curriculum vitae - cs.ucf.edumohaisen/cv/cv_mohaisen.pdf · 08/2015–08/2017 assistant professor,...

26
Curriculum Vitae David Mohaisen University of Central Florida Department of Computer Science 4000 Central Florida Blvd. Orlando, FL 32816-2362 USA [email protected] i

Upload: others

Post on 19-Jun-2020

5 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Curriculum Vitae - cs.ucf.edumohaisen/CV/CV_Mohaisen.pdf · 08/2015–08/2017 Assistant Professor, Computer Science, University at Buffalo 03/2017–08/2017 Visiting Researcher,

Curriculum Vitae

David Mohaisen

University of Central FloridaDepartment of Computer Science

4000 Central Florida Blvd.Orlando, FL 32816-2362 USA

[email protected]

i

Page 2: Curriculum Vitae - cs.ucf.edumohaisen/CV/CV_Mohaisen.pdf · 08/2015–08/2017 Assistant Professor, Computer Science, University at Buffalo 03/2017–08/2017 Visiting Researcher,

1 Education

Ph.D., Computer Science, University of Minnesota, 2012M.Sc., Computer Science, University of Minnesota, 2011M.Sc., Computer Engineering, Inha University, 2007B.Sc., Computer Engineering, University of Gaza, 2005

2 Topics of Focus

Major (recent) Minor (earlier)Internet of Things Security Critical Infrastructure SecurityAdversarial and Deep Learning Software Systems SecurityBlockchain Systems Security Social Computing Systems

3 Academic and Professional Appointments

08/2017– Associate Professor, Computer Science, University of Central Florida12/2017– Associate Professor, Computer Engineering, University of Central Florida08/2018–08/2019 Advisor, Gruut Networks08/2015–08/2017 Assistant Professor, Computer Science, University at Buffalo03/2017–08/2017 Visiting Researcher, Computer Engineering, Georgia Institute of Technology05/2017–07/2017 Visiting Professor, Cyber Assurance Branch, US Air Force Research Lab05/2016–07/2016 Faculty Fellow, Cyber Assurance Branch, US Air Force Research Lab04/2014–08/2015 Sr Research Scientist, Verisign Labs, Verisign Inc.09/2012–03/2014 Research Scientist, Verisign Labs, Verisign Inc.05/2012–08/2012 Research Intern, Huawei Innovation Center, Huawei Technologies05/2011–08/2011 Research Intern, International Computer Science Institute08/2005–08/2009 Researcher, Electronics and Telecom Research Institute

4 Awards and Honors

2020 Best paper award, IEEE Systems Journal 2020 (top 1%)2019 Best paper – runner up award, IEEE DSC 2019 (top 3%)2019 Distinguished TPC Member, IEEE INFOCOM 20192018 Best Paper Award, ACM DLoT 20182018 Senior Member Elevation, Association for Computing Machinery (ACM)2018 Distinguished TPC Member, IEEE INFOCOM 20182017 Best Student Paper Award, IEEE ICDCS 2017 (top 1%)2017 Distinguished TPC Member, IEEE INFOCOM 20172017 Visiting Faculty Research Award, US Air Force Laboratory2016 Summer Faculty Fellowship Award, US Air Force Laboratory2015 Senior Member Elevation, Institute of Electrical and Electronics Engineers (IEEE)2014 Best Paper Award, WISA 20142013 Best Poster Award, IEEE CNS 20132011 Doctoral Dissertation Fellowship, University of Minnesota2007 Dean’s Award for Outstanding Thesis, Inha University2005 Jungseok International Fellowship, Inha University

1

Page 3: Curriculum Vitae - cs.ucf.edumohaisen/CV/CV_Mohaisen.pdf · 08/2015–08/2017 Assistant Professor, Computer Science, University at Buffalo 03/2017–08/2017 Visiting Researcher,

5 Advising and Mentorship

5.1 Current Advising

[1] Jeman Park, Ph.D. Candidate, CS, 2020 (expected).Topic: Critical Infrastructure Security.

[2] RhongHo Jang?, Ph.D. Candidate, CS, 2020 (expected).Topic: Networks Security / Software Networks.

[3] Jinchun Choi?, Ph.D. Candidate, CS, 2020 (expected).Topic: Internet of Things Security.

[4] Mohammed Abuhamad?, Ph.D. Candidate, CS, 2020 (expected).Topic: Deep Learning / Software Security.

[5] Muhammad Saad, Ph.D. Candidate, CS, 2021 (expected).Topic: Blockchains Systems Security.

[6] Afsah Anwar, Ph.D., CS, 2021 (expected).Topic: Software Security / Vulnerability Analysis.

[7] Ahmad Abusnenah, Ph.D., CS, 2022 (expected).Topic: Adversarial Machine Learning

[8] Sultan Alshamrani, Ph.D. student, CS, 2022 (expected).Topic: Internet of Things / Machine Learning

[9] Ulku Meteriz, Ph.D., CS, 2022 (expected).Topic: Deep Learning / Privacy

[10] Necip Yildiran, Ph.D. student, CS, 2022 (expected).Topic: Deep Learning / Virtual Reality

5.2 Graduated Students and Mentored Postdocs

[1] Hisham Alasmary, Ph.D., CS, 2020.Dissertation: “Analyzing and Detecting Internet of Things Malware Using Residual StaticGraph- and String-Based Artifacts”.First job: Tenure-track Assistant Professor, King Khalid University.

[2] Ashar Ahmad, Ph.D., CS, 2019.Dissertation: Blockchain-Driven Secure and Transparent Audit LogsFirst job: Director of Research and Engineering at Clear Village Inc.

[3] Jeffrey Spaulding, Ph.D., CS, 2018.Dissertation: DNS Filtering and Extraction Network System for Malicious Domain Names.First job: Tenure-track Assistant Professor, Niagara University.

[4] Omar Al-Ibrahim, Postdoctoral Researcher. 2016–2017 (1 year).First job: Researcher, Lookout.

[5] Ah Reum Kang, Postdoctoral Researcher. 2016–2017 (1 year).First job: Postdoc of CS at University at Buffalo.

[6] Aminollah Khormali, M.Sc., CS, 2017–2019 (2 years).First job: Ph.D. of ECE at UCF

2

Page 4: Curriculum Vitae - cs.ucf.edumohaisen/CV/CV_Mohaisen.pdf · 08/2015–08/2017 Assistant Professor, Computer Science, University at Buffalo 03/2017–08/2017 Visiting Researcher,

[7] Priyanka Gona, M.Sc. student, CS, 2020.Topic: privacy and big data.

[8] Samprati Upadhyay, M.Sc. student, CS, 2020.Topic: privacy and big data.

[9] Jesse Freeman, M.Sc. (SFS), 2016 (1 year).First job: Specialist, U.S. DoD.

[10] Christopher Weeden, M.Sc. (SFS), 2016 (1 year).First job: Scientist, U.S. Navy

[11] Woodams Clark, M.Sc. (SFS), 2016 (1 year).First job: Scientist, U.S. Navy

[12] Joe D’Amato, M.Sc. (SFS), 2016 (1 year).First job: Scientist, MITRE

[13] Pranav Jain, M.Sc., 2016–2017 (1 year).First job: Security Engineer, Qualcomm

[14] Gianni Lotz, B.Sc. (URA); 2019–2019 (6 months).First job: Florida Power & Light.

[15] Mikal Young, B.Sc. (URA); 2019–2019 (6 months).

[16] Connor Austin, B.Sc. (URA); 2018–2019 (1 year).

[17] Destinee Stephen, B.Sc. (URA); 2018–2019 (1 year).

[18] Brandon Gray, B.Sc. (URA), 2017–2018 (1 year).

[19] Shane M Ferrell, B.Sc. (URA), 2017–2017 (1 semester).First job: Engineering, Lockheed Martin

[20] Brent Rademaker, B.Sc. (URA), 2017–2017 (1 semester).

[21] Jobin Joseph, B.Sc. (URA), 2016–2017 (1 semester).First job: Software Engineer, SRC.

[22] David Weidenborner, B.Sc. (URA), 2016–2017 (1 semester).Firs job: Software Engineer, Lockheed Martin.

[23] Vikram Singh, High school senior, 2016 (1 semester; summer).First job: Undergraduate Student at SUNY Buffalo.

5.3 Ph.D. Dissertation Committee Membership

[1] Hossein Rezaeighaleh (University of Central Florida, 2019)

[2] An Wang (George Mason University, 2018)

[3] Amirali Sanatinia (Northeastern University, 2018)

[4] Hayreddin Ceker (SUNY Buffalo, 2017)

5.4 Mentored at Verisign (Research Interns)

[1] Min Suk Kang, Ph.D. student (CMU), 2015.Current job: Assistant Professor, National University of Singapore.

3

Page 5: Curriculum Vitae - cs.ucf.edumohaisen/CV/CV_Mohaisen.pdf · 08/2015–08/2017 Assistant Professor, Computer Science, University at Buffalo 03/2017–08/2017 Visiting Researcher,

[2] Maliheh Shirvanian, Ph.D. student (U. Alabama), 2015.Current job: Researcher, Visa Research.

[3] An Wang, Ph.D. student (George Mason), 2015.Current job: Tenure-track Assistant Professor, CWRU

[4] Hesham Mekky, Ph.D. student (U. Minnesota), 2014.Current job: Software Engineer, Snapchat.

[5] Ahmed Kosba, Ph.D. student (U. Maryland), 2013 and 2014.Current job: Postdoc at UC Berkeley.

[6] Sharath Hiremagalore, Ph.D. student (George Mason), 2015.Current job: Software Engineer, Verisign Inc.

[7] Nektarios Leontiadis, Ph.D. student (CMU), 2013.Current job: Threat Researcher, Facebook.

[8] Mansurul Bhuiyan, Ph.D. student (Indiana), 2013.Current job: Scientist, IBM Research Almaden.

5.5 Hosted Research Visitors

[1] Mohammad Al-Ghamdi, Assistant Professor:Um Alqura University, Saudi Arabia, June 2019 – August 2019.

[2] Jihoon Lee. Assistant Professor:Sangmyung University, South Korea. Aug. 2018–Aug. 2019 (sabbatical).

[3] DaeHun Nyang. Professor:Inha University, South Korea. 2017 and 2018.

[4] Manar Mohaisen. Assistant Professor:Korea Tech., South Korea. 2016 and 2017.

[5] Andreas Huelsing. Postdoctoral Researcher:Eindhoven University of Technology, The Netherlands. 2015.

6 Teaching and Evaluation

[1] CAP 6640 – Computer Understanding of Natural LanguageSpring 2020: 45 students;Spring 2019: 55 students; 4.0/5

[2] CIS 4361 – Secure Operating Systems and AdministrationSpring 2019: 62 students; 3.7/5

[3] CIS 4165 – Secure Software DevelopmentFall 2018: 23 students; 4.5/5. Response rate: 96%Fall 2017: 22 students; 3.6/5. Response rate: 68%

[4] CAP 6133 – Advanced Computer SecuritySpring 2018: 12 students; 4.6/5. Response rate: 83%

[5] CSE 410* – Introduction to Computer SecurityFall 2016: 79 students; 3.7/5. Response rate: 89%

4

Page 6: Curriculum Vitae - cs.ucf.edumohaisen/CV/CV_Mohaisen.pdf · 08/2015–08/2017 Assistant Professor, Computer Science, University at Buffalo 03/2017–08/2017 Visiting Researcher,

[6] CSE 709* – Advanced topics in Computer SecurityFall 2016: 24 students; 4.6/5. Response rate: 100%

[7] CSE 664* – Applied Cryptography and Networks SecuritySpring 2016: 27 students; 4.0/5. Response rate: 89%

[8] CSE 709* – Advanced topics in Computer SecurityFall 2015: 10 students; 5.0/5. Response rate: 90%* taught at SUNY Buffalo

[9] CNT 7919 – Doctoral ResearchSpring 2019: 3 studentsFall 2018: 6 studentsSpring 2018: 2 studentsFall 2017: 5 students

[10] COP 7980 – Doctoral DissertationSpring 2018: 1 studentFall 2017: 1 student

7 Technical Research Publications and Artifacts

7.1 Book Chapters and Standard Documents

[1] Andreas Huelsing, Denis Butin, Stefan-Lukas Gazdag, and Aziz Mohaisen. “XMSS: ExtendedHash-Based Signatures”. RFC 8391; May 14, 2018. – 40+ citations!

[2] Muhammad Saad§, Charles Kamhoua, Laurent Njilla, Kevin Kwait, Aziz Mohaisen “ShockingBitcoin’s Memory with Unconfirmed Transactions: New DDoS Attacks and Countermea-sures”. To appear (2019), in “Blockchain for Distributed Systems.” IEEE Press.

[3] Muhammad Saad§, Jeffrey Spaulding§, Charles Kamhoua, Laurent Njilla, DaeHun Nyang,and Aziz Mohaisen. “Exploring the Attack Surface of Blockchain”. To appear (2019), in“Blockchain for Distributed Systems.” IEEE Press.

[4] Hisham Alasmary, Afsah Anwar, Laurent Njilla, Charles A. Kamhoua, Aziz Mohaisen, “Ad-dressing Polymorphic Advanced Threats in Internet of Things Networks by Cross-LayerProfiling”, Book Chapter, to appear (2019), in “Modeling and Design of Secure Internet ofThings”, IEEE Press.

7.2 Journal Publications

[5] Muhammad Saad, Jinchun Choi, Joongheon Kim, DaeHun Nyang, Aziz Mohaisen “TowardsCharacterizing Blockchain-based Cryptocurrencies for Highly-Accurate Predictions”. IEEESystems Journal. 2020. (Impact Factor: 4.463) (Best paper award).

[6] Jeman Park, Manar Mohaisen, DaeHun Nyang, Aziz Mohaisen. “Assessing the effectivenessof pulsing denial of service attacks under realistic network synchronization assump-tions”, Computer Networks, Volume 173, May 2020.

5

Page 7: Curriculum Vitae - cs.ucf.edumohaisen/CV/CV_Mohaisen.pdf · 08/2015–08/2017 Assistant Professor, Computer Science, University at Buffalo 03/2017–08/2017 Visiting Researcher,

[7] Mohammed Abuhamad, Tamer Abuhmed, David Mohaisen, and DaeHun Nyang, “AUToSen:Deep Learning-based Implicit Continuous Authentication Using Smartphone Sensors”.IEEE Internet of Things Journal (IoTJ), 2020.

[8] Mao Ye, Kazi Abu Zubair, Aziz Mohaisen, and Amro Awad. “Towards Low-Cost Mechanismsto Enable Restoration of Encrypted Non-Volatile Memories”. IEEE Transactions on Depend-able and Secure Computing (TDSC), 2019.

[9] Hisham Alasmary, Amin Khormali, Afsah Anwar, Jeman Park, Jinchun Choi, Ahmed Abus-naina, Amro Awad, DaeHun Nyang, Aziz Mohaisen. “Analyzing and Detecting EmergingInternet of Things Malware: A Graph-based Approach”. IEEE Internet of Things Journal,2019. (Impact Factor: 9.515).

[10] Laihyuk Park, Chunghyun Lee, Joongheon Kim, Aziz Mohaisen, and Sungrae Cho. “Two-Stage IoT Device Scheduling with Dynamic Programming for Energy Internet Systems”.IEEE Internet of Things Journal, 2019. (Impact Factor: 9.515).

[11] Ashar Ahmed, Muhammad Saad, Aziz Mohaisen. “Secure and Transparent Audit Logs withBlockAudit”. Journal of Network and Computer Applications, 2019. (accepted) (ImpactFactor: 5.273).

[12] Kyeongseon Kim, Dohyun Kwon, Joongheon Kim, and Aziz Mohaisen, “Personalized OnlineLive Video Streaming Using Softmax-Based Multinomial Classification”, Appl. Sci. 2019,9(11), 2297. (Impact Factor: 1.689)

[13] Jeman Park§, DaeHun Nyang, and Aziz Mohaisen. “Transparency in the New gTLD Era:Evaluating the DNS Centralized Zone Data Service”, IEEE Transactions on Network andService Management (TNSM), 2019

[14] Jeffrey Spaulding§, Jeman Park§, Joongheon Kim, DaeHun Nyang, Aziz Mohaisen. “Thrivingon chaos: Proactive detection of command and control domains in internet of things-scale botnets using DRIFT”. Transactions on Emerging Telecommunications Technologies,2018(8):1-17, 2018. (Impact Factor: 1.606)

[15] Aziz Mohaisen, Zhongshu Gu, and Kui Ren, Charles Kamhoua, Laurent Njilla, DaeHun Nyang.“Look-Aside at Your Own Risk: Privacy Implications of DNSSEC Look-aside Validation”.IEEE Transactions on Dependable and Secure Computing (TDSC), 99(9):100–113, 2018. (Im-pact Factor: 2.926)

[16] An Wang†, Wentao Chang†, Songqing Chen, and Aziz Mohaisen. “A Data-Driven Study ofDDoS Attacks and Their Dynamics”. IEEE Transactions on Dependable and Secure Computing(TDSC), 99(9):100–113, 2018 (Impact Factor: 2.926)

[17] Aziz Mohaisen, Omar Alrawi, Jeman Park§, Joongheon Kim, DaeHun Nyang, and Manar Mo-haisen. “Network-based Analysis and Classification of Malware using Behavioral Arti-facts Ordering”, EAI Endorsed Transactions on Security and Safety, 2018. (accepted)

[18] Feng Shen§, Justin Del Vecchio§, Aziz Mohaisen, Steven Y. Ko and Lukasz Ziarek. “AndroidMalware Detection using Multi-Flows and API Patterns”. IEEE Transactions on Mobile Com-puting (TMC), 99(9):100–113, 2018. (Impact Factor: 3.822)

6

Page 8: Curriculum Vitae - cs.ucf.edumohaisen/CV/CV_Mohaisen.pdf · 08/2015–08/2017 Assistant Professor, Computer Science, University at Buffalo 03/2017–08/2017 Visiting Researcher,

[19] Fan Dang§, Pengfei Zhou§, Zhenhua Li, Ennan Zhai, Aziz Mohaisen, Qingfu Wen, and Mo Li.“Large-scale Invisible Attack on AFC Systems with NFC-equipped Smartphones”. IEEETransactions on Mobile Computing (TMC), 99(9):100–113, 2018. (Impact Factor: 3.822)

[20] RhongHo Jang§, Jeonil Kang‡, Aziz Mohaisen, and DaeHun Nyang. Catch Me If You Can:Rogue Access Point Detection Using Intentional Channel Interference. IEEE Transactions onMobile Computing (TMC), 99(9):100–113, 2018. Accepted with revisions. (Impact Factor:3.822)

[21] An Wang†, Wentao Chang†, Songqing Chen, and Aziz Mohaisen.“Delving into Internet DDoSAttacks by Botnets: Characterization and Analysis”. ACM/IEEE Transactions on Networking(ToN), 99(9):100–113, 2018.

[22] Aziz Mohaisen, and Kui Ren. “Leakage of .onion at the DNS Root: Measurements, Causes,and Countermeasures”. ACM/IEEE Transactions on Networking (ToN), 25(5): 3059-3072,2017 (Impact Factor: 3.376)

[23] DaeHun Nyang, Hyoungshick Kim, Woojoo Lee, Sung-bae Kang, Geumhwan Cho, Mun-KyuLee, Aziz Mohaisen “Two-Thumbs-Up: Physical Protection for PIN Entry Secure againstRecording Attacks”. Elsevier Computers and Security (COSE), 68(6): 1-15, 2018 (ImpactFactor: 2.849)

[24] Hyukmin Kwon§, Jiyong Woo‡, Aziz Mohaisen, Yongdae Kim, and Huy Kang Kim. “CrimeScene Reconstruction: Online Gold Farming Network Analysis”. IEEE Transactions onInformation Forensics and Security (TIFS), 12(3): 544-556, 2017 (Impact Factor: 4.332)

[25] Myungsun Kim‡, Aziz Mohaisen, Jung Hee Cheon, Yongdae Kim. “Private Over-ThresholdAggregation Protocols over Distributed Datasets.” IEEE Transactions on Knowledge andData Engineering (TMC), Vol. 28, No. 9, pp. 2467-2479, 2016. (Impact Factor: 3.438)

[26] Jae-wook Chang§, Hyunjae Kang§, Jiyoung Woo‡, Aziz Mohaisen, Huy Kang Kim. “Andro-Dumpsys: Anti-Malware System Based on the Similarity of Malware Creator and Mal-ware Centric Information”, Elsevier Computers and Security (COSE), 58(3): 125-138, 2016(Impact Factor: 2.849)

[27] Ah Reum Kang‡, Seong Hoon Jeong?, Aziz Mohaisen, and Huy Kang Kim. “Multimodalgame bot detection using user behavioral characteristics”. SpringerPlus, 5(1): 1-19, 2016(Impact Factor: 0.982)

[28] Jae-wook Jang§, Jaesung Yun§, Aziz Mohaisen, Jiyoung Woo‡, and Huy Kang Kim. “Detectingand Classifying Method based on Similarity Matching of Android Malware Behavior withProfile”. SpringerPlus, 5(1): 1-23, 2016 (Impact Factor: 0.982)

[29] Aziz Mohaisen, Hesham Mekky†, Haiyong Xie, Xinwen Zhang, and Yongdae Kim. “TimingAttacks on Access Privacy in Information Centric Networks and Countermeasures”. IEEETransactions on Dependable and Secure Computing (TDSC), 12(6): 675-687, 2015 (ImpactFactor: 2.926)

[30] Aziz Mohaisen and Omar Alrawi†. “AMAL: High-Fidelity, Behavior-based Automated Mal-ware Analysis and Classification”. Elsevier Computers and Security (COSE), 52(4): 251-266,2015 (Impact Factor: 2.849 ) –50+ citations!

7

Page 9: Curriculum Vitae - cs.ucf.edumohaisen/CV/CV_Mohaisen.pdf · 08/2015–08/2017 Assistant Professor, Computer Science, University at Buffalo 03/2017–08/2017 Visiting Researcher,

[31] Jae-wook Jang§, Hyunjae Kang§, Huy Kang Kim, Jiyoung Woo‡, Aziz Mohaisen. “Andro-AutoPsy: Anti-malware system based on similarity matching of malware and malwarecreator-centric information”. Elsevier Digital Investigation Journal, 14(5): 17-35, 2015 (Im-pact Factor: 1.774) –20+ citations!

[32] Youngjae Maeng§, Aziz Mohaisen, Munkyu Lee, and DaeHun Nyang. “Transaction Authen-tication Using Complementary Colors”. Elsevier Computers and Security (COSE), 48(2):167-181, 2015 (Impact Factor: 2.849)

[33] Jae-wook Jang§, Jiyoung Woo‡, Aziz Mohaisen, Jaesung Yun§, and Huy Kang Kim. “Mal-Netminer: Malware Classification Approach Based on Social Network Analysis of SystemCall Graph”. Mathematical Problems in Engineering (MPE), 2015(5): 731-734, 2015 (ImpactFactor: 0.8)

[34] Hyunjae Kang§, Jae-wook Jang§, Aziz Mohaisen and Huy Kang Kim. “Detecting and Clas-sifying Android Malware using Static Analysis and Creator Information”. InternationalJournal of Distributed Sensor Networks (IJDSN), 2015(7): 1-9, 2015 (Impact Factor: 1.24)–60+ citations!

[35] DaeHun Nyang, Aziz Mohaisen, and Jeonil Kang‡. “Keylogging-resistant Visual Authenti-cation Protocols”. IEEE Transactions on Mobile Computing (TMC), 13(11): 2566-2579, 2014(Impact Factor: 3.822) –25+ citations!

[36] Aziz Mohaisen, Huy Tran?, Abhishek Chandra, and Yongdae Kim. “Trustworthy DistributedComputing on Social Networks”. IEEE Transactions on Services Computing (TSC), 7(3): 333-345, 2014 (Impact Factor: 3.520)

[37] Aziz Mohaisen, Denis Foo Kune, Eugene Vasserman, and Yongdae Kim. “Secure encounter-based social networks: Requirements, challenges, and designs”. IEEE Transactions onDependable and Secure Computing (TDSC), 7(6): 333-345, 2013 (Impact Factor: 2.926) –20+ citations!

[38] Yanhua Li§, Aziz Mohaisen, Zhi-Li Zhang. “Trading Optimality for Scalability in large-scale Wireless Networks Opportunistic Routing”. IEEE Transactions on Vehicular Technology(TVT), 65(5): 2253-2263, 2013 (Impact Factor: 4.066) –30+ citations!

[39] Manar Mohaisen, Aziz Mohaisen, Merouane Debbah. “Parallel QRD-M encoder for multi-user MIMO systems”. Telecommunication Systems Journal, 57(3): 261-270, 2013 (ImpactFactor: 1.542)

[40] Aziz Mohaisen and DaeHun Nyang. “On the inefficiency of resources optimal key pre-distribution scheme for sensor network”. Journal of Communications, 5(2): 164-168,2010 (Impact Factor: 2.895)

7.3 Conference Publications

[41] Ahmed Abusnaina,Rhongho Jang, Aminollah Khormali, DeaHun Nyang, and Aziz Mohaisen,“Deep Fingerprinting Defender: Adversarial Learning-based Approach to Defend AgainstWebsite Fingerprinting”, in Proceedings of the 39th IEEE International Conf. on ComputerCommunications, INFOCOM 2020, Beijing, CHINA,April 27-30, 2020.

8

Page 10: Curriculum Vitae - cs.ucf.edumohaisen/CV/CV_Mohaisen.pdf · 08/2015–08/2017 Assistant Professor, Computer Science, University at Buffalo 03/2017–08/2017 Visiting Researcher,

[42] Rhongho Jang, Daehong Min, Seongkwang Moon, Aziz Mohaisen, and DaeHun Nyang, “Sketch-Flow: Per-Flow Systematic Sampling Using Sketch Saturation Event”, in Proceedings ofthe 39th IEEE International Conf. onComputer Communications, INFOCOM 2020, Beijing,CHINA, April 27-30, 2020.

[43] Hisham Alasmary, Ahmed Abusnaina, Rhongho Jang, Mohammed Abuhamad, Afsah Anwar,Daehun Nyang, and David Mohaisen, “Soteria: Detecting Adversarial Examples in Con-trol Flow Graph-based Malware Classifiers”. The 40th IEEE International Conference onDistributed Computing Systems (ICDCS), 2020.

[44] Ülkü Meteriz, Necip Fazıl Yıldıran, Joongheon Kim, and David Mohaisen, “Understandingthe Potential Risks of Sharing Elevation Information on Fitness Applications”. The 40thIEEE International Conference on Distributed Computing Systems (ICDCS), 2020.

[45] Mohammed Abuhamad, Tamer Abuhmed, DaeHun Nyang, and David Mohaisen, “Multi-X:Identifying Multiple Authors from Source Code Files”. Privacy Enhancing TechnologiesSymposium (PETS), 2020.

[46] Ahmed Abusnaina, Hisham Alasmary, Mohammed Abuhamad, Saeed Salem, DaeHun Nyang,and Aziz Mohaisen, “Subgraph-based Adversarial Examples Against Graph-based IoTMalware Detection Systems”. International Conference on Computational Data and SocialNetworks (CSoNet 2019)

[47] David Mohaisen, Songqing Chen “Computer Systems Have 99 Problems, Let’s Not MakeMachine Learning Another One”, IEEE International Conference on Trust, Privacy and Se-curity in Intelligent Systems, and Applications (IEEE TPS), Los Angeles, CA, USA, Dec 12-14,2019.

[48] Ahmed Abusnaina, Aminollah Khormali, DaeHun Nyang, Murat Yuksel, Aziz Mohaisen: “Ex-amining the Robustness of Learning-Based DDoS Detection in Software Defined Net-works” In Proceeding of IEEE Conference on Dependable and Secure Computing, (IEEE DSC2019), Hangzhou, China. November 18-0, 2019 –Best Paper – Runner Up Award!

[49] Jinchun Choi, Ahmed Abusnaina, Afsah Anwar, An Wang, Songqing Chen, Daehun Nyang,Aziz Mohaisen: “Honor Among Thieves: Towards Understanding the Dynamics and In-terdependencies in IoT Botnets”. In Proceeding of IEEE Conference on Dependable and SecureComputing, (IEEE DSC 2019), Hangzhou, China. November 18-0, 2019.

[50] Muhammad Saad, Amin Khormali, and David Mohaisen. “Dine and Dash: Static, Dynamic,and Economic Analysis of In-Browser Cryptojacking”, Symposium on Electronic CrimeResearch (eCrime), Pittsburgh, PA, USA. Nov 13-15, 2019.

[51] Changhun Jung, Jumabek Alikhanov, Mohammed Abuhamad, Aziz Mohaisen, Kyungja Han,DaeHun Nyang: “W-Net: A CNN-based Architecture for White Blood Cells Image Classifi-cation”. In Proceedings of the AAAI Fall Symposium on AI for Social Good (AAAI Fall Sympo-sium), Arlington, VA, USA. November 7-9, 2019.

[52] Jeman Park§, Aminollah Khormali§, Manar Mohaisen, and Aziz Mohaisen, “Where Are YouTaking me? Behavioral Analysis of Open DNS Resolvers”. Proceeding of the 49th AnnualIEEE/IFIP International Conference on Dependable Systems and Networks, DSN 2019, Portland,Oregon, June 22-25, 2019.

9

Page 11: Curriculum Vitae - cs.ucf.edumohaisen/CV/CV_Mohaisen.pdf · 08/2015–08/2017 Assistant Professor, Computer Science, University at Buffalo 03/2017–08/2017 Visiting Researcher,

[53] Joohyung Jeony, Junhui Kimy, Joongheon Kimy, Kwangsoo Kimz, Aziz Mohaisen, and Jong-Kook Kim. “Fast Abstract: Privacy-Preserving Deep Learning Computation for Geo-Distributed Medical Big-Data Platforms”. Proceeding of the 49th Annual IEEE/IFIP Inter-national Conference on Dependable Systems and Networks, DSN 2019, Portland, Oregon, June22-25, 2019.

[54] Muhammad Saad, Victor Cook, Lan Nguyen, My T. Thai and Aziz Mohaisen. “PartitioningAttacks on Bitcoin: Colliding Space, Time, and Logic”. Proceedings of 39th IEEE Interna-tional Conference on Distributed Computing Systems, ICDCS 2019, Dallas, Texas, USA. July7-10, 2019 .

[55] Ahmed Abusnaina, Aminollah Khormali, Hisham Alasmary, Jeman Park, Afsah Anwar andAziz Mohaisen. “Adversarial Learning Attacks on Graph-based IoT Malware DetectionSystems”. Proceedings of 39th IEEE International Conference on Distributed Computing Sys-tems, ICDCS 2019, Dallas, Texas, USA. July 7-10, 2019 .

[56] Rhongho Jang, Seongkwang Moon, Youngtae Noh, Aziz Mohaisen and Daehun Nyang. “In-staMeasure: Instant Per-flow Detection UsingLarge In-DRAM Working Set of ActiveFlows”. Proceedings of 39th IEEE International Conference on Distributed Computing Systems,ICDCS 2019, Dallas, Texas, USA. July 7-10, 2019 .

[57] Muhammad Saad, Laurent Njilla, Charles Kamhoua, Joongheon Kim, DaeHun Nyang, andAziz Mohaisen, “Mempool Optimization for Defending Against DDoS Attacks in PoW-based Blockchain Systems”. Proceedings of the IEEE International Conference on Blockchainand Cryptocurrency, ICBC 2019, Seoul, South Korea, 14-17 May 2019..

[58] Muhammad Saad, Afsah Anwar, Ashar Ahmad, Hisam Alasmary, Murat Yukesl, and Aziz Mo-haisen. “RouteChain: Towards Blockchain-based Secure and Efficient BGP Routing”. Pro-ceedings of the IEEE International Conference on Blockchain and Cryptocurrency, ICBC 2019,Seoul, South Korea, 14-17 May 2019.

[59] Ashar Ahmad, Muhammad Saad, Laurent Njilla, Charles A. Kamhoua Mostafa Bassiouni, andAziz Mohaisen, “BlockTrail: A Scalable Multichain Solution for Blockchain-based AuditTrails”, Proceedings of IEEE International Conference on Communications, ICC 2019, Shanghai,China, May 18-22, 2019.

[60] Hisham Alasmary§, Afsah Anwar§, Jeman Park§, Jinchun Choi§, Daehun Nyang, and Aziz Mo-haisen, “Graph-based Comparison of IoT and Android Malware”, International Conferenceon Computational Data and Social Networks (CSoNet 2018)

[61] Mohammed Abuhmed§, Tamer Abuhmed, Aziz Mohaisen, DaeHun Nyang, “Large-Scale andLanguage-Oblivious Code Authorship Identification”, Proceedings of the 2018 ACM SIGSACConference on Computer and Communications Security, CCS 2018, Toronto, Canada, October13-17, 2018.

[62] Jeman Park§, DaeHun Nyang, Aziz Mohaisen, “Timing is Almost Everything: Realistic Eval-uation of the Very Short Intermittent DDoS Attacks”, Proceedings of the 16th Annual Con-ference on Privacy, Security and Trust, PST 2018, Belfast, Northern Ireland, United Kingdom,August 28-30, 2018. (Acceptance rate: 30%)

10

Page 12: Curriculum Vitae - cs.ucf.edumohaisen/CV/CV_Mohaisen.pdf · 08/2015–08/2017 Assistant Professor, Computer Science, University at Buffalo 03/2017–08/2017 Visiting Researcher,

[63] Zhongjie Ba§, Sixu Piao§, Xinwen Fu, Dimitrios Koutsonikolas, Aziz Mohaisen, Kui Ren. “ABC:Enabling Smartphone Authentication with Built-in Camera”, Proceeding of the Network andDistributed System Security Symposium, NDSS 2018, San Diego, California, USA, February 21-24, 2018. (Acceptance rate: 20%)

[64] Sungha Baek§, Youngdon Jung§, Aziz Mohaisen, Sungjin Lee and Daehun Nyang. “SSD-Insider: Internal Defense of Solid-State Drive against Ransomware with Perfect DataRecovery”. Proceedings of 38th IEEE International Conference on Distributed Computing Sys-tems, ICDCS 2018, Vienna, Austria, July 2-6, 2018. (Acceptance rate: 20%)

[65] Shinyoung Ahn§, Joongheon Kim, Eunji Lim§, Wan Choi, Aziz Mohaisen and Sungwon Kang.“ShmCaffe: A Distributed Deep Learning Platform with Shared Memory”. Proceedings of38th IEEE International Conference on Distributed Computing Systems, ICDCS 2018, Vienna,Austria, July 2-6, 2018. (Acceptance rate: 20%)

[66] Afsah Anwar§, Aminollah Khormali§ and Aziz Mohaisen. “Understanding the Hidden Costof Software Vulnerabilities: Measurements and Predictions”, Proceeding of The 14th EAIInternational Conference on Security and Privacy in Communication Networks, SecureComm2018, Singapore, Singapore, August 8–10, 2018. (Acceptance rate: 29.6%)

[67] Jeman Park§, Hisham Alasmary§, Omar Al-Ibrahim‡, Charles Kamhoua, Kevin Kwiat, Lau-rent Njilla, Aziz Mohaisen. “QOI: Assessing Participation in Threat Information Sharing”.International Conference on Acoustics, Speech, and Signal Processing, ICASSP 2018, Calgary,Alberta, Canada, April 15–20, 2018.

[68] Changhun Jung§, Jeonil Kang‡, Aziz Mohaisen, DaeHun Nyang. “DIGITALSEAL: A Transac-tion Authentication Tool for Online and Offline Transactions”. International Conference onAcoustics, Speech, and Signal Processing, ICASSP 2018, Calgary, Alberta, Canada, April 15–20,2018.

[69] Jeffrey Spaulding§, Jeman Park§, Joongheon Kim, Aziz Mohaisen. “Proactive Detection ofAlgorithmically Generated Malicious Domains”. The 32nd International Conference onInformation Networking, ICOIN 2018, Chiang Mai, Thailand, Jan 10-12, 2018. (Acceptancerate: 41%)

[70] Si Chen§, Sixu Piao§, Cong Wang, Qian Wang, Jian Weng, Lu Su, Kui Ren, Aziz Mohaisen.“You Can Hear But You Cannot Steal: Defending against Voice Impersonation on Smart-phones”, Proceedings of 37th IEEE International Conference on Distributed Computing Systems,ICDCS 2017, Atlanta, GA, USA, June 5-7, 2017. (Acceptance rate: 17%)–Best StudentPaper Award!

[71] Aziz Mohaisen, Zhongshu Gu, and Kui Ren. “Privacy Implications of DNSSEC Look-asideValidation”. Proceedings of 37th IEEE International Conference on Distributed Computing Sys-tems, ICDCS 2017, Atlanta, GA, USA, June 5-7, 2017. (Acceptance rate: 17%)

[72] Feng Shen§, Justin Del Vecchio§, Aziz Mohaisen, Steven Y. Ko and Lukasz Ziarek. “AndroidMalware Detection using Multi-Flows and API Patterns”. Proceedings of 37th IEEE Inter-national Conference on Distributed Computing Systems, ICDCS 2017, Atlanta, GA, USA, June5-7, 2017. (Acceptance rate: 17%)

11

Page 13: Curriculum Vitae - cs.ucf.edumohaisen/CV/CV_Mohaisen.pdf · 08/2015–08/2017 Assistant Professor, Computer Science, University at Buffalo 03/2017–08/2017 Visiting Researcher,

[73] An Wang†, Songqing Chen, Aziz Mohaisen “An Adversary-Centric Behavior Modeling ofDDoS Attacks”. Proceedings of 37th IEEE International Conference on Distributed ComputingSystems, ICDCS 2017, Atlanta, GA, USA, June 5-7, 2017. (Acceptance rate: 17%)

[74] Chaowen Guan§, Aziz Mohaisen, Z. Sun, F. Wei, L. Su, K. Ren, Y. Yang. “When Smart TVMeets CRN: Privacy-preserving Fine-grained Spectrum Accessing for Secondary Users”.Proceedings of 37th IEEE International Conference on Distributed Computing Systems, ICDCS2017, Atlanta, GA, USA, June 5-7, 2017. (Acceptance rate: 17%)

[75] Qian Wang, Kui Ren, Minxin Du, and Aziz Mohaisen. “SecGDB: Graph Encryption for ExactShortest Distance Queries with Efficient Updates”. Proceedings of the Twenty-First Inter-national Conference of Financial Cryptography and Data Security, FC 2017, Malta, April 3–7,2017. (Acceptance rate: 25%)

[76] Fan Dang§, Pengfei Zhou§, Zhenhua Li, Ennan Zhai‡, Aziz Mohaisen, Qingfu Wen, and MoLi. “large-scale Invisible Attack on AFC Systems with NFC-equipped Smartphones”. InProceedings of the 36th IEEE International Conf. on Computer Communications, INFOCOM2017, Atlanta, GA, USA, May 1-4, 2017. (Acceptance rate: 20%)

[77] Wentao Chang†, An Wang†, Songqing Chen, and Aziz Mohaisen. “Understanding Adver-sarial Strategies in Modern Botnets from Bot Recruitment to Scheduling”. Proceeding ofThe 13th EAI International Conference on Security and Privacy in Communication Networks,SecureComm 2017, Niagara Falls, NY, Canada, October 22–24, 2017. (Acceptance rate:29.5%)

[78] Eunjo Lee§, Jiyoung Woo‡, Hyoungshick Kim, Aziz Mohaisen, Huy Kang Kim. “You Are aGame Bot!: Uncovering game bots in MMORPGs via self-similarity in the wild”. In Pro-ceeding of the Network and Distributed System Security Symposium, NDSS 2016, San Diego,California, USA, February 21-24, 2016. (Acceptance rate: 15%) –20+ citations!

[79] Aziz Mohaisen, Ah Reum Kang‡, and Kui Ren. “Does Query Blocking Improve DNS Pri-vacy?” In Proceedings of the 17th International Conf. on Info. Security Applications, WISA2016, Jeju, Korea, Aug 25-27, 2016. (Acceptance rate: 50%)

[80] An Wang†, Aziz Mohaisen, Wentao Chang†, Songqing Chen. “Measuring and AnalyzingTrends in Recent Distributed Denial of Service Attacks”. In Proceedings of the 17th In-ternational Conf. on Info. Security Applications, WISA 2016, Jeju, Korea, Aug 25-27, 2016.(Acceptance rate: 50%)

[81] Jeffrey Spaulding§, Shambhu Upadhyaya and Aziz Mohaisen. “The Landscape of DomainName Typosquatting: Techniques and Countermeasures”. In Proceeding of the Interna-tional Conference on Availability, Reliability and Security, ARES 2016, Salzburg, Austria, Aug31-Sep 2, 2016. (Acceptance rate: 30%)

[82] Hesham Z. Mekky†, Aziz Mohaisen, and Zhi-Li Zhang. “Separation of benign and maliciousnetwork events for accurate malware family classification”. In Proceeding of the 2015 IEEEConference on Communications and Network Security, CNS 2015, Florence, Italy, September28-30, 2015. (Acceptance rate: 28%)

12

Page 14: Curriculum Vitae - cs.ucf.edumohaisen/CV/CV_Mohaisen.pdf · 08/2015–08/2017 Assistant Professor, Computer Science, University at Buffalo 03/2017–08/2017 Visiting Researcher,

[83] An Wang†, Aziz Mohaisen, Wentao Chang†, and Songqing Chen. “Capturing DDoS AttackDynamics Behind the Scenes”, In Proceedings of the 12th International Conference on De-tection of Intrusions and Malware, and Vulnerability Assessment, DIMVA 2015, Milan, Italy,August 9-10, 2015. (Acceptance rate: 22.7%)

[84] An Wang†, Aziz Mohaisen, Wentao Chang†, and Songqing Chen. “Delving into InternetDDoS Attacks by Botnets: Characterization and Analysis”. In Proceeding of the 45th AnnualIEEE/IFIP International Conference on Dependable Systems and Networks, DSN 2015, Rio deJaneiro, Brazil, June 22-25, 2015. (Acceptance rate: 21.8%) –40+ citations!

