Publications

Discover our research contributions to Cybersecurity and AI Security published in leading conferences and journals. Our publications reflect our commitment to advancing knowledge in secure artificial intelligence, threat mitigation, and innovative security solutions.

263 entries « 1 of 6 »

2025

Yoosuf, Shehel; Ali, Temoor; Lekssays, Ahmed; AlSabah, Mashael; Khalil, Issa

StructTransform: A Scalable Attack Surface for Safety-Aligned Large Language Models Proceedings Article

In: Nicomette, Vincent; Benzekri, Abdelmalek; Boulahia-Cuppens, Nora; Vaidya, Jaideep (Ed.): Computer Security - ESORICS 2025 - 30th European Symposium on Research in Computer Security, Toulouse, France, September 22-24, 2025, Proceedings, Part I, pp. 488–507, Springer, 2025.

Links | BibTeX

Lai, Phung; Liu, Guanxiong; Phan, NhatHai; Khalil, Issa; Khreishah, Abdallah; Wu, Xintao

A Client-level Assessment of Collaborative Backdoor Poisoning in Non-IID Federated Learning Proceedings Article

In: 45th IEEE International Conference on Distributed Computing Systems, ICDCS 2025, Glasgow, United Kingdom, July 21-23, 2025, pp. 1–11, IEEE, 2025.

Links | BibTeX

Tran, Khang; Fioretto, Ferdinando; Khalil, Issa; Thai, My T.; Phan, Linh Thi Xuan; Phan, NhatHai

FairDP: Achieving Fairness Certification with Differential Privacy Proceedings Article

In: IEEE Conference on Secure and Trustworthy Machine Learning, SaTML 2025, Copenhagen, Denmark, April 9-11, 2025, pp. 956–976, IEEE, 2025.

Links | BibTeX

Deniz, Fatih; Nabeel, Mohamed; Yu, Ting; Khalil, Issa

MANTIS: Detection of Zero-Day Malicious Domains Leveraging Low Reputed Hosting Infrastructure Proceedings Article

In: Blanton, Marina; Enck, William; Nita-Rotaru, Cristina (Ed.): IEEE Symposium on Security and Privacy, SP 2025, San Francisco, CA, USA, May 12-15, 2025, pp. 1789–1807, IEEE, 2025.

Links | BibTeX

Lekssays, Ahmed; Mouhcine, Hamza; Tran, Khang; Yu, Ting; Khalil, Issa

LLMxCPG: Context-Aware Vulnerability Detection Through Code Property Graph-Guided Large Language Models Proceedings Article

In: Bauer, Lujo; Pellegrino, Giancarlo (Ed.): 34th USENIX Security Symposium, USENIX Security 2025, Seattle, WA, USA, August 13-15, 2025, pp. 489–507, USENIX Association, 2025.

Links | BibTeX

Popovic, Dorde; Sadeghi, Amin; Yu, Ting; Chawla, Sanjay; Khalil, Issa

DeBackdoor: A Deductive Framework for Detecting Backdoor Attacks on Deep Models with Limited Data Proceedings Article

In: Bauer, Lujo; Pellegrino, Giancarlo (Ed.): 34th USENIX Security Symposium, USENIX Security 2025, Seattle, WA, USA, August 13-15, 2025, pp. 6419–6438, USENIX Association, 2025.

Links | BibTeX

Deniz, Fatih; Nabeel, Mohamed; Yu, Ting; Khalil, Issa

MANTIS: Detection of Zero-Day Malicious Domains Leveraging Low Reputed Hosting Infrastructure Journal Article

In: CoRR, vol. abs/2502.09788, 2025.

Links | BibTeX

Yoosuf, Shehel; Ali, Temoor; Lekssays, Ahmed; AlSabah, Mashael; Khalil, Issa

StructTransform: A Scalable Attack Surface for Safety-Aligned Large Language Models Journal Article

In: CoRR, vol. abs/2502.11853, 2025.

Links | BibTeX

Popovic, Dorde; Sadeghi, Amin; Yu, Ting; Chawla, Sanjay; Khalil, Issa

DeBackdoor: A Deductive Framework for Detecting Backdoor Attacks on Deep Models with Limited Data Journal Article

In: CoRR, vol. abs/2503.21305, 2025.

Links | BibTeX

Lai, Phung; Liu, Guanxiong; Phan, NhatHai; Khalil, Issa; Khreishah, Abdallah; Wu, Xintao

A Client-level Assessment of Collaborative Backdoor Poisoning in Non-IID Federated Learning Journal Article

In: CoRR, vol. abs/2504.12875, 2025.

Links | BibTeX

Deniz, Fatih; Popovic, Dorde; Boshmaf, Yazan; Jeong, Euisuh; Ahmad, Minhaj; Chawla, Sanjay; Khalil, Issa

aiXamine: Simplified LLM Safety and Security Journal Article

In: CoRR, vol. abs/2504.14985, 2025.

Links | BibTeX

Nguyen, Tuan; Khan, Naseem; Khalil, Issa

CapsFake: A Multimodal Capsule Network for Detecting Instruction-Guided Deepfakes Journal Article

In: CoRR, vol. abs/2504.19212, 2025.

Links | BibTeX

Khan, Naseem; Nguyen, Tuan; Bermak, Amine; Khalil, Issa

CAMME: Adaptive Deepfake Image Detection with Multi-Modal Cross-Attention Journal Article

In: CoRR, vol. abs/2505.18035, 2025.

Links | BibTeX

Khan, Naseem; Al-Tamimi, Aref; Bermak, Amine; Khalil, Issa M.

Adaptive Malware Detection using Sequential Feature Selection: A Dueling Double Deep Q-Network (D3QN) Framework for Intelligent Classification Journal Article

In: CoRR, vol. abs/2507.04372, 2025.

Links | BibTeX

Lekssays, Ahmed; Mouhcine, Hamza; Tran, Khang; Yu, Ting; Khalil, Issa

LLMxCPG: Context-Aware Vulnerability Detection Through Code Property Graph-Guided Large Language Models Journal Article

In: CoRR, vol. abs/2507.16585, 2025.

Links | BibTeX

Albarqawi, Ahmad; Nazzal, Mahmoud; Khalil, Issa; Khreishah, Abdallah; Phan, NhatHai

ViGText: Deepfake Image Detection with Vision-Language Model Explanations and Graph Neural Networks Journal Article

In: CoRR, vol. abs/2507.18031, 2025.

Links | BibTeX

Khan, Naseem; Nguyen, Tuan; Bermak, Amine; Khalil, Issa

Unmasking Synthetic Realities in Generative AI: A Comprehensive Review of Adversarially Robust Deepfake Detection Systems Journal Article

In: CoRR, vol. abs/2507.21157, 2025.

Links | BibTeX

Nguyen, Tuan; Khan, Naseem; Tran, Khang; Phan, NhatHai; Khalil, Issa

PRPO: Paragraph-level Policy Optimization for Vision-Language Deepfake Detection Journal Article

In: CoRR, vol. abs/2509.26272, 2025.

Links | BibTeX

Nguyen, Khoa; Tran, Khang; Phan, NhatHai; Borcea, Cristian; Jin, Ruoming; Khalil, Issa

SGFusion: Stochastic Geographic Gradient Fusion in Federated Learning Journal Article

In: CoRR, vol. abs/2510.23455, 2025.

Links | BibTeX

Ersoy, Asim; Altinisik, Enes; Sencar, Husrev Taha; Darwish, Kareem

Tool Calling for Arabic LLMs: Data Strategies and Instruction Tuning Journal Article

In: CoRR, vol. abs/2509.20957, 2025.

Links | BibTeX

Lekssays, Ahmed; Sencar, Husrev Taha; Yu, Ting

From Text to Actionable Intelligence: Automating STIX Entity and Relationship Extraction Journal Article

In: CoRR, vol. abs/2507.16576, 2025.

Links | BibTeX

Fatehkia, Masoomali; Altinisik, Enes; Sencar, Husrev Taha

SGM: A Framework for Building Specification-Guided Moderation Filters Journal Article

In: CoRR, vol. abs/2505.19766, 2025.

Links | BibTeX

Lekssays, Ahmed; Shukla, Utsav; Sencar, Husrev Taha; Parvez, Md. Rizwan

TechniqueRAG: Retrieval Augmented Generation for Adversarial Technique Annotation in Cyber Threat Intelligence Text Journal Article

In: CoRR, vol. abs/2505.11988, 2025.

Links | BibTeX

Abbas, Ummar; Ahmad, Mohammad Shahmeer; Alam, Firoj; Altinisik, Enes; Asgari, Ehsaneddin; Boshmaf, Yazan; Boughorbel, Sabri; Chawla, Sanjay; Chowdhury, Shammur A.; Dalvi, Fahim; Darwish, Kareem; Durrani, Nadir; Elfeky, Mohamed; Elmagarmid, Ahmed K.; Eltabakh, Mohamed Y.; Fatehkia, Masoomali; Fragkopoulos, Anastasios; Hasanain, Maram; Hawasly, Majd; Husaini, Mus'ab; Jung, Soon-Gyo; Lucas, Ji Kim; Magdy, Walid; Messaoud, Safa; Mohamed, Abubakr; Mohiuddin, Tasnim; Mousi, Basel; Mubarak, Hamdy; Musleh, Ahmad; Naeem, Zan; Ouzzani, Mourad; Popovic, Dorde; Sadeghi, Amin; Sencar, Husrev Taha; Shinoy, Mohammed; Sinan, Omar; Zhang, Yifan; Ali, Ahmed; Kheir, Yassine El; Ma, Xiaosong; Ruan, Chaoyi

Fanar: An Arabic-Centric Multimodal Generative AI Platform Journal Article

In: CoRR, vol. abs/2501.13944, 2025.

Links | BibTeX

Altinisik, Enes; Messaoud, Safa; Sencar, Husrev Taha; Sajjad, Hassan; Chawla, Sanjay

Explaining the role of Intrinsic Dimensionality in Adversarial Training Proceedings Article

In: Forty-second International Conference on Machine Learning, ICML 2025, Vancouver, BC, Canada, July 13-19, 2025, OpenReview.net, 2025.

Links | BibTeX

Lekssays, Ahmed; Shukla, Utsav; Sencar, Husrev Taha; Parvez, Md. Rizwan

TechniqueRAG: Retrieval Augmented Generation for Adversarial Technique Annotation in Cyber Threat Intelligence Text Proceedings Article

In: Che, Wanxiang; Nabende, Joyce; Shutova, Ekaterina; Pilehvar, Mohammad Taher (Ed.): Findings of the Association for Computational Linguistics, ACL 2025, Vienna, Austria, July 27 - August 1, 2025, pp. 20913–20926, Association for Computational Linguistics, 2025.

Links | BibTeX

Anan, Muhammad; Nazzal, Mahmoud; Khreishah, Abdallah; Khalil, Issa; Phan, NhatHai; Sawalmeh, Ahmad

STING: A Stealthy Backdoor Attack on GNN-Based Malicious Domain Detection via DNS Perturbations Journal Article

In: IEEE Open J. Commun. Soc., vol. 6, pp. 7823–7841, 2025.

Links | BibTeX

2024

Altinisik, Enes; Messaoud, Safa; Sencar, Husrev Taha; Sajjad, Hassan; Chawla, Sanjay

Exploiting the Layered Intrinsic Dimensionality of Deep Models for Practical Adversarial Training Journal Article

In: CoRR, vol. abs/2405.17130, 2024.

Links | BibTeX

Kumarasinghe, Udesh; Lekssays, Ahmed; Sencar, Husrev Taha; Boughorbel, Sabri; Elvitigala, Charitha; Nakov, Preslav

Semantic Ranking for Automated Adversarial Technique Annotation in Security Text Journal Article

In: CoRR, vol. abs/2403.17068, 2024.

Links | BibTeX

Kumarasinghe, Udesh; Lekssays, Ahmed; Sencar, Husrev Taha; Boughorbel, Sabri; Elvitigala, Charitha; Nakov, Preslav

Semantic Ranking for Automated Adversarial Technique Annotation in Security Text Proceedings Article

In: Zhou, Jianying; Quek, Tony Q. S.; Gao, Debin; Cárdenas, Alvaro A. (Ed.): Proceedings of the 19th ACM Asia Conference on Computer and Communications Security, ASIA CCS 2024, Singapore, July 1-5, 2024, ACM, 2024.

Links | BibTeX

Nakov, Preslav; An, Jisun; Kwak, Haewoon; Manzoor, Muhammad Arslan; Mujahid, Zain Muhammad; Sencar, Husrev T.

A Survey on Predicting the Factuality and the Bias of News Media Proceedings Article

In: Ku, Lun-Wei; Martins, Andre; Srikumar, Vivek (Ed.): Findings of the Association for Computational Linguistics, ACL 2024, Bangkok, Thailand and virtual meeting, August 11-16, 2024, pp. 15947–15962, Association for Computational Linguistics, 2024.

Links | BibTeX

Karunanayake, Ishan; AlSabah, Mashael; Ahmed, Nadeem; Jha, Sanjay K.

Examining the Rat in the Tunnel: Interpretable Multi-Label Classification of Tor-based Malware Journal Article

In: CoRR, vol. abs/2409.16639, 2024.

Links | BibTeX

Liu, Guanxiong; Khreishah, Abdallah; Sharadgah, Fatima; Khalil, Issa

An Adaptive Black-Box Defense Against Trojan Attacks (TrojDef) Journal Article

In: IEEE Trans. Neural Networks Learn. Syst., vol. 35, no. 4, pp. 5367–5381, 2024.

Links | BibTeX

Nazzal, Mahmoud; Khalil, Issa; Khreishah, Abdallah; Phan, NhatHai

PromSec: Prompt Optimization for Secure Generation of Functional Source Code with Large Language Models (LLMs) Proceedings Article

In: Luo, Bo; Liao, Xiaojing; Xu, Jun; Kirda, Engin; Lie, David (Ed.): Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security, CCS 2024, Salt Lake City, UT, USA, October 14-18, 2024, pp. 2266–2280, ACM, 2024.

Links | BibTeX

Ton, Khiem; Nguyen, Nhi; Nazzal, Mahmoud; Khreishah, Abdallah; Borcea, Cristian; Phan, NhatHai; Jin, Ruoming; Khalil, Issa; Shen, Yelong

Demo: SGCode: A Flexible Prompt-Optimizing System for Secure Generation of Code Proceedings Article

In: Luo, Bo; Liao, Xiaojing; Xu, Jun; Kirda, Engin; Lie, David (Ed.): Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security, CCS 2024, Salt Lake City, UT, USA, October 14-18, 2024, pp. 5078–5080, ACM, 2024.

Links | BibTeX

Choo, Euijin; Nabeel, Mohamed; Kim, Doowon; Silva, Ravindu De; Yu, Ting; Khalil, Issa

A Large Scale Study and Classification of VirusTotal Reports on Phishing and Malware URLs Proceedings Article

In: Garetto, Michele; Marin, Andrea; Ciucu, Florin; Fanti, Giulia; Righter, Rhonda (Ed.): Abstracts of the 2024 ACM SIGMETRICS/IFIP PERFORMANCE Joint International Conference on Measurement and Modeling of Computer Systems, SIGMETRICS/PERFORMANCE 2024, Venice, Italy, June 10-14, 2024, pp. 55–56, ACM, 2024.

Links | BibTeX

Nazzal, Mahmoud; Khalil, Issa; Khreishah, Abdallah; Phan, NhatHai; Ma, Yao

Multi-Instance Adversarial Attack on GNN-Based Malicious Domain Detection Proceedings Article

In: IEEE Symposium on Security and Privacy, SP 2024, San Francisco, CA, USA, May 19-23, 2024, pp. 1236–1254, IEEE, 2024.

Links | BibTeX

Thirumuruganathan, Saravanan; Deniz, Fatih; Khalil, Issa; Yu, Ting; Nabeel, Mohamed; Ouzzani, Mourad

Detecting and Mitigating Sampling Bias in Cybersecurity with Unlabeled Data Proceedings Article

In: Balzarotti, Davide; Xu, Wenyuan (Ed.): 33rd USENIX Security Symposium, USENIX Security 2024, Philadelphia, PA, USA, August 14-16, 2024, USENIX Association, 2024.

Links | BibTeX

Khan, Naseem; Ahmad, Kashif; Al-Tamimi, Aref; Alani, Mohammed M.; Bermak, Amine; Khalil, Issa

Explainable AI-based Intrusion Detection System for Industry 5.0: An Overview of the Literature, associated Challenges, the existing Solutions, and Potential Research Directions Journal Article

In: CoRR, vol. abs/2408.03335, 2024.

