saad, Issa Traoré:
Ontology-based Intelligent Network-Forensics Investigation. SEDE 2010: 313-319
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-04 20:59 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint