This work is licensed under the Creative Commons Attribution 4.0 International License.
Abbasi R., Bashir A.K., Mateen A., Amin F., Ge Y., Omar M., Efficient security and privacy of lossless secure communication for sensor-based urban cities, IEEE Sensors Journal, DOI: 10.1109/JSEN.2023.3305716, 2024.AbbasiR.BashirA.K.MateenA.AminF.GeY.OmarM.Efficient security and privacy of lossless secure communication for sensor-based urban citiesIEEE Sensors Journal10.1109/JSEN.2023.33057162024Open DOISearch in Google Scholar
Kinoon M.A., Omar M., Mohaisen M., Mohaisen D., Security breaches in the healthcare domain: a spatiotemporal analysis, Computational Data and Social Networks: 10th International Conference, CSoNet 2021, Virtual Event, 15–17 November 2021, 171–183, 2021.KinoonM.A.OmarM.MohaisenM.MohaisenD.Security breaches in the healthcare domain: a spatiotemporal analysisComputational Data and Social Networks: 10th International Conference, CSoNet 2021, Virtual Event15–17 November 20211711832021Search in Google Scholar
Alharbi A.R., Hijji M., Aljaedi A., Enhancing topic clustering for Arabic security news based on k-means and topic modelling, IET Networks, 10(6), 278–294, 2021.AlharbiA.R.HijjiM.AljaediA.Enhancing topic clustering for Arabic security news based on k-means and topic modellingIET Networks1062782942021Search in Google Scholar
Aluru S.S., Mathew B., Saha P., Mukherjee A., Deep learning models for multilingual hate speech detection, arXiv:2004.06465, 2020.AluruS.S.MathewB.SahaP.MukherjeeA.Deep learning models for multilingual hate speech detectionarXiv:2004.06465,2020Search in Google Scholar
Beyer L., Zhai X., Royer A., Markeeva L., Anil R., Kolesnikov A., Knowledge distillation: a good teacher is patient and consistent, 2022 IEEE/CVF Conference on Computer Vision and Pattern Recognition, 18–24 June 2022, New Orleans, Los Angeles, USA, 10925–10934, 2022.BeyerL.ZhaiX.RoyerA.MarkeevaL.AnilR.KolesnikovA.Knowledge distillation: a good teacher is patient and consistent2022 IEEE/CVF Conference on Computer Vision and Pattern Recognition18–24 June 2022New Orleans, Los Angeles, USA10925109342022Search in Google Scholar
Chakraborty S., Krishna R., Ding Y., Ray B., Deep learning based vulnerability detection: Are we there yet?, IEEE Transactions on Software Engineering, 48(9), 3280–3296, 2021.ChakrabortyS.KrishnaR.DingY.RayB.Deep learning based vulnerability detection: Are we there yet?IEEE Transactions on Software Engineering489328032962021Search in Google Scholar
Cheng X., Wang H., Hua J., Xu G., Sui Y., DeepWukong: statically detecting software vulnerabilities using deep graph neural network, ACM Transactions on Software Engineering and Methodology, 30(3), 1–33, 2021.ChengX.WangH.HuaJ.XuG.SuiY.DeepWukong: statically detecting software vulnerabilities using deep graph neural networkACM Transactions on Software Engineering and Methodology3031332021Search in Google Scholar
Furlanello T., Lipton Z., Tschannen M., Itti L., Anandkumar A., Born again neural networks, International Conference on Machine Learning, PLMR, 1607–1616, 2018.FurlanelloT.LiptonZ.TschannenM.IttiL.AnandkumarA.Born again neural networksInternational Conference on Machine Learning, PLMR160716162018Search in Google Scholar
Gholami S., Omar M., Can a student large language model perform as well as it’s teacher?, arXiv:2310.02421, 2023.GholamiS.OmarM.Can a student large language model perform as well as it’s teacher?arXiv:2310.02421,2023Search in Google Scholar
Gholami S., Omar M., Do generative large language models need billions of parameters?, arXiv:2309.06589, 2023.GholamiS.OmarM.Do generative large language models need billions of parameters?arXiv:2309.06589,2023Search in Google Scholar
Hanif H., Maffeis S., VulBERTa: simplified source code pre-training for vulnerability detection, 2022 International Joint Conference on Neural Networks, 18–23 July 2022, Padua, Italy, 1–8, 2022.HanifH.MaffeisS.VulBERTa: simplified source code pre-training for vulnerability detection2022 International Joint Conference on Neural Networks18–23 July 2022Padua, Italy182022Search in Google Scholar
Kim S., Woo S., Lee H., Oh H., VUDDY: a scalable approach for vulnerable code clone discovery, 2017 IEEE Symposium on Security and Privacy, IEEE, 22–26 May 2017, San Jose, California, USA, 595–614, 2017.KimS.WooS.LeeH.OhH.VUDDY: a scalable approach for vulnerable code clone discovery2017 IEEE Symposium on Security and Privacy, IEEE22–26 May 2017San Jose, California, USA5956142017Search in Google Scholar
Kim S., Choi J., Ahmed M.E., Nepal S., Kim H., VulDeBERT: a vulnerability detection system using BERT, 2022 International Symposium on Software Reliability Engineering Workshops, IEEE, 31 October 3 November 2022, Charlotte, New York, USA, 69–74, 2022.KimS.ChoiJ.AhmedM.E.NepalS.KimH.VulDeBERT: a vulnerability detection system using BERT2022 International Symposium on Software Reliability Engineering Workshops, IEEE31 October 3 November 2022Charlotte, New York, USA69742022Search in Google Scholar
Li Z., Zou D., Xu S., Jin H., Qi H., Hu J., VulPecker: an automated vulnerability detection system based on code similarity analysis, Proceedings of the 32nd Annual Conference on Computer Security Applications, Association for Computing Machinery New York USA, 5–8 December 2016, Los Angeles, California, USA, 201–213, 2016.LiZ.ZouD.XuS.JinH.QiH.HuJ.VulPecker: an automated vulnerability detection system based on code similarity analysisProceedings of the 32nd Annual Conference on Computer Security Applications, Association for Computing Machinery New York USA5–8 December 2016Los Angeles, California, USA2012132016Search in Google Scholar
Omar M., Application of machine learning (ML) to address cybersecurity threats, In Machine Learning for Cybersecurity: Innovative Deep Learning Solutions, Springer, 1–11, 2022.OmarM.Application of machine learning (ML) to address cybersecurity threatsIn Machine Learning for Cybersecurity: Innovative Deep Learning SolutionsSpringer1112022Search in Google Scholar
Omar M., Machine Learning for Cybersecurity: Innovative Deep Learning Solutions, Springer, 2022.OmarM.Machine Learning for Cybersecurity: Innovative Deep Learning SolutionsSpringer2022Search in Google Scholar
Omar M., Machine Learning for Cybersecurity: Innovative Deep Learning Solutions (Chapter: Malware anomaly detection using local outlier factor technique), Springer, 2022.OmarM.Machine Learning for Cybersecurity: Innovative Deep Learning Solutions (Chapter: Malware anomaly detection using local outlier factor technique)Springer2022Search in Google Scholar
Omar M., Backdoor learning for NLP: recent advances, challenges, and future research directions, arXiv:2302.06801, 2023.OmarM.Backdoor learning for NLP: recent advances, challenges, and future research directionsarXiv:2302.06801,2023Search in Google Scholar
Omar M., VulDefend: a novel technique based on pattern exploiting training for detecting software vulnerabilities using language models, 2023 IEEE Jordan International Joint Conference on Electrical Engineering and Information Technology, IEEE, 22–24 May 2023, Amman, Jordan, 287–293, 2023.OmarM.VulDefend: a novel technique based on pattern exploiting training for detecting software vulnerabilities using language models2023 IEEE Jordan International Joint Conference on Electrical Engineering and Information Technology, IEEE22–24 May 2023Amman, Jordan2872932023Search in Google Scholar
Omar M., Burrell D., From text to threats: a language model approach to software vulnerability detection, International Journal of Mathematics and Computer in Engineering, 2(1), 23–34, 2024.OmarM.BurrellD.From text to threats: a language model approach to software vulnerability detectionInternational Journal of Mathematics and Computer in Engineering2123342024Search in Google Scholar
Omar M., Choi S., Nyang D., Mohaisen D., Quantifying the performance of adversarial training on language models with distribution shifts, Proceedings of the 1st Workshop on Cybersecurity and Social Sciences, 30 May 2022, Nagasaki Japan, 3–9, 2022.OmarM.ChoiS.NyangD.MohaisenD.Quantifying the performance of adversarial training on language models with distribution shiftsProceedings of the 1st Workshop on Cybersecurity and Social Sciences30 May 2022Nagasaki Japan392022Search in Google Scholar
Omar M., Choi S., Nyang D., Mohaisen D., Robust natural language processing: recent advances, challenges, and future directions, arXiv:2201.00768, 2022.OmarM.ChoiS.NyangD.MohaisenD.Robust natural language processing: recent advances, challenges, and future directionsarXiv:2201.00768,2022Search in Google Scholar
Omar M., Jones R., Burrell D.N., Dawson M., Nobles C., Mohammed M., Bashir A.K., Harnessing the power and simplicity of decision trees to detect IoT Malware, Transformational Interventions for Business Technology and Healthcare, 215–229, 2023.OmarM.JonesR.BurrellD.N.DawsonM.NoblesC.MohammedM.BashirA.K.Harnessing the power and simplicity of decision trees to detect IoT MalwareTransformational Interventions for Business Technology and Healthcare2152292023Search in Google Scholar
Omar M., Mohaisen D., Making adversarially-trained language models forget with model retraining: a case study on hate speech detection, Companion Proceedings of the Web Conference 2022, Virtual Event, 25–29 April 2022, Lyon, France, 887–893, 2022.OmarM.MohaisenD.Making adversarially-trained language models forget with model retraining: a case study on hate speech detectionCompanion Proceedings of the Web Conference 2022, Virtual Event25–29 April 2022Lyon, France8878932022Search in Google Scholar
Rabheru R., Hanif H., Maffeis S., DeepTective: detection of PHP vulnerabilities using hybrid graph neural networks, Proceedings of the 36th Annual ACM Symposium on Applied Computing, Virtual Event, Republic of Korea, 22–26 March 2021, 1687–1690, 2021.RabheruR.HanifH.MaffeisS.DeepTective: detection of PHP vulnerabilities using hybrid graph neural networksProceedings of the 36th Annual ACM Symposium on Applied Computing, Virtual EvenRepublic of Korea22–26 March 2021168716902021Search in Google Scholar
Radford A., Wu J., Child R., Luan D., Amodei D., Sutskever I., Language models are unsupervised multitask learners, OpenAI Blog, 1(8), 9, 2019.RadfordA.WuJ.ChildR.LuanD.AmodeiD.SutskeverI.Language models are unsupervised multitask learnersOpenAI Blog1892019Search in Google Scholar
Russell R., Kim L., Hamilton L., Lazovich T., Harer J., Ozdemir O., Ellingwood P., McConley M., Automated vulnerability detection in source code using deep representation learning, 2018 17th IEEE international conference on machine learning and applications, IEEE, 17–20 December 2018, Orlando, Florida, USA, 757–762, 2018.RussellR.KimL.HamiltonL.LazovichT.HarerJ.OzdemirO.EllingwoodP.McConleyM.Automated vulnerability detection in source code using deep representation learning2018 17th IEEE international conference on machine learning and applications, IEEE17–20 December 2018Orlando, Florida, USA7577622018Search in Google Scholar
Saleem M.A., Li X., Mahmood K., Shamshad S., Ayub M.F., Bashir A.K., Omar M., Provably secure conditional-privacy access control protocol for intelligent customers-centric communication in VANET, IEEE Transactions on Consumer Electronics, 2023.SaleemM.A.LiX.MahmoodK.ShamshadS.AyubM.F.BashirA.K.OmarM.Provably secure conditional-privacy access control protocol for intelligent customers-centric communication in VANETIEEE Transactions on Consumer Electronics2023Search in Google Scholar
Salimi S., Kharrazi M., VulSlicer: vulnerability detection through code slicing, Journal of Systems and Software, 193, 111450, 2022.SalimiS.KharraziM.VulSlicer: vulnerability detection through code slicingJournal of Systems and Software1931114502022Search in Google Scholar
Shoeybi M., Patwary M., Puri R., LeGresley P., Casper J., Catanzaro B., Megatron-LM: training multi-billion parameter language models using model parallelism, arXiv:1909.08053, 2019.ShoeybiM.PatwaryM.PuriR.LeGresleyP.CasperJ.CatanzaroB.Megatron-LM: training multi-billion parameter language models using model parallelismarXiv:1909.08053,2019Search in Google Scholar
Yamaguchi F., Golde N., Arp D., Rieck K., Modeling and discovering vulnerabilities with code property graphs, 2014 IEEE Symposium on Security and Privacy, 590–604, 2014.YamaguchiF.GoldeN.ArpD.RieckK.Modeling and discovering vulnerabilities with code property graphs2014 IEEE Symposium on Security and Privacy5906042014Search in Google Scholar
Yan R., Xiao X., Hu G., Peng S., Jiang Y., New deep learning method to detect code injection attacks on hybrid applications, Journal of Systems and Software, 137, 67–77, 2018.YanR.XiaoX.HuG.PengS.JiangY.New deep learning method to detect code injection attacks on hybrid applicationsJournal of Systems and Software13767772018Search in Google Scholar
Zheng Y., Pujar S., Lewis B., Buratti L., Epstein E., Yang B., Laredo J., Morari A., Su Z., D2A: a dataset built for AI-based vulnerability detection methods using differential analysis, 2021 IEEE/ACM 43rd International Conference on Software Engineering: Software Engineering in Practice, IEEE, 25–28 May 2021, Madrid, Spain, 111–120, 2021.ZhengY.PujarS.LewisB.BurattiL.EpsteinE.YangB.LaredoJ.MorariA.SuZ.D2A: a dataset built for AI-based vulnerability detection methods using differential analysis2021 IEEE/ACM 43rd International Conference on Software Engineering: Software Engineering in Practice, IEEE25–28 May 2021Madrid, Spain1111202021Search in Google Scholar
Zhou X, Verma R.M., Vulnerability detection via multimodal learning: datasets and analysis, Proceedings of the 2022 ACM on Asia Conference on Computer and Communications Security, 30 May–3 June 2022, Nagasaki, Japan, 1225–1227, 2022.ZhouXVermaR.M.Vulnerability detection via multimodal learning: datasets and analysisProceedings of the 2022 ACM on Asia Conference on Computer and Communications Security30 May–3 June 2022Nagasaki, Japan122512272022Search in Google Scholar
Zhou Y., Liu S., Siow J.K., Du X., Liu Y., Advances in neural information processing systems (Chapter: Devign: Effective vulnerability identification by learning comprehensive program semantics via graph neural networks), 10197–10207, 2019.ZhouY.LiuS.SiowJ.K.DuX.LiuY.Advances in neural information processing systems (Chapter: Devign: Effective vulnerability identification by learning comprehensive program semantics via graph neural networks)10197102072019Search in Google Scholar
Zou D., Wang S., Xu S., Li Z., Jin H., µVulDeePecker: a deep learning-based system for multiclass vulnerability detection, IEEE Transactions on Dependable and Secure Computing, 18(5), 2224–2236, 2021.ZouD.WangS.XuS.LiZ.JinH.µVulDeePecker: a deep learning-based system for multiclass vulnerability detectionIEEE Transactions on Dependable and Secure Computing185222422362021Search in Google Scholar