[85] Wentao Chang†, Aziz Mohaisen, An Wang†, and Songqing Chen. “Measuring Botnets inthe Wild: Some New Trends”. In Proceedings of the 10th ACM Symposium on Information,Computer and Communications Security, ASIACCS 2015, Singapore, April 14-17, 2015. (Ac-ceptance rate: 22.3%) –30+ citations!

[86] Aziz Mohaisen, Omar Alrawi†, Andrew West, Allison Mankin. “Chatter: Classifying mal-ware families using system event ordering ”. In Proceeding of the IEEE Conference on Com-munications and Network Security, CNS 2014, San Francisco, CA, USA, October 29-31, 2014(Acceptance rate: 26%) –25+ citations!

[87] Aziz Mohaisen and Matt Thomas. “Measuring the Leakage of Onion at the Root”. In Pro-ceedings of the 13th Workshop on Privacy in the Electronic Society, WPES 2014, Scottsdale,AZ, USA, November 3, 2014. (Acceptance rate: 25%). Also In Proceedings of the Workshopon Hot Topics in Privacy Enhancing Technologies, HotPETS, Amsterdam, Netherlands, July18, 2014. (Acceptance rate: 33%)

[88] Galileo Namata, Andrew G. West, and Aziz Mohaisen. “Web of Redirection: Measuring Do-main Forwarding and Applications at Internet-scale” In Proceedings of the 2014 InternetMeasurement Conference, IMC 2014, Vancouver, BC, Canada, November 5-7, 2014. (Accep-tance rate: 22%) (withdrawn by verisign).

[89] Aziz Mohaisen and Omar Alrawi†. “AV-Meter: An Evaluation of Antivirus Scans and La-bels”. In Proceedings of the 11th International Conference on Detection of Intrusions and Mal-ware, and Vulnerability Assessment, DIMVA 2014, Egham, UK, July 10-11, 2014. (Acceptancerate: 23.3%) –50+ citations!

[90] Andrew West and Aziz Mohaisen. “Metadata-driven Threat Classification of Network End-points Appearing in Malware”. In Proceedings of the 11th International Conference on Detec-tion of Intrusions and Malware, and Vulnerability Assessment, DIMVA 2014, Egham, UK, July10-11, 2014. (Acceptance rate: 23.3%)

[91] Ahmed Kosba†, Aziz Mohaisen, Andrew West, Trevor Tonn, Huy Kang Kim. “ADAM: Au-tomated Detection and Attribution of Malicious Webpages”. In Proceedings of the 15thInternational Conference on Information Security Applications, WISA 2014, Jeju, Korea, Aug25-27, 2014. (Acceptance rate: 33%)

[92] Hyun Jae Kang§, Jae-wook Jang§, Aziz Mohaisen and Huy Kang Kim. “AndroTracker: Cre-ator Information based Android Malware Classification System”. In Proceedings of the15th International Conference on Information Security Applications, WISA 2014, Jeju, Korea,Aug 25-27, 2014. (Acceptance rate: 33%)

13

Page 15: Curriculum Vitae - cs.ucf.edumohaisen/CV/CV_Mohaisen.pdf · 08/2015–08/2017 Assistant Professor, Computer Science, University at Buffalo 03/2017–08/2017 Visiting Researcher,

[93] Aziz Mohaisen, Mansurul Bhuiyan†, and Yannis Labrou. “Name Server Switching: AnomalySignatures, Usage, Clustering, and Prediction”. In Proceedings of the 15th InternationalConference on Information Security Applications, WISA 2014, Jeju, Korea, Aug 25-27, 2014.(Acceptance rate: 33%)

[94] Aziz Mohaisen and Omar Alrawi†. “High-Fidelity, Behavior-based Automated MalwareAnalysis and Classification.” In Proceedings of the 15th International Conference on Infor-mation Security Applications, WISA 2014, Jeju, Korea, Aug 25-27, 2014. (Acceptance rate:33%)–Best Paper Award!.

[95] Youngbae Song§, Hyoungshick Kim and Aziz Mohaisen. “A Private Walk in the Clouds”.In Proceedings of the 11th International Conference on Trust, Privacy, and Security in DigitalBusiness, TrustBus 2014, Munich, Germany, September 2-3, 2014. (Acceptance rate: 30%)

[96] Aziz Mohaisen, Omar Alrawi†, Matt Larson, and Danny McPherson. “Towards A MethodicalEvaluation of Antivirus Scans and Labels”. In Proceedings of the 14th International Con-ference on Information Security Applications, WISA 2013, Jeju, Korea, August 19-21, 2013.(Acceptance rate: 30%)

[97] Aziz Mohaisen, Xinwen Zhang, Max Schuchard§, Haiyong Xie, Yongdae Kim. “ProtectingAccess Privacy of Cached Contents in Information Centric Networks”. In Proceedings ofthe 8th ACM Symposium on Information, Computer and Communications Security, ASIACCS2013, Hangzhou, China - May 08-10, 2013. (Acceptance rate: 28%) –45+ citations!

[98] Aziz Mohaisen, Huy Tran?, Abhishek Chandra, and Yongdae Kim. “Trustworthy distributedcomputing on social networks”. In Proceedings of the 8th ACM Symposium on Informa-tion, Computer and Communications Security, ASIACCS 2013, Hangzhou, China - May 08-10,2013. (Acceptance rate: 28%) –40+ citations!

[99] Aziz Mohaisen and Yongdae Kim. “Dynamix: anonymity on dynamic social structures”.In Proceedings of the 8th ACM Symposium on Information, Computer and CommunicationsSecurity, ASIACCS 2013, Hangzhou, China - May 08-10, 2013. (Acceptance rate: 28%)

[100] Myungsun Kim§, Aziz Mohaisen, Jung Hee Cheon, Yongdae Kim. “Private Over-thresholdAggregation Protocols”. In Proceedings of the 15th International Conference on InformationSecurity and Cryptology, ICISC 2012, Seoul, Korea, November 28-30, 2012. (Acceptance rate:25%)

[101] Aziz Mohaisen, Huy Tran?, Nicholas Hopper, and Yongdae Kim. “On the Mixing Time of Di-rected Social Graphs and Security Implications”. In Proceedings of the 7th ACM Symposiumon Information, Computer and Communications Security, ASIACCS 2012, Seoul, Korea, May2-4, 2012. (Acceptance rate: 18%)

[102] Ting Zhu, Aziz Mohaisen, Yi Ping, and Don Towsley. “DEOS: Dynamic energy-orientedscheduling for sustainable wireless sensor networks”. In Proceedings of the 31st IEEEInternational Conference on Computer Communications, INFOCOM 2012, Orlando, FL, USA,March 25-30, 2012. (Acceptance rate: 18%) –50+ citations!

[103] Aziz Mohaisen, Pengkui Luo, Yanhua Li, Yongdae Kim, Zhi-Li Zhang. “Measuring Bias in theMixing Time of Social Graphs due to Graph Sampling”. In Proceedings of the 2012 MilitaryCommunications Conference, MILCOM 2012, Orlando, FL, USA, Oct 29, 2012. (Acceptancerate: 38%)

14

Page 16: Curriculum Vitae - cs.ucf.edumohaisen/CV/CV_Mohaisen.pdf · 08/2015–08/2017 Assistant Professor, Computer Science, University at Buffalo 03/2017–08/2017 Visiting Researcher,

[104] Aziz Mohaisen, Tamer AbuHmed, Ting Zhu, and Manar Mohaisen. “Collaboration in socialnetwork-based information dissemination”. In Proceedings of IEEE International Conferenceon Communications, ICC 2012, Ottawa, ON, Canada, June 10-15, 2012. (Acceptance rate:36%)

[105] Aziz Mohaisen, Nicholas Hopper, and Yongdae Kim. “Keep your friends close: Incorpo-rating trust into social network-based sybil defenses”. In Proceedings of the 30th IEEEInternational Conference on Computer Communications, INFOCOM 2011, Shanghai, China,April 10-15, 2011. (Acceptance rate: 16%) –100+ citations!

[106] Max Schuchard, Aziz Mohaisen, Eugene Vasserman, Denis Foo Kune, Nicholas Hopper, andYongdae Kim. “Losing control of the internet: using the data plane to attack the controlplane”. In Proceedings of the Network and Distributed System Security Symposium, NDSS 2011,San Diego, CA, USA, Feb 6-9, 2011. (Acceptance rate: 18%) –∼ 100 citations!

[107] Aziz Mohaisen, Tamer AbuHmed, Hun Jeong Kang, Yongdae Kim, and DaeHun Nyang. “Mis-taking friends for foes: an analysis of a social network-based sybil defense”. In Proceed-ings of the 5th International Conference on Ubiquitous Information Management and Commu-nication, IMCOM 2011, Seoul, Korea, 2011. (Acceptance rate: 25%)

[108] Manar Mohaisen, Aziz Mohaisen, Yanhua Li, and Pengkui Luo. “Parallel QRD-M encoder fordecentralized multi-user MIMO systems”. In Proceedings of IEEE International Conferenceon Communications, ICC 2011, Kyoto, Japan, 5-9 June, 2011. (Acceptance rate: 38%)

[109] Aziz Mohaisen, Aaram Yun, and Yongdae Kim. “Measuring the mixing time of socialgraphs”. In Proceedings of the 10th ACM Internet Measurement Conference, IMC 2010, Mel-bourne, Australia, Nov 1-3, 2010. (Acceptance rate: 22%)–170+ citations!

[110] Aziz Mohaisen, Nam-Su Jho, and Dowon Hong. “A computationally-efficient constructionfor key distribution in sensor network”. In Proceedings of the Third International Conferenceon Advances in Information Security and Assurance, ISA 2009, Seoul, Korea, June 25-27, 2009.(Acceptance rate: 29.9%)

[111] Aziz Mohaisen and Dowon Hong. “Privacy preserving association rule mining revisited”.In Proceedings of the 9th International Conference on Information Security Applications, WISA2008, Jeju, Korea, September 23-25, 20-8. (Acceptance rate: 25%)

[112] Aziz Mohaisen, Dowon Hong, and DaeHun Nyang. “Privacy in location based services:Primitives toward the solution”. In Proceeding of the Fourth International Conference onNetworked Computing and Advanced Information Management, NCM 2008, Gyeongju, Korea,September 2-4, 2008. (Acceptance rate: 30%)

[113] Aziz Mohaisen, Ik Rae Jeong, Dowon Hong, Nam-Su Jho, and DaeHun Nyang. “Data ran-domization for lightweight data aggregation”. In Proceedings of the 5th International Conf.on Ubiquitous Intel. and Computing, UIC 2008, Oslo, Norway, June 23-25, 2008. (Acceptancerate: 26%)

[114] Aziz Mohaisen, Youngjae Maeng, Jeonil Kang, Daehun Nyang, Kunghee Lee, Dowon Hong,and J. Han. “Protection techniques of secret information in devices of smart home net-work”. In Proceedings of the 5th International Conf. on Ubiquitous Intel. and Computing, UIC2008, Oslo, Norway, June 23-25, 2008. (Acceptance rate: 26%)

15

Page 17: Curriculum Vitae - cs.ucf.edumohaisen/CV/CV_Mohaisen.pdf · 08/2015–08/2017 Assistant Professor, Computer Science, University at Buffalo 03/2017–08/2017 Visiting Researcher,

[115] YoungJae Maeng, Aziz Mohaisen, and DaeHun Nyang. “Secret key revocation in sensornetworks”. In Proceedings of the 4th International Conference on Ubiquitous Intelligence andComputing, UIC 2007, Hong Kong, China, July 11-13, 2007. (Acceptance rate: 25.7%)

[116] Aziz Mohaisen, DaeHun Nyang, YoungJae Maeng, and KyungHee Lee. “Structures for communication-efficient public key revocation in ubiquitous sensor network”. In Third International Con-ference on Mobile Ad-Hoc and Sensor Networks, MSN 2007, Beijing, China, December 12-14,2007. (Acceptance rate: 24.7%)

[117] Aziz Mohaisen and DaeHun Nyang. “Hierarchical grid-based pairwise key predistributionscheme for wireless sensor networks”. In Third European Conference on Wireless Sensor Net-works, EWSN 2006, Zurich, Switzerland, February 13-15, 2006. (Acceptance rate: 15.8%)–30+ citations!

[118] DaeHun Nyang and Aziz Mohaisen. “Cooperative public key authentication protocol inwireless sensor network”. In Proceedings of the 3rd International Conference on UbiquitousIntelligence and Computing, UIC 2006, Wuhan, China, September 3-6, 2006. (Acceptancerate: 30%)

7.4 Workshop Publications

[119] Muhammad Saad, Ashar Ahmad, Aziz Mohaisen. “Fighting Fake News Propagation withBlockchains (short paper)”. In 2nd International Workshop on Distributed Ledger of Things(DLoT) in conjunction with IEEE CNS, Washington, D.C., June 13, 2019.

[120] Muhammad Saad, Laurent Njilla, Charles Kamhoua, and Aziz Mohaisen, “Countering SelfishMining in Blockchains”, in IEEE Workshop on Computing, Networking and Communications(CNC 2019).

[121] Ashar Ahmad, Muhammad Saad, Mostafa Bassiouni, and Aziz Mohaisen, “Towards Blockchain-Driven, Secure and Transparent Audit Logs”, in 1st International Workshop on DistributedLedger of Things (DLoT) in conjunction with MobiQuitous. New York City, USA, Nov. 5,2018. Best Paper Award!.

[122] Muhammad Saad§, Aziz Mohaisen. “Towards Characterizing Blockchain-based Cryptocur-rencies for Highly-Accurate Predictions.” In Hot Topics in Pervasive Mobile and OnlineSocial Networking, HotPOST 2018 (in conjunction with IEEE INFOCOM 2018), Honolulu,HI, USA, April 16, 2018.

[123] MyungJae Shin, Joongheon Kim, Aziz Mohaisen, Jaebok Park, Kyung Hee Lee. “Neural Net-work Syntax Analyzer for Embedded Standardized Deep Learning”. In the 2nd Inter-national Workshop on Embedded and Mobile Deep Learning, EMDL18 (in conjunction withACM MobiSys 2018), Munich, Germany, June 15, 2018.

[124] Aziz Mohaisen, Omar Al Ibrahim‡, Charles Kamhoua Kevin Kwiat, Laurent Njilla. “Rethink-ing Information Sharing for Actionable Threat Intelligence”. In Proceeding of the FifthACM/IEEE Workshop on Hot Topics in Web Systems and Technologies, HotWeb 2017, San Jose,CA, USA, October 14, 2017. (Acceptance rate: 38%)

16

Page 18: Curriculum Vitae - cs.ucf.edumohaisen/CV/CV_Mohaisen.pdf · 08/2015–08/2017 Assistant Professor, Computer Science, University at Buffalo 03/2017–08/2017 Visiting Researcher,

[125] Jeffrey Spaulding§, DaeHun Nyang and Aziz Mohaisen. “Understanding the Effectivenessof Typosquatting Techniques”. In Proceeding of the Fifth ACM/IEEE Workshop on Hot Top-ics in Web Systems and Technologies, HotWeb 2017, San Jose, CA, USA, October 14, 2017.(Acceptance rate: 38%)

[126] Young Jong Mo§, Joongheon Kim, Jong-Kook Kim, Aziz Mohaisen, and Woojoo Lee. “Per-formance of Deep Learning Computation with TensorFlow Software Library in GPU-Capable Multicore Computing Platforms”. The 1st International Workshop on MachineIntelligence and Learning (in conjunction with The 9th International Conference on Ubiqui-tous and Future Networks; ICUFN), Milan, Italy July 4-7, 2017.

[127] Ah Reum Kang‡, Seong Hoon Jeong?, Steve Ko, Kui Ren, and Aziz Mohaisen. “Transparencyin the New gTLD Era: Evaluating the DNS Centralized Zone Data Service”. In Proceedingof the Fourth IEEE Workshop on Hot Topics in Web Systems and Technologies, HotWeb 2016,Washington, D.C., USA, October 24-25, 2016. (Acceptance rate: Acceptance rate unknown)

[128] Omar Alrawi† and Aziz Mohaisen. “Chains of Distrust: Towards Understanding Certifi-cates Used for Signing Malicious Applications”. In Proceedings of the 25th InternationalConference on World Wide Web (companion volume), WWW 2016, Montreal, Canada, April11-15, 2016. Workshop Paper (Acceptance rate: 42%)

[129] Aziz Mohaisen. “Towards Automatic and Lightweight Detection and Classification ofMalicious Web Contents”. In Proceeding of the Third IEEE Workshop on Hot Topics in WebSystems and Technologies, IEEE HotWeb 2015, Washington, D.C., USA, November 11-13,2015. (Acceptance rate: 50%)

[130] Matt Thomas and Aziz Mohaisen. “Kindred Domains: Detecting and Clustering BotnetDomains Using DNS Traffic”. Proceedings of the 23rd International Conference on World WideWeb (companion volume), WWW 2014, Seoul, Republic of Korea, April 7-11, 2014. Workshoppaper (Acceptance rate: 45%) –55+ citations!

[131] Aziz Mohaisen and Omar Alrawi†. “Unveiling Zeus: Automated Classification of MalwareSamples”. In Proceedings of the 22nd International Conference on World Wide Web (companionvolume), WWW 2013, Rio de Janeiro, Brazil, May 13-17, 2013 Workshop paper (Acceptancerate: 40%) –40+ citations!

[132] Aziz Mohaisen, Huy Tran?, Nicholas Hopper, and Yongdae Kim. “Understanding social net-works properties for trustworthy computing”. In Proceedings of the 31st IEEE InternationalConference on Distributed Computing Systems, ICDCS 2011 Workshops, Minneapolis, Min-nesota, USA, June 20-24, 2011. (Acceptance rate: invited)

[133] Aziz Mohaisen and Dowon Hong. “Privacy preserving association rule mining revisited”.In Proceedings of the 9th International Conference on Information Security Applications, WISA2008, Jeju, Korea, September 23-25, 20-8. (Acceptance rate: 25%)

[134] Aziz Mohaisen, YoungJae Maeng, and DaeHun Nyang. “On grid-based key pre-distribution:Better connectivity in wireless sensor network”. In Proceedings of the International Confer-ence on Emerging Technologies in Knowledge Discovery and Data Mining, PAKDD 2007 Work-shops, Nanjing, China, May 22-25, 2007. (Acceptance rate: 12%)

17

Page 19: Curriculum Vitae - cs.ucf.edumohaisen/CV/CV_Mohaisen.pdf · 08/2015–08/2017 Assistant Professor, Computer Science, University at Buffalo 03/2017–08/2017 Visiting Researcher,

7.5 Other Publications (Abstracts, Tutorials, and Demos)

[135] Ahmed Abusnaina, Aminollah Khormali, Hisham Alasmary, Jeman Park, Afsah Anwar, UlkuMeteriz and Aziz Mohaisen, “Poster: Examining Adversarial Learning against Graph-based IoT Malware Detection Systems”, Proceeding of the Network and Distributed SystemSecurity Symposium, NDSS 2019, San Diego, California, USA, February 24-27, 2018.

[136] Rhongho Jang, Seongkwang Moon, Young Tae Noh, Aziz Mohaisen and Daehun Nyang,“Poster: Scaling Up Anomaly Detection Using In-DRAM Working Set of Active FlowsTable”, Proceeding of the Network and Distributed System Security Symposium, NDSS 2019,San Diego, California, USA, February 24-27, 2018.

[137] Jinchun Choi, Afsah Anwar, Hisham Alasmary, Jeffrey Spaulding, Daehun Nyang and AzizMohaisen, “Poster: Analyzing Endpoints in the Internet of Things Malware”. Proceedingof the Network and Distributed System Security Symposium, NDSS 2019, San Diego, California,USA, February 24-27, 2018.

[138] Muhammad Saad, Victor Cook, Lan Nguyen, My T. Thai and Aziz Mohaisen, “Poster: Ex-ploring Spatial, Temporal, and Logical Attacks on the Bitcoin Network”, Proceeding of theNetwork and Distributed System Security Symposium, NDSS 2019, San Diego, California, USA,February 24-27, 2018.

[139] Hisham Alasmary, Aminollah Khormali, Afsah Anwar, Jeman Park, Jinchun Choi, DaehunNyang and Aziz Mohaisen, “Poster: Analyzing, Comparing, and Detecting Emerging Mal-ware: A Graph-based Approach”, Proceeding of the Network and Distributed System SecuritySymposium, NDSS 2019, San Diego, California, USA, February 24-27, 2018.

[140] Mohammed Abuhamad, Tamer Abuhmed, Aziz Mohaisen and Daehun Nyang, “DL-CAIS:Deep Learning-based Code Authorship Identification System”, Proceeding of the Networkand Distributed System Security Symposium, NDSS 2019, San Diego, California, USA, Febru-ary 24-27, 2018. (also in Proceedings of the 2018 ACM SIGSAC Conference on Computer andCommunications Security, CCS 2018, Toronto, Canada, October 13-17, 2018.)

[141] Aziz Mohaisen and Joongheon Kim. “Securing the Internet of Things: Machine LearningApproach”. Tutorial. Proceedings of IEEE International Conference on Communications, ICC2018, Kansas City, MO, USA, May 20-24, 2018.

[142] Afsah Anwar, Aminollah Khormali, and Aziz Mohaisen, “POSTER: Understanding the HiddenCost of Software Vulnerabilities: Measurements and Predictions”. Proceedings of 13th ACMASIA Conference on Information, Computer and Communications Security, ASIACCS 2018,Songdo, Incheon, Korea, June 4-8, 2018. (55% acceptance rate)

[143] Muhammad Saad, My T. Thai, and Aziz Mohaisen. “POSTER: Deterring DDoS Attacks onBlockchain-based Cryptocurrencies through Mempool Optimization”. Proceedings of 13thACM ASIA Conference on Information, Computer and Communications Security, ASIACCS2018, Songdo Incheon, Korea, June 4-8, 2018. (55% acceptance rate)

[144] Rhongho Jang§, Jeonil Kang‡, Aziz Mohaisen and Daehun Nyang. “ Rogue Access PointDetector Using Characteristics of Channel Overlapping in 802.11n ”. Proceedings of 37thIEEE International Conference on Distributed Computing Systems, ICDCS 2017, Atlanta, GA,USA, June 5-7, 2017. (demo; 6 pages).

18

Page 20: Curriculum Vitae - cs.ucf.edumohaisen/CV/CV_Mohaisen.pdf · 08/2015–08/2017 Assistant Professor, Computer Science, University at Buffalo 03/2017–08/2017 Visiting Researcher,

[145] Feng Shen§, Justin Del Vecchio§, Aziz Mohaisen, Steven Y. Ko and Lukasz Ziarek. “AndroidMalware Detection using Multi-Flows and API Patterns”. Proceeding of The 15th ACMInternational Conference on Mobile Systems, Applications, and Services, ACM MobiSys 2017,Niagara Falls, NY, USA, June 19th - 23rd, 2017.

[146] Rhongho Jang§, Jeonil Kang‡, Aziz Mohaisen and Daehun Nyang. “Highly-Accurate RogueAccess Point Detection using Intentional Channel Interference”. Proceedings of the 10thACM Conference on Security and Privacy in Wireless and Mobile Networks, WiSec 2017, Boston,MA, USA, July 18-20, 2017.

[147] Rhongho Jang§, Donggyu Cho§, Aziz Mohaisen, Youngtae Noh, Daehun Nyang. “Two-levelNetwork Monitoring and Management in WLAN using Software-Defined Networking”.Proceedings of the 10th ACM Conference on Security and Privacy in Wireless and Mobile Net-works, WiSec 2017, Boston, MA, USA, July 18-20, 2017.

[148] Jeffrey Spaulding§, Shambhu Upadhyaya and Aziz Mohaisen. “You’ve Been Tricked! AUser Study of the Effectiveness of Typosquatting Techniques”. Proceedings of 37th IEEEInternational Conference on Distributed Computing Systems, ICDCS 2017, Atlanta, GA, USA,June 5-7, 2017. (abstract; 4 pages), 2017.

[149] Seong Hoon Jeong?, Ah Reum Kang‡, Joongheon Kim, Huy Kang Kim, and Aziz Mohaisen. “A Longitudinal Analysis of .i2p Leakage in the Public DNS Infrastructure ” In Proceedingsof the 2016 ACM Conference on Special Interest Group on Data Communication, SIGCOMM2016, Brazil, August 22-26, 2016. (Acceptance rate: 38%)

[150] Mee Lan Han§, H.-C. Han§, Ah Reum Kang‡, Byung Il Kwak§, Aziz Mohaisen, Huy KangKim. “WHAP: Web-Hacking Profiling Using Case-Based Reasoning”. In Proceedings of IEEEConference on Communications and Network Security, CNS 2016, Philadelphia, PA, USA, Oct.17-19, 2016

[151] Ah Reum Kang‡ and Aziz Mohaisen. “Automatic Alerts Annotation for Improving DDoSMitigation Systems” In Proceedings of IEEE Conference on Communications and Network Se-curity, CNS 2016, Philadelphia, PA, USA, Oct. 17-19, 2016

[152] An Wang†, Wentao Chang†, Aziz Mohaisen, and Songqing Chen. “How Distributed AreToday’s DDoS Attacks”. In Proceedings of the 2014 ACM SIGSAC Conference on Computer andCommunications Security, CCS 2014, Scottsdale, AZ, USA, November 3-7, 2014.

[153] Hesham Z. Mekky†, Aziz Mohaisen, and Zhi-Li Zhang. “Separating Benign and MalwareEvents for Accurate Malware Classification”. In Proceedings of the 2014 ACM SIGSAC Con-ference on Computer and Communications Security, CCS 2014, Scottsdale, AZ, USA, November3-7, 2014.

[154] Wentao Chang†, An Wang†, Aziz Mohaisen, and Songqing Chen. “Characterizing Botnets-as-a-Service”. In Proceedings of the 2014 ACM Conference on Special Interest Group on DataCommunication, SIGCOMM 2014, Chicago, Illinois, USA, August 22, 2014. (Acceptance rate:38%)

[155] Aziz Mohaisen, Omar Alrawi†, Andrew West, Allison Mankin. “Babble: Identifying Mal-ware by Its Dialects”. In Proceeding of the IEEE Conference on Communications and NetworkSecurity, CNS 2013, National Harbor, MD, USA, October 14-16, 2013

19

Page 21: Curriculum Vitae - cs.ucf.edumohaisen/CV/CV_Mohaisen.pdf · 08/2015–08/2017 Assistant Professor, Computer Science, University at Buffalo 03/2017–08/2017 Visiting Researcher,

[156] Ahmed E. Kosba†, Aziz Mohaisen, Andrew West, Trevor Tonn. “ADAM: Automated Detec-tion and Attribution of Malicious Webpages”. In Proceeding of the IEEE Conference on Com-munications and Network Security, CNS 2013, National Harbor, MD, USA, October 14-16,2013–Best Poster Award!.

[157] Aziz Mohaisen, Xinwen Zhang, Max Schuchard, Haeyong Xie, Yongdae Kim. “ProtectingAccess Privacy of Cached Contents in Information Centric Networks”. In Proceedings ofACM Conference on Computer and Communications Security, CCS 2012, Raleigh, NC, USA,October 16-18, 2012.

7.6 Panels

[158] Aziz Mohaisen (with Moti Yung (Google/Columbia), Xinxin Fan (IoTeX), Ning Zhang (WUSTL),Hong-Sheng Zhou (VCU)), “Blockchain Meets Internet of Things: Opportunities and Chal-lenges”, The 1st Workshop on Distributed Ledger of Things, DLoT 2018, New York City, NY,USA, Nov 1, 2018.

[159] Aziz Mohaisen (with Wenjing Lou; Virginia Tech, Prateek Saxena; National University of Sin-gapore, and Stanley Yong; IBM). “Blockchain and its Emerging Applications”. InternationalConference on Security and Privacy in Communication Networks, SecureComm 2018, Singa-pore, August 8-10, 2018

[160] Aziz Mohaisen (with Andreas Hulsing, Burt Kaliski, David McGrew, Russ Housley). “Shoringup the Infrastructure: A strategy for Standardizing Hash Signatures”. Workshop on Cy-bersecurity in a Post-Quantum World, Gaithersburg, MD, USA, April 2, 2015.

[161] Aziz Mohaisen (with Wenjing Lou, Sushil Jajodia, Neeraj Suri, and Mukesh Singhal). “Net-works Security: The Triumph and Tribulation”. Proceeding of the IEEE Conference on Com-munications and Network Security, CNS 2014, San Francisco, CA, USA, October 29-31, 2014

7.7 Patents

[162] Aziz Mohaisen, Maliheh Shirvanian, and Craig Murray:Access control for named domain networking.USPTO, 14/868594, 2017.

[163] Eric Osterweil, Murray, Mohaisen, Mcpherson:Methods and systems for domain NDN.USPTO, 15147387, 2017.

[164] Mankin, Mohaisen, Tonn.Classifying malware by order of network artifacts.USPTO, 14/507330, 2016.

[165] Mekky and Mohaisen.Methods for separating malware and background events.USPTO, 14/923210, 2016.

[166] Alam, Labrou, Mohaisen.DNS applications based on changes of name servers.USPTO, 14/510655, 2015

20

Page 22: Curriculum Vitae - cs.ucf.edumohaisen/CV/CV_Mohaisen.pdf · 08/2015–08/2017 Assistant Professor, Computer Science, University at Buffalo 03/2017–08/2017 Visiting Researcher,

[167] Mohaisen et al.Systems and methods for malware analysis and classificationUSPTO, 14/186644, 2015.

[168] Mohaisen.Systems, devices, and methods for protecting privacy of cached content.USPTO, 14/269484, 2014.

[169] Jho, Mohaisen, and Hong.Method for privacy protection in association mining.USPTO, 8745696, 2014.

[170] Mohaisen and Hong.Method and apparatus for private clusteringUSPTO, 8112386, 2012.

8 Selected Talks

• Large-Scale and Language-Oblivious Code Authorship Identification11/2019 George Mason University02/2019 Embry-Riddle Aeronautical University12/2018 Zhejiang University10/2018 ACM CCS 2018

• Understanding blockchain systems via attack surface analysis06/2019 IEEE LightChain 2019 (keynote)06/2018 AFRL, Rome, NY

• Securing the Internet of Things: A Machine Learning Approach06/2018 Inha University05/2018 IEEE ICC 2018 (tutorial)

• Assessing the Attack Surface of Blockchain11/2017 Army/CERDEC symposium on blockchain, MD10/2017 NATO Innovation Hub/Old Dominion, VA06/2017 Air Force Research Laboratory, Rome, NY

• Defeating Automated Internet-scale Threats03/2017 University of Central Florida

• A data-driven approach to DDoS defenses08/2016 Korea University, Seoul, Korea08/2016 Inha University, Incheon, Korea08/2016 Chung Ang University, Seoul, Korea08/2016 SungKyunKwan University, Suwon, Korea08/2016 Soongshil University, Seoul, Korea08/2016 ETRI, Daejeon, Korea08/2016 Air Force Research Lab, Rome, NY

• Malware: An Introduction08/2016 Information Assurance and Management (UB)

• Measurement of Leakage of .Onion at the Root10/2014 University of California, Irvine10/2014 ICANN 51, Los Angeles, CA

21

Page 23: Curriculum Vitae - cs.ucf.edumohaisen/CV/CV_Mohaisen.pdf · 08/2015–08/2017 Assistant Professor, Computer Science, University at Buffalo 03/2017–08/2017 Visiting Researcher,

• Dissecting bad codes with AMAL, Chatter, and AVMeter05/2015 University at Buffalo04/2014 Princeton University04/2014 Virginia Tech10/2013 George Mason University08/2013 Korea Advanced Institute of Science and Technology08/2013 Korea University08/2013 Inha University

• Towards Trustworthy Computing on Social Networks04/2012 Verisign Labs04/2012 Korea University04/2012 Inha University04/2012 ETRI01/2012 Princeton University

9 University Service

University of Central Florida:2019– Chair College Promotion Instructors/Lecturers Committee2019– Member Department Promotion and Tenure Committee (CS)2019– Member Department Graduate Committee (CS)2019– Lead Department Security Area – Grad admission.2019–2020 Member Department Cyber security and privacy FCI search committee2018– Chair Department Computer Security Technical Research Area Committee2018–2020 Member University Faculty Senate2018–2020 Member University Graduate Policy Committee, Graduate Council2017–2022 Lead University INHA-UCF dual Ph.D. program2017–2018 Member Department Cyber security and privacy lead search committee

University at Buffalo, SUNY2015–2017 Member Colloquium committee2015–2017 Member Graduate studies committee2015–2017 Member Graduate admissions committee

10 Professional Service

10.1 Journal Editorial Board

• co-Editor-in-Chief, EAI Transactions on Security and Safety (2019–)• Associate Editor, Elsevier Computer Networks (2019–)• Associate Editor, IEEE Transactions on Mobile Computing (2018–)• Area Editor, ETRI Journal (2017–)• Area Editor, KSII Transactions on Internet and Information Systems (2015–2016)

10.2 Membership in Organizing Committees

• General co-chair: ACM CoNEXT 2019• TPC co-chair: EAI SECURECOMM 2019

22

Page 24: Curriculum Vitae - cs.ucf.edumohaisen/CV/CV_Mohaisen.pdf · 08/2015–08/2017 Assistant Professor, Computer Science, University at Buffalo 03/2017–08/2017 Visiting Researcher,

• TPC co-chair: IEEE ICPADS 2019 (Security & Dependable Computing track)• TPC co-chair: IEEE ICC 2019 (Security Track)• TPC co-chair: IEEE ICASSP 2018 (security track)• TPC co-chair: IEEE MASS 2018 (security track)• TPC co-chair: ACM AsiaCCS-SCC 2018• TPC co-chair: IEEE HotPOST 2017 (with IEEE ICDCS 2017)• TPC co-chair: IEEE TRUSTCOM 2016 (privacy track)• TPC co-chair: IEEE SIMPLEX 2016–2013• Posters co-chair: ACM WiSec 2019• Posters co-chair: IEEE PAC 2017• Publicity co-chair: IEEE CNS 2020• Publicity co-chair: ACM ASIACCS 2018• Publicity co-chair: IEEE PAC 2017• Workshops co-chair: ACM/IEEE SEC 2019• Workshops co-chair: IEEE DSC 2019• Workshops co-chair: SECURECOMM (2018, 2017)• PC Meeting Organizer: IEEE INFOCOM 2020• Treasurer: ACM MobiSys 2017• Travel co-chair: IEEE CNS 2016• Travel committee member: ISOC NDSS 2018• Session Chair: WISA 2019• Session Chair: ACM/IEEE SEC 2018 (workshops)• Session Chair: SECURECOMM 2018• Session Chair: CSoNET 2018• Session Chair: NDSS 2018• Session Chair: ICDCS 2017• Session Chair: INFOCOM 2017• Session Chair: WISA (2016, 2013)• Session Chair: IEEE CNS (2016, 2014)• Session Chair: ACM HotWeb (2015, 2017)• Session Chair: ASIACCS (2013, 2018)• Session Chair: ICISC 2012• Session Chair: STC 2012.

10.3 Program Committee Member

• Program Committee: PETS 2020, 2019.• Program Committee: IEEE ICDCS 2020, 2019, 2018, 2017, 2014.• Program Committee: IEEE INFOCOM 2020, 2019, 2018, 2017• Program Committee: IEEE CNS 2019, 2017, 2016, 2014• Program Committee: ACM ASIACCS 2018, 2016, 2015, 2014• Program Committee: SECURECOMM 2019, 2018, 2017, 2016• Program Committee: AAAI ICWSM 2018, 2016, 2014

23

Page 25: Curriculum Vitae - cs.ucf.edumohaisen/CV/CV_Mohaisen.pdf · 08/2015–08/2017 Assistant Professor, Computer Science, University at Buffalo 03/2017–08/2017 Visiting Researcher,

• Program Committee: IEEE CLOUD 2019, 2018• Program Committee: ISOC NDSS 2018• Program Committee: IEEE ICCCN 2017, 2016• Program Committee: IEEE GLOBECOMM 2017, 2016, 2014• Program Committee: IEEE MILCOM 2018, 2017, 2016, 2015, 2014• Program Committee: IFIP DBSEC 2017, 2016• Program Committee: IEEE ICC 2018, 2017, 2016, 2015• Program Committee: DIMVA 2015, 2014• Program Committee: WWW 2015, 2014• Program Committee: ACM SCC 2015, 2014, 2013• Program Committee: ISOC SENT 2015, 2014• Program Committee: HOTPOST 2015, 2014, 2013, 2012• Program Committee: ICISC 2015, 2014, 2013, 2012• Program Committee: IFIP Networking 2013• Program Committee: ACM STC 2012

10.4 Journals Reviewer

• ACM Computing Surveys (2015)• ACM Transactions on Information and System Security (2019–2013)• ACM/IEEE Transactions on Networking (2018–2013)• ETRI Journal (2017–2012, 2009–2007)• IEEE Communication Letters (2015–2012, 2010, 2009)• IEEE Transactions on Cloud Computing (2019, 2015)• IEEE Transactions on Computers (2019)• IEEE Transactions on Dependable and Secure Computing (2019–2012)• IEEE Transactions on Mobile Computing (2019–2015)• IEEE Transactions on Services Computing (2017, 2016)• IEEE Transactions on Big Data (2019–2016)• IEEE Transactions on Knowledge and Data Engineering (2016–2014)• IEEE Transactions on Internet of Things (2019–2017)• IEEE Internet Computing (2019)• IET Information Security (2017)• Journal of Communications and Networks (2015–2013)• Proceedings of IEEE (2019)• Elsevier Journal of Network and Computer Applications (2019, 2020).• Security and Communication Networks (2013)• Springer Cluster Computing (2017)• Springer Computational Social Networks (2015, 2014)• Springers International Journal of Information Security (2017, 2015, 2013)• Springer Journal of Supercomputing (2015)• KSII Transactions on Internet and Information Systems (2015–2011); editor (2015–2016)

24

Page 26: Curriculum Vitae - cs.ucf.edumohaisen/CV/CV_Mohaisen.pdf · 08/2015–08/2017 Assistant Professor, Computer Science, University at Buffalo 03/2017–08/2017 Visiting Researcher,

10.5 Funding Proposals Reviewer

• European Research Council (ERC; 2018)• US National Science Foundation (2018, 2017, and 2016); programs: Nets, CSR, and SaTC.• US Department of Homeland Security (2018, 2016)• US Army Research Office (2017)• National Science Centre (Narodowe Centrum Nauki of Poland (NCN; 2018)

11 Media Coverage

12/19/2017, ACM Tech News, Your Smartphone’s Next Trick? Fighting Cybercrime12/15/2017, New Atlas, Using smartphone photos as fingerprints could help fight identity theft06/12/2017, The Register, Who will save us from voice recog foolery...06/09/2017, Edgy Labs, How This app Uses Your Smart Phone Compass Against Voice Hacking06/08/2017, Net Dug Out, Voice hacking can be stopped using smartphone’s compass06/07/2017, Inverse, Your Phone Compass Can Stop Voice Hacks for This Scientific Reason06/06/2017, Futurity, App could keep hackers from stealing your voice06/06/2017, Hack Read, New App Will Stop Voice Hacks Using Smartphone Compass06/06/2017, Phys.org, App uses smartphone compass to stop voice hacking06/06/2017, Financial Express, Siri, WeChat may put you at voice hacking risk: Study06/06/2017, Tech Radar, Your smartphone’s compass can protect you from voice hacks06/06/2017, NDTV, Siri, WeChat and Other Apps May Put You at Risk of Voice Hacking: Study06/05/2017, Science Daily, App uses smartphone compass to stop voice hacking03/17/2016, Slate, Be Careful. Mistyping a Website URL Could Expose You to Malware.06/22/2014, Deepdotweb, Estimating hidden service traffic from DNS leaks12/16/2011, msn.com, The Social Cloud: distributed computing services from social networks12/15/2011, The Verge, Researchers testing a social-based distributed computing network12/15/2011, Data News, Grid computing met je vrienden (Grid computing with your friends)12/14/2011, MIT Technology Review, The Imminent Rise of Social Cloud Computing02/24/2011, Info Packets, Grad Students Theorize on How to Crash the Internet02/23/2011, Infosec Island, Cyber Weapon Capable of Crashing the Internet?02/15/2011, Minnesota Daily, U research exposes Web threat,02/14/2011, Slashdot, How to crash the Internet02/14/2011, Metro, Cyberweapon capable of wiping out internet developed02/13/2011, The Register, Boffins devise ’cyberweapon’ to take down internet,02/12/2011, Gizmodo, The Cyberweapon That Could Take Down The Internet02/12/2011, CBS News, New Cyberweapon Could Take Down the Internet02/12/2011, Geekosystem, Cyberweapon to Take Down Internet... whenever02/12/2011, ISSSource, Internet Ripe for Crash02/11/2011, New Scientist, The cyberweapon that could take down the internet

12 Societies and Memberships

ACM (Student member since 2006, member since 2012, senior member since 2018).IEEE (Student member since 2005, member since 2012, senior member since 2015).ISOC (Internet Society; member since 2012).

25