Publications
2017
-
Author(s):
Hani Alshahrani, Harrison M Mansour, Seaver Thorn, Ali Alshehri, Abdulrahman Alzahrani, Huirong Fu
Title:
DDefender: Android Application Threat Detection Using Static and Dynamic Analysis
Location:
2018 IEEE International Conference on Consumer Electronics (ICCE), Las Vegas, NV (Best Poster Award)
-
Author(s):
Ahmad Mansour, Andrew Davis, Matthew Wagner, Richard Bassous, Huirong Fu, and Ye Zhu
Title:
Multi-asymmetric cryptographic RSA scheme
Location:
In Proceedings of the 12th Annual Conference on Cyber and Information Security Research (2017), ACM. Oak Ridge, TN. (Best Full Paper Award)
-
Author(s):
George P. Corser, Abdelnasser Banihani, Johnathan Cox, Risalatul Hoque, Huirong Fu, and Ye Zhu
Title:
Web Application Security Tools Analysis
Location:
The 2nd IEEE International Conference on Intelligent Data and Security (IEEE IDS 2017). Beijing, China
-
Author(s):
Ali Alshehri, Anthony Hewins, Maria McCulley, Hani Alshahrani, Huirong Fu and Ye Zhu
Title:
Risks behind Device Information Permissions in Android OS
Location:
Communications and Network vol. 9, no. 04, pp.219-234, (2017) DOI: 10.4236/cn.2017.94016
-
Author(s):
Hani Alshahrani, Abdulrahman Alzahrani, Alexandra Hanton, Ali Alshehri, Huirong Fu and Ye Zhu
Title:
DroidData: Tracking and Monitoring Data Transmission in the Android Operating System
Location:
Communications and Network vol. 9, no. 03, pp.192-206, (2017) DOI: 10.4236/cn.2017.93014
-
Author(s):
Symmonds, Paloma, Ali Alharbi, Ephraim Nielson, and Abdulaziz Alshammari
Title:
Application of Unsupervised Learning for Detection Cross-site Scripting (XSS) Security Breaches
Location:
International Journal of Computer and Information Technology 6, no. 6 (2017): 2279-0764.
-
Author(s):
Miguel Millan, Andrew DeJonge, Abdulaziz Alshammari, Ali Alharbi and Mohamed Zohdy
Title:
Application of extended Hidden Markov Model (HMM) to detect IoT threats
Location:
Mid-Michigan Symposium for Undergraduate Research Experiences (Mid-SURE), July 26, 2017
-
Author(s):
Cameron Chambers, Charlie Wingate, Nabil Almashfi, Lunjin Lu
Title:
Code Smell Detection for JavaScript applications
Location:
Mid-Michigan Symposium for Undergraduate Research Experiences (Mid-SURE), July 26, 2017
-
Author(s):
Melissa Nichols, Nathan Torrez, and Anyi Liu
Title:
Constructing Virtual Laboratory for Research and Education
Location:
Mid-Michigan Symposium for Undergraduate Research Experiences (Mid-SURE), July 26, 2017
-
Author(s):
Harrison Mansour, Seaver Thorn, Hani Alshahrani and Huirong Fu
Title:
DDefender: Detecting Malware in Android Applications Based on Their Behaviors
Location:
Mid-Michigan Symposium for Undergraduate Research Experiences (Mid-SURE), July 26, 2017
-
Author(s):
Emmanuel Amiewalan, Charlie Dana, Rui Zhu, and Huirong Fu
Title:
Exploiting the Vulnerabilities of Physical-Layer Security with Machine Learning
Location:
Mid-Michigan Symposium for Undergraduate Research Experiences (Mid-SURE), July 26, 2017
2016
-
Author(s):
Katherine Schwartz, Eralda Caushaj, and Huirong Fu
Title:
Android Application Permission Manager
Location:
Mid-Michigan Symposium for Undergraduate Research Experiences (Mid-SURE), July 27, 2016
-
Author(s):
Ephraim Nielson, Paloma Symmonds, and Mohamed Zohdy
Title:
Application of Unsupervised Clustering for Cross-Site Scripting Anomaly Detection
Location:
Mid-Michigan Symposium for Undergraduate Research Experiences (Mid-SURE), July 27, 2016
-
Author(s):
Koby Picker, Christian Maldonado, and Lunjin Lu
Title:
JavaScript String Analysis: Abstract Interpretation with Automata and Widening
Location:
Mid-Michigan Symposium for Undergraduate Research Experiences (Mid-SURE), July 27, 2016
-
Author(s):
Gabrielle Beck, Kevin Ponce Garcia, Rui Zhu, and Tao Shu
Title:
Physical Layer Security
Location:
Mid-Michigan Symposium for Undergraduate Research Experiences (Mid-SURE), July 27, 2016
-
Author(s):
Anthony Hewins, Maria McCulley, Ali Alshehri and Huirong Fu
Title:
Risks behind Device Information Permissions
Location:
Mid-Michigan Symposium for Undergraduate Research Experiences (Mid-SURE), July 27, 2016
-
Author(s):
Alexandra Hanton, Hani Alshahrani, Abdulrahman Alzahrani, and Huirong Fu
Title:
Tracking and Monitoring Data Transmission in the Android Operating System
Location:
Mid-Michigan Symposium for Undergraduate Research Experiences (Mid-SURE), July 27, 2016
2015
-
Author(s):
Yang, R.R., Kang, V., Albouq, S. and Zohdy, M.A
Title:
Application of Hybrid Machine Learning to Detect and Remove Malware
Location:
Transactions on Machine Learning and Artificial Intelligence, 3(4), p.16, (2015)
-
Author(s):
Richard R. Yang, Victor Kang, Sami Albouq, and Mohamed A. Zohdy
Title:
Application of Data Mining and Machine Learning to Detect and Remove Spyware
Location:
Mid-Michigan Symposium for Undergraduate Research Experiences (Mid-SURE), July 22, 2015
-
Author(s):
Andrew Davis, Matthew Wagner, Ahmad Mansour, Richard Bassous, and Huirong
Title:
Multi-Asymmetric Cryptography (MAC) RSA
Location:
Mid-Michigan Symposium for Undergraduate Research Experiences (Mid-SURE), July 22, 2015
-
Author(s):
Maegan Dyakiw, Adam Weckle, and Tao Shu
Title:
Multi-Path Routing Methods for Secret Key Establishment in Mobile AdHoc Networks
Location:
Mid-Michigan Symposium for Undergraduate Research Experiences (Mid-SURE), July 22, 2015
-
Author(s):
George Corser, Johnathan Cox, Risalatul Hoque, and Huirong Fu
Title:
Privacy, Overhead and Congestion in VaNet Location Based Services
Location:
Mid-Michigan Symposium for Undergraduate Research Experiences (Mid-SURE), July 22, 2015
-
Author(s):
Kevin Miller, Yakeen Alwishah, Ahmad Mansour, Richard Bassous, and Huirong Fu
Title:
Securing Safety Messages in Vehicular Ad Hoc Networks
Location:
Mid-Michigan Symposium for Undergraduate Research Experiences (Mid-SURE), July 22, 2015
-
Author(s):
Yves Englemann, Serena King, and Lunjin Lu
Title:
String Analysis for JavaScript Programs
Location:
Mid-Michigan Symposium for Undergraduate Research Experiences (Mid-SURE), July 22, 2015
2014
-
Author(s):
George Corser, Huirong Fu, Tao Shu, Patrick D’Errico, Warren Ma, Supeng Leng, and Ye Zhu
Title:
Privacy-by-Decoy: Protecting Location Privacy Against Collusion and Deanonymization in Vehicular Location Based Services
Location:
IEEE Intelligent Vehicles Symposium, Dearborn, Michigan, Jun. 2014
-
Author(s):
Tao Shu, Yingying Chen, Jie Yang, and Albert Williams
Title:
Multi-lateral privacy-preserving localization in
pervasive environments
Location:
IEEE INFOCOM 2014, Toronto, Canada, Apr. 2014
-
Author(s):
Eralda Caushaj, I. Ivanov, Huirong Fu, Ishwar Sethi, and Ye Zhu
Title:
BYOD: Security and Privacy Issues in 4 Smartphone Platforms
Location:
American Society for Engineering Education North Central Section Conference, Rochester, Michigan, Apr. 2014
2013
-
Author(s):
George Corser, Huirong Fu, Tao Shu, Patrick D’Errico, Warren Ma, Supeng Leng, and Ye Zhu
Title:
Endpoint Protection Zone (EPZ): Protecting LBS User Location Privacy against De-anonymization and Collusion in Vehicular Networks
Location:
IEEE Proceedings of the Second International Conference on Connected Vehicles & Expo., Las Vegas, Nevada, USA, Dec. 2013
-
Author(s):
Vishaal Kalwani, Anna Rode, and Mohamed Zohdy
Title:
An Extended Firefly Algorithm
Location:
The CUR Research Experiences for Undergraduates Symposium, Arlington, Virginia, Oct. 2013
-
Author(s): Daniel Liu, Lionel Puengue, and Moh Zohdy
Title: Modified Self Organizing Feature Maps for Classification of Mathematical Curves
Location: Int. Journal of Computer and Information Technology, 2013
-
Author(s): Eralda Caushaj, Huirong Fu, Ishwar Sethi, Haissam Badih, Dion Watson, Ye Zhu, and Supeng Leng
Title: Theoretical Analysis and Experimental Study: Monitoring Data Privacy in Smartphone Communications
Location: IJITN Special Issue on Network Security, 2013
-
Author(s): Neha Gupta, Greg Johnson, Jared Oluoch, and Huirong Fu
Title: Classification of Available VANET Trust Models and A Proposed Message Based Approach
Location: Mid-Michigan Symposium for Undergraduate Research Experiences (Mid-SURE), Jul. 2013
-
Author(s): Lars Kivari, Mathias Masasabi, George Corser, and Huirong Fu
Title: Threats Associated with Vehicular Ad Hoc Networks (VANETs)
Location: Mid-Michigan Symposium for Undergraduate Research Experiences (Mid-SURE), Jul. 2013
-
Author(s): Stephen Jarnagin, and Huirong Fu
Title: Trust Management in Vehicular Ad Hoc Networks
Location: Mid-Michigan Symposium for Undergraduate Research Experiences (Mid-SURE), Jul. 2013
-
Author(s): Ro Jie Li, Danielle Boileau, Daniela Martignani, Jia Li, and Neelam Tyagi
Title: Texture Analysis of MRI images for Prostate Tumor Detection
Location: Mid-Michigan Symposium for Undergraduate Research Experiences (Mid-SURE), Jul. 2013
-
Author(s): Daniel Liu, Lionel Puengue, and Mohamed Zohdy
Title: Modified Self Organizing Feature Maps for Classification of Mathematical Curves
Location: Mid-Michigan Symposium for Undergraduate Research Experiences (Mid-SURE), Jul. 2013
2012
-
Author(s):
Eralda Caushaj, Huirong Fu, Haissam Baddih, Ye Zhu, and Supeng Leng
Title:
Attacks and Countermeasures in Wireless Cellular Networks
Location:
ACM Proceedings of Information Security Curriculum Development Conference, Atlanta, Georgia, USA, 2012
-
Author(s): Jared Oluoch, Huirong Fu, Astrid Younang, Bao Tri-Tran, Ye Zhu, Supeng Leng, and Stephen Jarnagin
Title: A Simulation Study of Impacts of Collaborative Worm Hole Attacks In Mobile Ad Hoc Networks (MANETs)
Location: Information Security Curriculum Development Conference (InfoSec CD’12), Kennesaw, GA, Oct. 2012
2010
-
Author(s): Hang Dok, Ruben Echerravi, and Huirong Fu
Title: Privacy Issues for Vehicular Ad-Hoc Networks
Location: International Journal of Future Generation Communication and Networking, Vol.3, No.2, Jun. 2010
2009
-
Author(s): Hang Dok, Ruben Echerravi, and Huirong Fu
Title: Privacy Issues for Vehicular Ad-Hoc Networks
Location: International Conference on Future Generation Communication and Networking (FGCN’09), Jeju Island, Korea, Dec. 2009
-
Author(s): Hang Dok, Ruben Echerravi, and Huirong Fu
Title: Privacy Issues for Vehicular Ad-Hoc Networks
Location: Poster in the Michigan Celebration of Women in Computing, Apr. 2009
-
Author(s): M. Corrigan, A. Walton, W. Niu, J. Li, T. Talty
Title: Automatic UWB Clusters Identification
Location: IEEE Radio and Wireless Symposium, Jan. 2009
2008
-
Author(s): Barr, Jonathan G., Fatma Mili, Laura Pittiglio, and Meghan Harris
Title: VIMED: Fish-tank Approach to Nurse Practical Training
Location: IEEE: Computer-Based Medical Systems 21 (2008): 409-14
-
Author(s): Rahat Qureshi, Min K. Chang and Huirong Fu
Title: Intrusion Detection System for Wireless Sensor Networks
Location: International Conference on Security and Management (SAM'08), Las Vegas, Nevada, Jul. 2008
-
Author(s): Jonathan Barr, Heather Airaldi, and Fatma Mili
Title: Nursing Training: 3D Game with Learning Objectives
Location: International Conference on Advances on Human Computer Interaction, IEEE, Feb. 2008
-
Author(s): Rahat Qureshi, Min K. Chang and Huirong Fu
Title: Intrusion Detection System for Wireless Sensor Networks
Location: International Conference on Security and Management (SAM'08), Las Vegas, Nevada, Jul. 2008
2007
-
Author(s): Jason Hemann and Fatma Mili
Title: YACA: Yet Another Clustering Algorithm
Location: NCUR Conference, Apr. 2007
-
Author(s): B. Bonvallet, N. Griffin, and J. Li
Title: A 3D Shape Descriptor: 4D Hyperspherical Harmonics
Location: IASTED International Conference on Graphics and Visualization in Engineering, Clearwater, Florida, Jan. 2007
2006
-
Author(s): K. Solano, T. Djekovic, and M Zohdy
Title: Hybrid Neural Net for Immunoinformatics
Location: Int. Conf. Computational Intelligence, Vienna, Austria, Nov. 2006
-
Author(s): Pham, T., Serafimovska, D., Eljhajj, I., and Harrison, B
Title: Virtual Nursing Simulator with haptic force-feedback for oral hygiene
Location: 16th Medical Meets Virtual Reality Conference. Feb. 2006
-
Author(s): Maeghan Gault and Ishwar Sethi
Title: Adjustable Organization of Data Using Chi-Square Similarity
Location: National Conference on Undergraduate Research, Asheville, North Carolina, Apr. 2006
2005
-
Author(s): Gorski, J. and I. Elhajj
Title: Sensor Network Assisted Teleoperation
Location: IEEE/ASME International Conference on Advanced Intelligent Mechatronics, California, 2005
-
Author(s): Gorski, J. L. Wilson, I. Elhajj, and Jindong Tan
Title: Data Fusion and Error Reduction Algorithms for Sensor Networks
Location: IROS 2005, Alberta, Canada, Aug. 2005
-
Author(s): Dykstra, D. and D. Wood
Title: Specification Generation and Validation for Cognitive Models
Location: Meeting of the Minds, Michigan Conference for Undergraduate Student Research, Apr. 2005
-
Author(s): Richardson, H. L Macklem, and M Zohdy
Title: Novel hybrid neural nets for insilico metabolic modeling
Location: IASTED conference AI, Vienna, Austria, Feb. 2005
-
Author(s): K. Solano, T.Djekovic, M Zohdy
Title: Hybrid Neural Net for Immunoinformatics
Location: Int. Conf. Computational Intelligence, Vienna, Nov. 2005
-
Author(s): Thao Nguyen, Iris Bass, Mingkun Li, and Ishwar K. Sethi
Title: Investigation of Combining SVM and Decision Tree for Emotion Classification
Location: IEEE Intl. Workshop on Multimedia Information Processing and Retrieval (MIPR), Irvine, California, Dec. 2005
-
Author(s): Denise Dykstra and David Wood
Title: Specification Generation and Validation for Cognitive Models
Location: Meeting of the Minds, Michigan Conference for Undergraduate Student Research, Apr. 2005
-
Author(s): Loretta Macklem, Heather Richardson
Title: Novel hybrid neural nets for insilico metabolic modeling
Location: Meeting of the Minds, Rochester, MI, May 2005
-
Author(s): Loretta Macklem, Heather Richardson, and Mohammed Zodhy
Title: Novel hybrid neural nets for insilico metabolic modeling
Location: IASTED Conference in AI, Vienna, Austria, Feb. 2005
-
Author(s): Jason Gorski, Lela Wilson, Imad Elhajj, and Jindong Tan
Title: Data Fusion and Error Reduction Algorithms for Sensor Networks
Location: IROS 2005, Alberta, Canada, Aug. 2005
-
Author(s): Jason Gorski and Imad Elhajj
Title: Sensor Network Assisted Teleoperation
Location: IEEE/ASME International Conference on Advanced Intelligent Mechatronics, California, 2005
2004
-
Author(s): Mukhopadhyay, R. A.Ma, and I.Sethi
Title: Pathfinder Networks for Content Based Image Retrieval Based On Automated Shape Feature Discovery
Location: Sixth IEEE International Symposium on Multimedia Software Engineering (ISMSE 2004)
-
Author(s): Robert R Presnell, Vikram Chilukoti, and Jia Li
Title: Anatomical structure classification using histogram of surface normals
Location: Joint Meeting of the Fifteenth Annual Argonne Symposium for Undergraduates in Science, Engineering, and Mathematics, Chicago, Illinois, Nov. 2004
-
Author(s): Rishi Mukhopadhyay, Aiyesha Ma, and Ishwar K. Sethi
Title: Pathfinder networks for content based image retrieval based on automated shape feature discovery
Location: Sixth IEEE International Symposium on Multimedia Software Engineering (ISMSE 2004), Florida, Dec. 2004
2003
-
Author(s): Ma, A., R.Mukhopadhyay, and I.Sethi
Title: Vector Quantization of Binary Images for Pattern Analysis
Location: Information and Knowledge Engineering, Los Vegas, NV Jul. 2003
-
Author(s): Gillian, J. C. Zieminski, P. Corcoran
Title: Patterns and Conflicts for the Verification of Cognitive Models
Location: Sigma Xi, Annual Meeting and Student Research Conference, Los Angeles, California, Nov. 2003
-
Author(s): Patel, A. T. Terry and H. Abdel-Aty-Zohdy
Title: Analog Multiplexing in Time Domain Biochemiccal Measurements Processing
Location: IEEE MidWest Symposium on Circuits and Systems, 2002
-
Author(s): Paul Corcoran, Gillian Gilmer, Caroline Ziemkiewicz, and Fatma Mili
Title: Cognitive model validation
Location: Sigma Xi Student Research Conference, Nov. 2003
-
Author(s): Dan Steffy, Stacy Balamucki, and Debatosh Debnath
Title: Symmetry Detection in Boolean functions using SAT solvers
Location: Annual Michigan Space Grant Consortium Conference, Ann Arbor, MI, Oct. 2003
-
Author(s): Dan Steffy, Stacy Balamucki, and Debatosh Debnath
Title: Symmetry detection in boolean functions
Location: The Sixth Annual Michigan Undergraduate Mathematics Conference, Grand Rapids, MI, Oct. 2003
-
Author(s): Aiyesha Ma, Rishi Mukhopadhyay, and Ishwar K. Sethi
Title: Hausdorff Metric Based Vector Quantization of Binary Images
Location: Intl. Conf. on Information and Knowledge Engineering, Los Vegas, Nevada, Jul. 2003
-
Author(s): Konja, P. N. Herlhan
Title: Impact of Stress on Safety Critical Decisions
Location: Meeting of the Minds, Michigan Conference on Undergraduate Research, 2003
-
Author(s): Nicholas Herilan, Priscilla Konja, and Fatma Mili
Title: Impact of stress on safety-critical decisions
Location: 11th Annual Meeting of Minds Symposium, Volume 6, Michigan, May 2003
2002
-
Author(s): Apurva Patel, Tara Terry, and Hoda S. Abdel-Aty-Zohdy
Title: Analog multiplexing in time domain for biochemical measurement processing
Location: The 45th Midwest Symposium on Circuits and Systems (MWSCAS-2002), Volume 1, Aug. 2002