Links | BibTeX

Ton, Khiem; Nguyen, Nhi; Nazzal, Mahmoud; Khreishah, Abdallah; Borcea, Cristian; Phan, NhatHai; Jin, Ruoming; Khalil, Issa; Shen, Yelong

Demo: SGCode: A Flexible Prompt-Optimizing System for Secure Generation of Code Journal Article

In: CoRR, vol. abs/2409.07368, 2024.

Links | BibTeX

Nazzal, Mahmoud; Khalil, Issa; Khreishah, Abdallah; Phan, NhatHai

PromSec: Prompt Optimization for Secure Generation of Functional Source Code with Large Language Models (LLMs) Journal Article

In: CoRR, vol. abs/2409.12699, 2024.

Links | BibTeX

2023

Choo, Euijin; Nabeel, Mohamed; AlSabah, Mashael; Khalil, Issa; Yu, Ting; Wang, Wei

DeviceWatch: A Data-Driven Network Analysis Approach to Identifying Compromised Mobile Devices with Graph-Inference Journal Article

In: ACM Trans. Priv. Secur., vol. 26, no. 1, pp. 9:1–9:32, 2023.

Links | BibTeX

Nazzal, Mahmoud; Khalil, Issa; Khreishah, Abdallah; Phan, NhatHai; Ma, Yao

Multi-Instance Adversarial Attack on GNN-Based Malicious Domain Detection Journal Article

In: CoRR, vol. abs/2308.11754, 2023.

Links | BibTeX

Choo, Euijin; Nabeel, Mohamed; Kim, Doowon; Silva, Ravindu De; Yu, Ting; Khalil, Issa

A Large Scale Study and Classification of VirusTotal Reports on Phishing and Malware URLs Journal Article

In: Proc. ACM Meas. Anal. Comput. Syst., vol. 7, no. 3, pp. 59:1–59:26, 2023.

Links | BibTeX

Altinisik, Enes; Messaoud, Safa; Sencar, Husrev Taha; Chawla, Sanjay

A3T: accuracy aware adversarial training Journal Article

In: Mach. Learn., vol. 112, no. 9, pp. 3191–3210, 2023.

Links | BibTeX

Altinisik, Enes; Sajjad, Hassan; Sencar, Husrev T.; Messaoud, Safa; Chawla, Sanjay

Impact of Adversarial Training on Robustness and Generalizability of Language Models Proceedings Article

In: Rogers, Anna; Boyd-Graber, Jordan L.; Okazaki, Naoaki (Ed.): Findings of the Association for Computational Linguistics: ACL 2023, Toronto, Canada, July 9-14, 2023, pp. 7828–7840, Association for Computational Linguistics, 2023.

Links | BibTeX

Altinisik, Enes; Deniz, Fatih; Sencar, Husrev Taha

ProvG-Searcher: A Graph Representation Learning Approach for Efficient Provenance Graph Search Journal Article

In: CoRR, vol. abs/2309.03647, 2023.

Links | BibTeX

Altinisik, Enes; Deniz, Fatih; Sencar, Hüsrev Taha

ProvG-Searcher: A Graph Representation Learning Approach for Efficient Provenance Graph Search Proceedings Article

In: Meng, Weizhi; Jensen, Christian Damsgaard; Cremers, Cas; Kirda, Engin (Ed.): Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, CCS 2023, Copenhagen, Denmark, November 26-30, 2023, pp. 2247–2261, ACM, 2023.

Links | BibTeX

Tran, Khang; Fioretto, Ferdinando; Khalil, Issa; Thai, My T.; Phan, NhatHai

FairDP: Certified Fairness with Differential Privacy Journal Article

In: CoRR, vol. abs/2305.16474, 2023.

Links | BibTeX

2022

Panayotov, Panayot; Shukla, Utsav; Sencar, Husrev Taha; Nabeel, Mohamed; Nakov, Preslav

GREENER: Graph Neural Networks for News Media Profiling Proceedings Article

In: Goldberg, Yoav; Kozareva, Zornitsa; Zhang, Yue (Ed.): Proceedings of the 2022 Conference on Empirical Methods in Natural Language Processing, EMNLP 2022, Abu Dhabi, United Arab Emirates, December 7-11, 2022, pp. 7470–7480, Association for Computational Linguistics, 2022.

Links | BibTeX

263 entries « 1 of 6 »