default search action
Mahathir Almashor
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [j9]Chandra Thapa, Jun Wen Tang, Alsharif Abuadbba, Yansong Gao, Seyit Camtepe, Surya Nepal, Mahathir Almashor, Yifeng Zheng:
Evaluation of Federated Learning in Phishing Email Detection. Sensors 23(9): 4346 (2023) - [j8]Aditya Pribadi Kalapaaking, Ibrahim Khalil, Mohammad Saidur Rahman, Mohammed Atiquzzaman, Xun Yi, Mahathir Almashor:
Blockchain-Based Federated Learning With Secure Aggregation in Trusted Execution Environment for Internet-of-Things. IEEE Trans. Ind. Informatics 19(2): 1703-1714 (2023) - [c10]Mahathir Almashor, M. Ejaz Ahmed, Benjamin Pick, Jason Xue, Sharif Abuadbba, Raj Gaire, Shuo Wang, Seyit Camtepe, Surya Nepal:
Unraveling Threat Intelligence Through the Lens of Malicious URL Campaigns. AINTEC 2023: 78-86 - [c9]Mashud Rana, Ashfaqur Rahman, Mahathir Almashor, John McCulloch, Subbu Sethuvenkatraman:
Automatic Classification of Sensors in Buildings: Learning from Time Series Data. AI (1) 2023: 367-378 - [c8]Shuo Wang, Mahathir Almashor, Alsharif Abuadbba, Ruoxi Sun, Minhui Xue, Calvin Wang, Raj Gaire, Surya Nepal, Seyit Camtepe:
DOITRUST: Dissecting On-chain Compromised Internet Domains via Graph Learning. NDSS 2023 - [c7]Mahathir Almashor, Mashud Rana, John McCulloch, Ashfaqur Rahman, Subbu Sethuvenkatraman:
What's The Point: AutoEncoding Building Point Names. BuildSys@SenSys 2023: 256-260 - [c6]Mahathir Almashor, Akbar Fadiansyah, Chehara Pathmabandu, Matt Amos, M. A. P. Chamikara:
Mitigating Privacy Leakage in Anomalous Building Data Streams. BuildSys@SenSys 2023: 333-339 - [i8]Aditya Pribadi Kalapaaking, Ibrahim Khalil, Mohammad Saidur Rahman, Mohammed Atiquzzaman, Xun Yi, Mahathir Almashor:
Blockchain-based Federated Learning with Secure Aggregation in Trusted Execution Environment for Internet-of-Things. CoRR abs/2304.12889 (2023) - [i7]Aditya Pribadi Kalapaaking, Veronika Stephanie, Ibrahim Khalil, Mohammed Atiquzzaman, Xun Yi, Mahathir Almashor:
SMPC-based Federated Learning for 6G enabled Internet of Medical Things. CoRR abs/2304.13352 (2023) - 2022
- [j7]Neda Bugshan, Ibrahim Khalil, Nour Moustafa, Mahathir Almashor, Alsharif Abuadbba:
Radial Basis Function Network with Differential Privacy. Future Gener. Comput. Syst. 127: 473-486 (2022) - [j6]Aditya Pribadi Kalapaaking, Veronika Stephanie, Ibrahim Khalil, Mohammed Atiquzzaman, Xun Yi, Mahathir Almashor:
SMPC-Based Federated Learning for 6G-Enabled Internet of Medical Things. IEEE Netw. 36(4): 182-189 (2022) - [i6]Reena Zelenkova, Jack Swallow, M. A. P. Chamikara, Dongxi Liu, Mohan Baruwal Chhetri, Seyit Camtepe, Marthie Grobler, Mahathir Almashor:
Resurrecting Trust in Facial Recognition: Mitigating Backdoor Attacks in Face Recognition to Prevent Potential Privacy Breaches. CoRR abs/2202.10320 (2022) - [i5]Alsharif Abuadbba, Shuo Wang, Mahathir Almashor, Muhammad Ejaz Ahmed, Raj Gaire, Seyit Camtepe, Surya Nepal:
Towards Web Phishing Detection Limitations and Mitigation. CoRR abs/2204.00985 (2022) - [i4]Mahathir Almashor, M. Ejaz Ahmed, Benjamin Pick, Sharif Abuadbba, Jason Xue, Raj Gaire, Shuo Wang, Seyit Camtepe, Surya Nepal:
Unraveling Threat Intelligence Through the Lens of Malicious URL Campaigns. CoRR abs/2208.12449 (2022) - [i3]Arthur Wong, Alsharif Abuadbba, Mahathir Almashor, Salil S. Kanhere:
PhishClone: Measuring the Efficacy of Cloning Evasion Attacks. CoRR abs/2209.01582 (2022) - 2021
- [c5]Naimah Yaakob, Mahathir Almashor, Ahmed Fathi Muhammed Ahmed:
Cost Effective IoT-based Remote Healthcare Monitoring System for Developing Countries. SmartIoT 2021: 13-20 - [i2]Mahathir Almashor, M. Ejaz Ahmed, Benjamin Pick, Sharif Abuadbba, Raj Gaire, Seyit Camtepe, Surya Nepal:
Characterizing Malicious URL Campaigns. CoRR abs/2108.12726 (2021) - 2020
- [j5]Chunwu Wang, Bijay Guragain, Ajay K. Verma, Lewis Archer, Shubha Majumder, Abdiaziz Mohamud, Emily Flaherty-Woods, Geoffrey Shapiro, Mahathir Almashor, Mike G. Lenné, Rama Myers, Jonny Kuo, Shiyan Yang, Nicholas Wilson, Kouhyar Tavakolian:
Spectral Analysis of EEG During Microsleep Events Annotated via Driver Monitoring System to Characterize Drowsiness. IEEE Trans. Aerosp. Electron. Syst. 56(2): 1346-1356 (2020) - [i1]Chandra Thapa, Jun Wen Tang, Sharif Abuadbba, Yansong Gao, Yifeng Zheng, Seyit Ahmet Çamtepe, Surya Nepal, Mahathir Almashor:
FedEmail: Performance Measurement of Privacy-friendly Phishing Detection Enabled by Federated Learning. CoRR abs/2007.13300 (2020)
2010 – 2019
- 2016
- [j4]Anton Beloglazov, Mahathir Almashor, Ermyas Abebe, Jan Richter, Kent Charles Barton Steer:
Simulation of wildfire evacuation with dynamic factors and model composition. Simul. Model. Pract. Theory 60: 144-159 (2016) - 2015
- [j3]Mahathir Almashor, Ibrahim Khalil, Zahir Tari, Albert Y. Zomaya, Sartaj Sahni:
Enhancing Availability in Content Delivery Networks for Mobile Platforms. IEEE Trans. Parallel Distributed Syst. 26(8): 2247-2257 (2015) - 2013
- [j2]Mahathir Almashor, Ibrahim Khalil, Zahir Tari, Albert Y. Zomaya:
Automatic and Autonomous Load Management in Peer-to-Peer Virtual Environments. IEEE J. Sel. Areas Commun. 31(9-Supplement): 310-324 (2013) - 2012
- [j1]Mahathir Almashor, Ibrahim Khalil:
Fully peer-to-peer virtual environments with 3D Voronoi diagrams. Computing 94(8-10): 679-700 (2012) - 2011
- [c4]Mahathir Almashor, Ibrahim Khalil:
Timely Arbitrator Selection in P2P Virtual Environments with 3D Voronoi Diagrams. NCA 2011: 235-240 - 2010
- [c3]Mahathir Almashor, Ibrahim Khalil:
Reducing network load in large-scale, Peer-to-Peer Virtual Environments with 3D Voronoi Diagrams. HiPC 2010: 1-10 - [c2]Mahathir Almashor, Ibrahim Khalil:
Load-Balancing Properties of 3D Voronoi Diagrams in Peer-to-Peer Virtual Environments. ICPADS 2010: 839-844 - [c1]Mahathir Almashor, Ibrahim Khalil, Geoff Leach:
Dynamic Game-Play Arbitrators with 3D Voronoi Diagrams. NCA 2010: 253-256
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-20 21:02 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint