Sponsored by:
NSF logo
Latest news:
Important Dates:
Contact Information:
Oakland University

Publications

2017
  • Author(s): Hani Alshahrani, Harrison M Mansour, Seaver Thorn, Ali Alshehri, Abdulrahman Alzahrani, Huirong Fu

    Title: DDefender: Android Application Threat Detection Using Static and Dynamic Analysis

    Location: 2018 IEEE International Conference on Consumer Electronics (ICCE), Las Vegas, NV (Best Poster Award)

  • Author(s): Ahmad Mansour, Andrew Davis, Matthew Wagner, Richard Bassous, Huirong Fu, and Ye Zhu

    Title: Multi-asymmetric cryptographic RSA scheme

    Location: In Proceedings of the 12th Annual Conference on Cyber and Information Security Research (2017), ACM. Oak Ridge, TN. (Best Full Paper Award)

  • Author(s): George P. Corser, Abdelnasser Banihani, Johnathan Cox, Risalatul Hoque, Huirong Fu, and Ye Zhu

    Title: Web Application Security Tools Analysis

    Location: The 2nd IEEE International Conference on Intelligent Data and Security (IEEE IDS 2017). Beijing, China

  • Author(s): Ali Alshehri, Anthony Hewins, Maria McCulley, Hani Alshahrani, Huirong Fu and Ye Zhu

    Title: Risks behind Device Information Permissions in Android OS

    Location: Communications and Network vol. 9, no. 04, pp.219-234, (2017) DOI: 10.4236/cn.2017.94016

  • Author(s): Hani Alshahrani, Abdulrahman Alzahrani, Alexandra Hanton, Ali Alshehri, Huirong Fu and Ye Zhu

    Title: DroidData: Tracking and Monitoring Data Transmission in the Android Operating System

    Location: Communications and Network vol. 9, no. 03, pp.192-206, (2017) DOI: 10.4236/cn.2017.93014

  • Author(s): Symmonds, Paloma, Ali Alharbi, Ephraim Nielson, and Abdulaziz Alshammari

    Title: Application of Unsupervised Learning for Detection Cross-site Scripting (XSS) Security Breaches

    Location: International Journal of Computer and Information Technology 6, no. 6 (2017): 2279-0764.

  • Author(s): Miguel Millan, Andrew DeJonge, Abdulaziz Alshammari, Ali Alharbi and Mohamed Zohdy

    Title: Application of extended Hidden Markov Model (HMM) to detect IoT threats

    Location: Mid-Michigan Symposium for Undergraduate Research Experiences (Mid-SURE), July 26, 2017

  • Author(s): Cameron Chambers, Charlie Wingate, Nabil Almashfi, Lunjin Lu

    Title: Code Smell Detection for JavaScript applications

    Location: Mid-Michigan Symposium for Undergraduate Research Experiences (Mid-SURE), July 26, 2017

  • Author(s): Melissa Nichols, Nathan Torrez, and Anyi Liu

    Title: Constructing Virtual Laboratory for Research and Education

    Location: Mid-Michigan Symposium for Undergraduate Research Experiences (Mid-SURE), July 26, 2017

  • Author(s): Harrison Mansour, Seaver Thorn, Hani Alshahrani and Huirong Fu

    Title: DDefender: Detecting Malware in Android Applications Based on Their Behaviors

    Location: Mid-Michigan Symposium for Undergraduate Research Experiences (Mid-SURE), July 26, 2017

  • Author(s): Emmanuel Amiewalan, Charlie Dana, Rui Zhu, and Huirong Fu

    Title: Exploiting the Vulnerabilities of Physical-Layer Security with Machine Learning

    Location: Mid-Michigan Symposium for Undergraduate Research Experiences (Mid-SURE), July 26, 2017

2016
  • Author(s): Katherine Schwartz, Eralda Caushaj, and Huirong Fu

    Title: Android Application Permission Manager

    Location: Mid-Michigan Symposium for Undergraduate Research Experiences (Mid-SURE), July 27, 2016

  • Author(s): Ephraim Nielson, Paloma Symmonds, and Mohamed Zohdy

    Title: Application of Unsupervised Clustering for Cross-Site Scripting Anomaly Detection

    Location: Mid-Michigan Symposium for Undergraduate Research Experiences (Mid-SURE), July 27, 2016

  • Author(s): Koby Picker, Christian Maldonado, and Lunjin Lu

    Title: JavaScript String Analysis: Abstract Interpretation with Automata and Widening

    Location: Mid-Michigan Symposium for Undergraduate Research Experiences (Mid-SURE), July 27, 2016

  • Author(s): Gabrielle Beck, Kevin Ponce Garcia, Rui Zhu, and Tao Shu

    Title: Physical Layer Security

    Location: Mid-Michigan Symposium for Undergraduate Research Experiences (Mid-SURE), July 27, 2016

  • Author(s): Anthony Hewins, Maria McCulley, Ali Alshehri and Huirong Fu

    Title: Risks behind Device Information Permissions

    Location: Mid-Michigan Symposium for Undergraduate Research Experiences (Mid-SURE), July 27, 2016

  • Author(s): Alexandra Hanton, Hani Alshahrani, Abdulrahman Alzahrani, and Huirong Fu

    Title: Tracking and Monitoring Data Transmission in the Android Operating System

    Location: Mid-Michigan Symposium for Undergraduate Research Experiences (Mid-SURE), July 27, 2016

2015
  • Author(s): Yang, R.R., Kang, V., Albouq, S. and Zohdy, M.A

    Title: Application of Hybrid Machine Learning to Detect and Remove Malware

    Location: Transactions on Machine Learning and Artificial Intelligence, 3(4), p.16, (2015)

  • Author(s): Richard R. Yang, Victor Kang, Sami Albouq, and Mohamed A. Zohdy

    Title: Application of Data Mining and Machine Learning to Detect and Remove Spyware

    Location: Mid-Michigan Symposium for Undergraduate Research Experiences (Mid-SURE), July 22, 2015

  • Author(s): Andrew Davis, Matthew Wagner, Ahmad Mansour, Richard Bassous, and Huirong

    Title: Multi-Asymmetric Cryptography (MAC) RSA

    Location: Mid-Michigan Symposium for Undergraduate Research Experiences (Mid-SURE), July 22, 2015

  • Author(s): Maegan Dyakiw, Adam Weckle, and Tao Shu

    Title: Multi-Path Routing Methods for Secret Key Establishment in Mobile AdHoc Networks

    Location: Mid-Michigan Symposium for Undergraduate Research Experiences (Mid-SURE), July 22, 2015

  • Author(s): George Corser, Johnathan Cox, Risalatul Hoque, and Huirong Fu

    Title: Privacy, Overhead and Congestion in VaNet Location Based Services

    Location: Mid-Michigan Symposium for Undergraduate Research Experiences (Mid-SURE), July 22, 2015

  • Author(s): Kevin Miller, Yakeen Alwishah, Ahmad Mansour, Richard Bassous, and Huirong Fu

    Title: Securing Safety Messages in Vehicular Ad Hoc Networks

    Location: Mid-Michigan Symposium for Undergraduate Research Experiences (Mid-SURE), July 22, 2015

  • Author(s): Yves Englemann, Serena King, and Lunjin Lu

    Title: String Analysis for JavaScript Programs

    Location: Mid-Michigan Symposium for Undergraduate Research Experiences (Mid-SURE), July 22, 2015

2014
  • Author(s): George Corser, Huirong Fu, Tao Shu, Patrick D’Errico, Warren Ma, Supeng Leng, and Ye Zhu

    Title: Privacy-by-Decoy: Protecting Location Privacy Against Collusion and Deanonymization in Vehicular Location Based Services

    Location: IEEE Intelligent Vehicles Symposium, Dearborn, Michigan, Jun. 2014

  • Author(s): Tao Shu, Yingying Chen, Jie Yang, and Albert Williams

    Title: Multi-lateral privacy-preserving localization in pervasive environments

    Location: IEEE INFOCOM 2014, Toronto, Canada, Apr. 2014

  • Author(s): Eralda Caushaj, I. Ivanov, Huirong Fu, Ishwar Sethi, and Ye Zhu

    Title: BYOD: Security and Privacy Issues in 4 Smartphone Platforms

    Location: American Society for Engineering Education North Central Section Conference, Rochester, Michigan, Apr. 2014

2013
  • Author(s): George Corser, Huirong Fu, Tao Shu, Patrick D’Errico, Warren Ma, Supeng Leng, and Ye Zhu

    Title: Endpoint Protection Zone (EPZ): Protecting LBS User Location Privacy against De-anonymization and Collusion in Vehicular Networks

    Location: IEEE Proceedings of the Second International Conference on Connected Vehicles & Expo., Las Vegas, Nevada, USA, Dec. 2013

  • Author(s): Vishaal Kalwani, Anna Rode, and Mohamed Zohdy

    Title: An Extended Firefly Algorithm

    Location: The CUR Research Experiences for Undergraduates Symposium, Arlington, Virginia, Oct. 2013

  • Author(s): Daniel Liu, Lionel Puengue, and Moh Zohdy

    Title: Modified Self Organizing Feature Maps for Classification of Mathematical Curves

    Location: Int. Journal of Computer and Information Technology, 2013

  • Author(s): Eralda Caushaj, Huirong Fu, Ishwar Sethi, Haissam Badih, Dion Watson, Ye Zhu, and Supeng Leng

    Title: Theoretical Analysis and Experimental Study: Monitoring Data Privacy in Smartphone Communications

    Location: IJITN Special Issue on Network Security, 2013

  • Author(s): Neha Gupta, Greg Johnson, Jared Oluoch, and Huirong Fu

    Title: Classification of Available VANET Trust Models and A Proposed Message Based Approach

    Location: Mid-Michigan Symposium for Undergraduate Research Experiences (Mid-SURE), Jul. 2013

  • Author(s): Lars Kivari, Mathias Masasabi, George Corser, and Huirong Fu

    Title: Threats Associated with Vehicular Ad Hoc Networks (VANETs)

    Location: Mid-Michigan Symposium for Undergraduate Research Experiences (Mid-SURE), Jul. 2013

  • Author(s): Stephen Jarnagin, and Huirong Fu

    Title: Trust Management in Vehicular Ad Hoc Networks

    Location: Mid-Michigan Symposium for Undergraduate Research Experiences (Mid-SURE), Jul. 2013

  • Author(s): Ro Jie Li, Danielle Boileau, Daniela Martignani, Jia Li, and Neelam Tyagi

    Title: Texture Analysis of MRI images for Prostate Tumor Detection

    Location: Mid-Michigan Symposium for Undergraduate Research Experiences (Mid-SURE), Jul. 2013

  • Author(s): Daniel Liu, Lionel Puengue, and Mohamed Zohdy

    Title: Modified Self Organizing Feature Maps for Classification of Mathematical Curves

    Location: Mid-Michigan Symposium for Undergraduate Research Experiences (Mid-SURE), Jul. 2013

2012
  • Author(s): Eralda Caushaj, Huirong Fu, Haissam Baddih, Ye Zhu, and Supeng Leng

    Title: Attacks and Countermeasures in Wireless Cellular Networks

    Location: ACM Proceedings of Information Security Curriculum Development Conference, Atlanta, Georgia, USA, 2012

  • Author(s): Jared Oluoch, Huirong Fu, Astrid Younang, Bao Tri-Tran, Ye Zhu, Supeng Leng, and Stephen Jarnagin

    Title: A Simulation Study of Impacts of Collaborative Worm Hole Attacks In Mobile Ad Hoc Networks (MANETs)

    Location: Information Security Curriculum Development Conference (InfoSec CD’12), Kennesaw, GA, Oct. 2012

2010
  • Author(s): Hang Dok, Ruben Echerravi, and Huirong Fu

    Title: Privacy Issues for Vehicular Ad-Hoc Networks

    Location: International Journal of Future Generation Communication and Networking, Vol.3, No.2, Jun. 2010

2009
  • Author(s): Hang Dok, Ruben Echerravi, and Huirong Fu

    Title: Privacy Issues for Vehicular Ad-Hoc Networks

    Location: International Conference on Future Generation Communication and Networking (FGCN’09), Jeju Island, Korea, Dec. 2009

  • Author(s): Hang Dok, Ruben Echerravi, and Huirong Fu

    Title: Privacy Issues for Vehicular Ad-Hoc Networks

    Location: Poster in the Michigan Celebration of Women in Computing, Apr. 2009

  • Author(s): M. Corrigan, A. Walton, W. Niu, J. Li, T. Talty

    Title: Automatic UWB Clusters Identification

    Location: IEEE Radio and Wireless Symposium, Jan. 2009

2008
  • Author(s): Barr, Jonathan G., Fatma Mili, Laura Pittiglio, and Meghan Harris

    Title: VIMED: Fish-tank Approach to Nurse Practical Training

    Location: IEEE: Computer-Based Medical Systems 21 (2008): 409-14

  • Author(s): Rahat Qureshi, Min K. Chang and Huirong Fu

    Title: Intrusion Detection System for Wireless Sensor Networks

    Location: International Conference on Security and Management (SAM'08), Las Vegas, Nevada, Jul. 2008

  • Author(s): Jonathan Barr, Heather Airaldi, and Fatma Mili

    Title: Nursing Training: 3D Game with Learning Objectives

    Location: International Conference on Advances on Human Computer Interaction, IEEE, Feb. 2008

  • Author(s): Rahat Qureshi, Min K. Chang and Huirong Fu

    Title: Intrusion Detection System for Wireless Sensor Networks

    Location: International Conference on Security and Management (SAM'08), Las Vegas, Nevada, Jul. 2008

2007
  • Author(s): Jason Hemann and Fatma Mili

    Title: YACA: Yet Another Clustering Algorithm

    Location: NCUR Conference, Apr. 2007

  • Author(s): B. Bonvallet, N. Griffin, and J. Li

    Title: A 3D Shape Descriptor: 4D Hyperspherical Harmonics

    Location: IASTED International Conference on Graphics and Visualization in Engineering, Clearwater, Florida, Jan. 2007

2006
  • Author(s): K. Solano, T. Djekovic, and M Zohdy

    Title: Hybrid Neural Net for Immunoinformatics

    Location: Int. Conf. Computational Intelligence, Vienna, Austria, Nov. 2006

  • Author(s): Pham, T., Serafimovska, D., Eljhajj, I., and Harrison, B

    Title: Virtual Nursing Simulator with haptic force-feedback for oral hygiene

    Location: 16th Medical Meets Virtual Reality Conference. Feb. 2006

  • Author(s): Maeghan Gault and Ishwar Sethi

    Title: Adjustable Organization of Data Using Chi-Square Similarity

    Location: National Conference on Undergraduate Research, Asheville, North Carolina, Apr. 2006

2005
  • Author(s): Gorski, J. and I. Elhajj

    Title: Sensor Network Assisted Teleoperation

    Location: IEEE/ASME International Conference on Advanced Intelligent Mechatronics, California, 2005

  • Author(s): Gorski, J. L. Wilson, I. Elhajj, and Jindong Tan

    Title: Data Fusion and Error Reduction Algorithms for Sensor Networks

    Location: IROS 2005, Alberta, Canada, Aug. 2005

  • Author(s): Dykstra, D. and D. Wood

    Title: Specification Generation and Validation for Cognitive Models

    Location: Meeting of the Minds, Michigan Conference for Undergraduate Student Research, Apr. 2005

  • Author(s): Richardson, H. L Macklem, and M Zohdy

    Title: Novel hybrid neural nets for insilico metabolic modeling

    Location: IASTED conference AI, Vienna, Austria, Feb. 2005

  • Author(s): K. Solano, T.Djekovic, M Zohdy

    Title: Hybrid Neural Net for Immunoinformatics

    Location: Int. Conf. Computational Intelligence, Vienna, Nov. 2005

  • Author(s): Thao Nguyen, Iris Bass, Mingkun Li, and Ishwar K. Sethi

    Title: Investigation of Combining SVM and Decision Tree for Emotion Classification

    Location: IEEE Intl. Workshop on Multimedia Information Processing and Retrieval (MIPR), Irvine, California, Dec. 2005

  • Author(s): Denise Dykstra and David Wood

    Title: Specification Generation and Validation for Cognitive Models

    Location: Meeting of the Minds, Michigan Conference for Undergraduate Student Research, Apr. 2005

  • Author(s): Loretta Macklem, Heather Richardson

    Title: Novel hybrid neural nets for insilico metabolic modeling

    Location: Meeting of the Minds, Rochester, MI, May 2005

  • Author(s): Loretta Macklem, Heather Richardson, and Mohammed Zodhy

    Title: Novel hybrid neural nets for insilico metabolic modeling

    Location: IASTED Conference in AI, Vienna, Austria, Feb. 2005

  • Author(s): Jason Gorski, Lela Wilson, Imad Elhajj, and Jindong Tan

    Title: Data Fusion and Error Reduction Algorithms for Sensor Networks

    Location: IROS 2005, Alberta, Canada, Aug. 2005

  • Author(s): Jason Gorski and Imad Elhajj

    Title: Sensor Network Assisted Teleoperation

    Location: IEEE/ASME International Conference on Advanced Intelligent Mechatronics, California, 2005

2004
  • Author(s): Mukhopadhyay, R. A.Ma, and I.Sethi

    Title: Pathfinder Networks for Content Based Image Retrieval Based On Automated Shape Feature Discovery

    Location: Sixth IEEE International Symposium on Multimedia Software Engineering (ISMSE 2004)

  • Author(s): Robert R Presnell, Vikram Chilukoti, and Jia Li

    Title: Anatomical structure classification using histogram of surface normals

    Location: Joint Meeting of the Fifteenth Annual Argonne Symposium for Undergraduates in Science, Engineering, and Mathematics, Chicago, Illinois, Nov. 2004

  • Author(s): Rishi Mukhopadhyay, Aiyesha Ma, and Ishwar K. Sethi

    Title: Pathfinder networks for content based image retrieval based on automated shape feature discovery

    Location: Sixth IEEE International Symposium on Multimedia Software Engineering (ISMSE 2004), Florida, Dec. 2004

2003
  • Author(s): Ma, A., R.Mukhopadhyay, and I.Sethi

    Title: Vector Quantization of Binary Images for Pattern Analysis

    Location: Information and Knowledge Engineering, Los Vegas, NV Jul. 2003

  • Author(s): Gillian, J. C. Zieminski, P. Corcoran

    Title: Patterns and Conflicts for the Verification of Cognitive Models

    Location: Sigma Xi, Annual Meeting and Student Research Conference, Los Angeles, California, Nov. 2003

  • Author(s): Patel, A. T. Terry and H. Abdel-Aty-Zohdy

    Title: Analog Multiplexing in Time Domain Biochemiccal Measurements Processing

    Location: IEEE MidWest Symposium on Circuits and Systems, 2002

  • Author(s): Paul Corcoran, Gillian Gilmer, Caroline Ziemkiewicz, and Fatma Mili

    Title: Cognitive model validation

    Location: Sigma Xi Student Research Conference, Nov. 2003

  • Author(s): Dan Steffy, Stacy Balamucki, and Debatosh Debnath

    Title: Symmetry Detection in Boolean functions using SAT solvers

    Location: Annual Michigan Space Grant Consortium Conference, Ann Arbor, MI, Oct. 2003

  • Author(s): Dan Steffy, Stacy Balamucki, and Debatosh Debnath

    Title: Symmetry detection in boolean functions

    Location: The Sixth Annual Michigan Undergraduate Mathematics Conference, Grand Rapids, MI, Oct. 2003

  • Author(s): Aiyesha Ma, Rishi Mukhopadhyay, and Ishwar K. Sethi

    Title: Hausdorff Metric Based Vector Quantization of Binary Images

    Location: Intl. Conf. on Information and Knowledge Engineering, Los Vegas, Nevada, Jul. 2003

  • Author(s): Konja, P. N. Herlhan

    Title: Impact of Stress on Safety Critical Decisions

    Location: Meeting of the Minds, Michigan Conference on Undergraduate Research, 2003

  • Author(s): Nicholas Herilan, Priscilla Konja, and Fatma Mili

    Title: Impact of stress on safety-critical decisions

    Location: 11th Annual Meeting of Minds Symposium, Volume 6, Michigan, May 2003

2002
  • Author(s): Apurva Patel, Tara Terry, and Hoda S. Abdel-Aty-Zohdy

    Title: Analog multiplexing in time domain for biochemical measurement processing

    Location: The 45th Midwest Symposium on Circuits and Systems (MWSCAS-2002), Volume 1, Aug. 2002