Zum Hauptinhalt springen

Showing 1–43 of 43 results for author: Ikram, M

Searching in archive cs. Search in all archives.
.
  1. arXiv:2408.02310  [pdf, other

    cs.CR cs.LG

    On the Robustness of Malware Detectors to Adversarial Samples

    Authors: Muhammad Salman, Benjamin Zi Hao Zhao, Hassan Jameel Asghar, Muhammad Ikram, Sidharth Kaushik, Mohamed Ali Kaafar

    Abstract: Adversarial examples add imperceptible alterations to inputs with the objective to induce misclassification in machine learning models. They have been demonstrated to pose significant challenges in domains like image classification, with results showing that an adversarially perturbed image to evade detection against one classifier is most likely transferable to other classifiers. Adversarial exam… ▽ More

    Submitted 5 August, 2024; originally announced August 2024.

    Comments: This is the full version of the paper with the same title to appear in the proceedings of the 2024 Workshop on Security and Artificial Intelligence (SECAI 2024)

  2. arXiv:2406.02801  [pdf, other

    cs.SI

    SenTopX: Benchmark for User Sentiment on Various Topics

    Authors: Hina Qayyum, Muhammad Ikram, Benjamin Zhao, Ian Wood, Mohamad Ali Kaafar, Nicolas Kourtellis

    Abstract: Toxic sentiment analysis on Twitter (X) often focuses on specific topics and events such as politics and elections. Datasets of toxic users in such research are typically gathered through lexicon-based techniques, providing only a cross-sectional view. his approach has a tight confine for studying toxic user behavior and effective platform moderation. To identify users consistently spreading toxic… ▽ More

    Submitted 4 June, 2024; originally announced June 2024.

  3. arXiv:2405.10547  [pdf, other

    cs.SI

    GPTs Window Shopping: An analysis of the Landscape of Custom ChatGPT Models

    Authors: Benjamin Zi Hao Zhao, Muhammad Ikram, Mohamed Ali Kaafar

    Abstract: OpenAI's ChatGPT initiated a wave of technical iterations in the space of Large Language Models (LLMs) by demonstrating the capability and disruptive power of LLMs. OpenAI has prompted large organizations to respond with their own advancements and models to push the LLM performance envelope. OpenAI has prompted large organizations to respond with their own advancements and models to push the LLM p… ▽ More

    Submitted 17 May, 2024; originally announced May 2024.

    Comments: 9 pages

  4. arXiv:2402.03740  [pdf, other

    cs.SI cs.CY cs.LG

    BotSSCL: Social Bot Detection with Self-Supervised Contrastive Learning

    Authors: Mohammad Majid Akhtar, Navid Shadman Bhuiyan, Rahat Masood, Muhammad Ikram, Salil S. Kanhere

    Abstract: The detection of automated accounts, also known as "social bots", has been an increasingly important concern for online social networks (OSNs). While several methods have been proposed for detecting social bots, significant research gaps remain. First, current models exhibit limitations in detecting sophisticated bots that aim to mimic genuine OSN users. Second, these methods often rely on simplis… ▽ More

    Submitted 6 February, 2024; originally announced February 2024.

  5. On mission Twitter Profiles: A Study of Selective Toxic Behavior

    Authors: Hina Qayyum, Muhammad Ikram, Benjamin Zi Hao Zhao, an D. Wood, Nicolas Kourtellis, Mohamed Ali Kaafar

    Abstract: The argument for persistent social media influence campaigns, often funded by malicious entities, is gaining traction. These entities utilize instrumented profiles to disseminate divisive content and disinformation, shaping public perception. Despite ample evidence of these instrumented profiles, few identification methods exist to locate them in the wild. To evade detection and appear genuine, sm… ▽ More

    Submitted 25 January, 2024; originally announced January 2024.

    Journal ref: 2023 IEEE International Conference on Big Data (BigData)

  6. Exploring the Distinctive Tweeting Patterns of Toxic Twitter Users

    Authors: Hina Qayyum, Muhammad Ikram, Benjamin Zi Hao Zhao, Ian D. Wood, Nicolas Kourtellis, Mohamed Ali Kaafar

    Abstract: In the pursuit of bolstering user safety, social media platforms deploy active moderation strategies, including content removal and user suspension. These measures target users engaged in discussions marked by hate speech or toxicity, often linked to specific keywords or hashtags. Nonetheless, the increasing prevalence of toxicity indicates that certain users adeptly circumvent these measures. Thi… ▽ More

    Submitted 25 January, 2024; originally announced January 2024.

    Comments: 2023 IEEE International Conference on Big Data (BigData)

  7. arXiv:2308.12497  [pdf, other

    cs.SI cs.CY cs.LG

    False Information, Bots and Malicious Campaigns: Demystifying Elements of Social Media Manipulations

    Authors: Mohammad Majid Akhtar, Rahat Masood, Muhammad Ikram, Salil S. Kanhere

    Abstract: The rapid spread of false information and persistent manipulation attacks on online social networks (OSNs), often for political, ideological, or financial gain, has affected the openness of OSNs. While researchers from various disciplines have investigated different manipulation-triggering elements of OSNs (such as understanding information diffusion on OSNs or detecting automated behavior of acco… ▽ More

    Submitted 23 August, 2023; originally announced August 2023.

  8. arXiv:2305.19487  [pdf, other

    cs.CR cs.NE cs.NI

    SPGNN-API: A Transferable Graph Neural Network for Attack Paths Identification and Autonomous Mitigation

    Authors: Houssem Jmal, Firas Ben Hmida, Nardine Basta, Muhammad Ikram, Mohamed Ali Kaafar, Andy Walker

    Abstract: Attack paths are the potential chain of malicious activities an attacker performs to compromise network assets and acquire privileges through exploiting network vulnerabilities. Attack path analysis helps organizations to identify new/unknown chains of attack vectors that reach critical assets within the network, as opposed to individual attack vectors in signature-based attack analysis. Timely id… ▽ More

    Submitted 21 November, 2023; v1 submitted 30 May, 2023; originally announced May 2023.

    Comments: IEEE Transactions on Information Forensics & Security (TIFS)

  9. A longitudinal study of the top 1% toxic Twitter profiles

    Authors: Hina Qayyum, Benjamin Zi Hao Zhao, Ian D. Wood, Muhammad Ikram, Mohamed Ali Kaafar, Nicolas Kourtellis

    Abstract: Toxicity is endemic to online social networks including Twitter. It follows a Pareto like distribution where most of the toxicity is generated by a very small number of profiles and as such, analyzing and characterizing these toxic profiles is critical. Prior research has largely focused on sporadic, event centric toxic content to characterize toxicity on the platform. Instead, we approach the pro… ▽ More

    Submitted 25 March, 2023; originally announced March 2023.

  10. arXiv:2303.01197  [pdf, other

    cs.CL cs.DL

    Document Provenance and Authentication through Authorship Classification

    Authors: Muhammad Tayyab Zamir, Muhammad Asif Ayub, Jebran Khan, Muhammad Jawad Ikram, Nasir Ahmad, Kashif Ahmad

    Abstract: Style analysis, which is relatively a less explored topic, enables several interesting applications. For instance, it allows authors to adjust their writing style to produce a more coherent document in collaboration. Similarly, style analysis can also be used for document provenance and authentication as a primary step. In this paper, we propose an ensemble-based text-processing framework for the… ▽ More

    Submitted 2 March, 2023; originally announced March 2023.

    Comments: 7 pages; 3 tables; 1 figure

    Journal ref: IEEE ICAISC 2023

  11. arXiv:2212.04008  [pdf, other

    cs.CR

    Use of Cryptography in Malware Obfuscation

    Authors: Hassan Jameel Asghar, Benjamin Zi Hao Zhao, Muhammad Ikram, Giang Nguyen, Dali Kaafar, Sean Lamont, Daniel Coscia

    Abstract: Malware authors often use cryptographic tools such as XOR encryption and block ciphers like AES to obfuscate part of the malware to evade detection. Use of cryptography may give the impression that these obfuscation techniques have some provable guarantees of success. In this paper, we take a closer look at the use of cryptographic tools to obfuscate malware. We first find that most techniques are… ▽ More

    Submitted 7 September, 2023; v1 submitted 7 December, 2022; originally announced December 2022.

    Comments: This is the full version of the paper with the same title to appear in the Journal of Computer Virology and Hacking Techniques

  12. arXiv:2210.10451  [pdf, other

    cs.CR

    An Empirical Analysis of SMS Scam Detection Systems

    Authors: Muhammad Salman, Muhammad Ikram, Mohamed Ali Kaafar

    Abstract: The short message service (SMS) was introduced a generation ago to the mobile phone users. They make up the world's oldest large-scale network, with billions of users and therefore attracts a lot of fraud. Due to the convergence of mobile network with internet, SMS based scams can potentially compromise the security of internet services as well. In this study, we present a new SMS scam dataset con… ▽ More

    Submitted 19 October, 2022; originally announced October 2022.

    Comments: arXiv admin note: text overlap with arXiv:1911.00953 by other authors

  13. arXiv:2209.03162  [pdf, other

    cs.SI cs.CY cs.LG

    Machine Learning-based Automatic Annotation and Detection of COVID-19 Fake News

    Authors: Mohammad Majid Akhtar, Bibhas Sharma, Ishan Karunanayake, Rahat Masood, Muhammad Ikram, Salil S. Kanhere

    Abstract: COVID-19 impacted every part of the world, although the misinformation about the outbreak traveled faster than the virus. Misinformation spread through online social networks (OSN) often misled people from following correct medical practices. In particular, OSN bots have been a primary source of disseminating false information and initiating cyber propaganda. Existing work neglects the presence of… ▽ More

    Submitted 7 September, 2022; originally announced September 2022.

  14. arXiv:2208.07167  [pdf, other

    cs.CV cs.AI

    Where is VALDO? VAscular Lesions Detection and segmentatiOn challenge at MICCAI 2021

    Authors: Carole H. Sudre, Kimberlin Van Wijnen, Florian Dubost, Hieab Adams, David Atkinson, Frederik Barkhof, Mahlet A. Birhanu, Esther E. Bron, Robin Camarasa, Nish Chaturvedi, Yuan Chen, Zihao Chen, Shuai Chen, Qi Dou, Tavia Evans, Ivan Ezhov, Haojun Gao, Marta Girones Sanguesa, Juan Domingo Gispert, Beatriz Gomez Anson, Alun D. Hughes, M. Arfan Ikram, Silvia Ingala, H. Rolf Jaeger, Florian Kofler , et al. (24 additional authors not shown)

    Abstract: Imaging markers of cerebral small vessel disease provide valuable information on brain health, but their manual assessment is time-consuming and hampered by substantial intra- and interrater variability. Automated rating may benefit biomedical research, as well as clinical assessment, but diagnostic reliability of existing algorithms is unknown. Here, we present the results of the \textit{VAscular… ▽ More

    Submitted 15 August, 2022; originally announced August 2022.

  15. arXiv:2205.08252  [pdf, other

    cs.CR

    An Empirical Assessment of Security and Privacy Risks of Web based-Chatbots

    Authors: Nazar Waheed, Muhammad Ikram, Saad Sajid Hashmi, Xiangjian He, Priyadarsi Nanda

    Abstract: Web-based chatbots provide website owners with the benefits of increased sales, immediate response to their customers, and insight into customer behaviour. While Web-based chatbots are getting popular, they have not received much scrutiny from security researchers. The benefits to owners come at the cost of users' privacy and security. Vulnerabilities, such as tracking cookies and third-party doma… ▽ More

    Submitted 17 May, 2022; originally announced May 2022.

    Comments: Submitted to WISE 2020 Conference

  16. arXiv:2203.10673  [pdf

    cs.NI cs.CR

    5G-Enabled Pseudonymity for Cooperative Intelligent Transportation System

    Authors: Nardine Basta, Ming Ding, Muhammad Ikram, Mohamed Ali Kaafar

    Abstract: Cooperative Intelligent Transportation Systems (C-ITS) enable communications between vehicles, road-side infrastructures, and road-users to improve users' safety and to efficiently manage traffic. Most, if not all, of the intelligent vehicles-to-everything (V2X) applications, often rely on continuous collection and sharing of sensitive information such as detailed location information which raises… ▽ More

    Submitted 20 March, 2022; originally announced March 2022.

  17. arXiv:2203.03077  [pdf, other

    cs.CR

    A Study of Third-party Resources Loading on Web

    Authors: Muhammad Ikram, Rahat Masood, Gareth Tyson, Mohamed Ali Kaafar, Roya Ensafi

    Abstract: This paper performs a large-scale study of dependency chains in the web, to find that around 50% of first-party websites render content that they did not directly load. Although the majority (84.91%) of websites have short dependency chains (below 3 levels), we find websites with dependency chains exceeding 30. Using VirusTotal, we show that 1.2% of these third-parties are classified as suspicious… ▽ More

    Submitted 6 March, 2022; originally announced March 2022.

    Comments: 3 pages. arXiv admin note: substantial text overlap with arXiv:1901.07699

  18. Don't be a Victim During a Pandemic! Analysing Security and Privacy Threats in Twitter During COVID-19

    Authors: Bibhas Sharma, Ishan Karunanayake, Rahat Masood, Muhammad Ikram

    Abstract: There has been a huge spike in the usage of social media platforms during the COVID-19 lockdowns. These lockdown periods have resulted in a set of new cybercrimes, thereby allowing attackers to victimise social media users with a range of threats. This paper performs a large-scale study to investigate the impact of a pandemic and the lockdown periods on the security and privacy of social media use… ▽ More

    Submitted 26 March, 2023; v1 submitted 21 February, 2022; originally announced February 2022.

    Comments: Paper has been accepted for publication in IEEE Access. Currently available on IEEE ACCESS early access (see DOI)

  19. arXiv:2202.07853  [pdf, other

    cs.SI cs.CY

    A deep dive into the consistently toxic 1% of Twitter

    Authors: Hina Qayyum, Benjamin Zi Hao Zhao, Ian D. Wood, Muhammad Ikram, Mohamed Ali Kaafar, Nicolas Kourtellis

    Abstract: Misbehavior in online social networks (OSN) is an ever-growing phenomenon. The research to date tends to focus on the deployment of machine learning to identify and classify types of misbehavior such as bullying, aggression, and racism to name a few. The main goal of identification is to curb natural and mechanical misconduct and make OSNs a safer place for social discourse. Going beyond past work… ▽ More

    Submitted 15 February, 2022; originally announced February 2022.

  20. Towards a Zero-Trust Micro-segmentation Network Security Strategy: An Evaluation Framework

    Authors: Nardine Basta, Muhammad Ikram, Mohamed Ali Kaafar, Andy Walker

    Abstract: Micro-segmentation is an emerging security technique that separates physical networks into isolated logical micro-segments (workloads). By tying fine-grained security policies to individual workloads, it limits the attacker's ability to move laterally through the network, even after infiltrating the perimeter defences. While micro-segmentation is proved to be effective for shrinking enterprise net… ▽ More

    Submitted 21 November, 2021; originally announced November 2021.

    Journal ref: NOMS2022

  21. Empirical Security and Privacy Analysis of Mobile Symptom Checking Applications on Google Play

    Authors: I Wayan Budi Sentana, Muhammad Ikram, Mohamed Ali Kaafar, Shlomo Berkovsky

    Abstract: Smartphone technology has drastically improved over the past decade. These improvements have seen the creation of specialized health applications, which offer consumers a range of health-related activities such as tracking and checking symptoms of health conditions or diseases through their smartphones. We term these applications as Symptom Checking apps or simply SymptomCheckers. Due to the sensi… ▽ More

    Submitted 29 July, 2021; originally announced July 2021.

    Comments: Published in SECRYPT 2021

  22. Automated Segmentation and Volume Measurement of Intracranial Carotid Artery Calcification on Non-Contrast CT

    Authors: Gerda Bortsova, Daniel Bos, Florian Dubost, Meike W. Vernooij, M. Kamran Ikram, Gijs van Tulder, Marleen de Bruijne

    Abstract: Purpose: To evaluate a fully-automated deep-learning-based method for assessment of intracranial carotid artery calcification (ICAC). Methods: Two observers manually delineated ICAC in non-contrast CT scans of 2,319 participants (mean age 69 (SD 7) years; 1154 women) of the Rotterdam Study, prospectively collected between 2003 and 2006. These data were used to retrospectively develop and validate… ▽ More

    Submitted 20 July, 2021; originally announced July 2021.

    Comments: Accepted for publication in Radiology: Artificial Intelligence (https://pubs.rsna.org/journal/ai), which is published by the Radiological Society of North America (RSNA)

  23. arXiv:2107.07063  [pdf

    cs.CR cs.DC

    BlockJack: Towards Improved Prevention of IP Prefix Hijacking Attacks in Inter-Domain Routing Via Blockchain

    Authors: I Wayan Budi Sentana, Muhammad Ikram, Mohamed Ali Kaafar

    Abstract: We propose BlockJack, a system based on a distributed and tamper-proof consortium Blockchain that aims at blocking IP prefix hijacking in the Border Gateway Protocol (BGP). In essence, BlockJack provides synchronization among BlockChain and BGP network through interfaces ensuring operational independence and this approach preserving the legacy system and accommodates the impact of a race condition… ▽ More

    Submitted 14 July, 2021; originally announced July 2021.

  24. arXiv:2106.10035  [pdf, other

    cs.CR

    Longitudinal Compliance Analysis of Android Applications with Privacy Policies

    Authors: Saad Sajid Hashmi, Nazar Waheed, Gioacchino Tangari, Muhammad Ikram, Stephen Smith

    Abstract: Contemporary mobile applications (apps) are designed to track, use, and share users' data, often without their consent, which results in potential privacy and transparency issues. To investigate whether mobile apps have always been (non-)transparent regarding how they collect information about users, we perform a longitudinal analysis of the historical versions of 268 Android apps. These apps comp… ▽ More

    Submitted 28 July, 2021; v1 submitted 18 June, 2021; originally announced June 2021.

    Comments: 11 pages

  25. Longitudinal diffusion MRI analysis using Segis-Net: a single-step deep-learning framework for simultaneous segmentation and registration

    Authors: Bo Li, Wiro J. Niessen, Stefan Klein, Marius de Groot, M. Arfan Ikram, Meike W. Vernooij, Esther E. Bron

    Abstract: This work presents a single-step deep-learning framework for longitudinal image analysis, coined Segis-Net. To optimally exploit information available in longitudinal data, this method concurrently learns a multi-class segmentation and nonlinear registration. Segmentation and registration are modeled using a convolutional neural network and optimized simultaneously for their mutual benefit. An obj… ▽ More

    Submitted 23 April, 2021; v1 submitted 28 December, 2020; originally announced December 2020.

    Comments: To appear in NeuroImage

  26. arXiv:2011.01869  [pdf, other

    cs.CV cs.AI eess.IV

    Learning unbiased group-wise registration (LUGR) and joint segmentation: evaluation on longitudinal diffusion MRI

    Authors: Bo Li, Wiro J. Niessen, Stefan Klein, M. Arfan Ikram, Meike W. Vernooij, Esther E. Bron

    Abstract: Analysis of longitudinal changes in imaging studies often involves both segmentation of structures of interest and registration of multiple timeframes. The accuracy of such analysis could benefit from a tailored framework that jointly optimizes both tasks to fully exploit the information available in the longitudinal data. Most learning-based registration algorithms, including joint optimization a… ▽ More

    Submitted 24 February, 2021; v1 submitted 3 November, 2020; originally announced November 2020.

    Comments: SPIE Medical Imaging 2021 (oral)

  27. arXiv:2009.07139  [pdf, other

    cs.LG stat.ML

    Analyzing the effect of APOE on Alzheimer's disease progression using an event-based model for stratified populations

    Authors: Vikram Venkatraghavan, Stefan Klein, Lana Fani, Leontine S. Ham, Henri Vrooman, M. Kamran Ikram, Wiro J. Niessen, Esther E. Bron

    Abstract: Alzheimer's disease (AD) is the most common form of dementia and is phenotypically heterogeneous. APOE is a triallelic gene which correlates with phenotypic heterogeneity in AD. In this work, we determined the effect of APOE alleles on the disease progression timeline of AD using a discriminative event-based model (DEBM). Since DEBM is a data-driven model, stratification into smaller disease subgr… ▽ More

    Submitted 15 September, 2020; originally announced September 2020.

  28. arXiv:2005.12838  [pdf, other

    eess.IV cs.LG physics.med-ph

    Neuro4Neuro: A neural network approach for neural tract segmentation using large-scale population-based diffusion imaging

    Authors: Bo Li, Marius de Groot, Rebecca M. E. Steketee, Rozanna Meijboom, Marion Smits, Meike W. Vernooij, M. Arfan Ikram, Jiren Liu, Wiro J. Niessen, Esther E. Bron

    Abstract: Subtle changes in white matter (WM) microstructure have been associated with normal aging and neurodegeneration. To study these associations in more detail, it is highly important that the WM tracts can be accurately and reproducibly characterized from brain diffusion MRI. In addition, to enable analysis of WM tracts in large datasets and in clinical practice it is essential to have methodology th… ▽ More

    Submitted 26 May, 2020; originally announced May 2020.

    Comments: Preprint to be published in NeuroImage

  29. arXiv:2002.03488  [pdf, other

    cs.CR cs.LG

    Security and Privacy in IoT Using Machine Learning and Blockchain: Threats & Countermeasures

    Authors: Nazar Waheed, Xiangjian He, Muhammad Ikram, Muhammad Usman, Saad Sajid Hashmi, Muhammad Usman

    Abstract: Security and privacy of the users have become significant concerns due to the involvement of the Internet of things (IoT) devices in numerous applications. Cyber threats are growing at an explosive pace making the existing security and privacy measures inadequate. Hence, everyone on the Internet is a product for hackers. Consequently, Machine Learning (ML) algorithms are used to produce accurate o… ▽ More

    Submitted 5 August, 2020; v1 submitted 9 February, 2020; originally announced February 2020.

    Comments: 35 pages, ACM CSUR Journal

  30. arXiv:1907.12452  [pdf, other

    eess.IV cs.CV cs.LG

    Automated Lesion Detection by Regressing Intensity-Based Distance with a Neural Network

    Authors: Kimberlin M. H. van Wijnen, Florian Dubost, Pinar Yilmaz, M. Arfan Ikram, Wiro J. Niessen, Hieab Adams, Meike W. Vernooij, Marleen de Bruijne

    Abstract: Localization of focal vascular lesions on brain MRI is an important component of research on the etiology of neurological disorders. However, manual annotation of lesions can be challenging, time-consuming and subject to observer bias. Automated detection methods often need voxel-wise annotations for training. We propose a novel approach for automated lesion detection that can be trained on scans… ▽ More

    Submitted 29 July, 2019; originally announced July 2019.

    Comments: MICCAI 2019

  31. arXiv:1906.01891  [pdf, other

    cs.CV

    Weakly Supervised Object Detection with 2D and 3D Regression Neural Networks

    Authors: Florian Dubost, Hieab Adams, Pinar Yilmaz, Gerda Bortsova, Gijs van Tulder, M. Arfan Ikram, Wiro Niessen, Meike Vernooij, Marleen de Bruijne

    Abstract: Finding automatically multiple lesions in large images is a common problem in medical image analysis. Solving this problem can be challenging if, during optimization, the automated method cannot access information about the location of the lesions nor is given single examples of the lesions. We propose a new weakly supervised detection method using neural networks, that computes attention maps rev… ▽ More

    Submitted 19 March, 2020; v1 submitted 5 June, 2019; originally announced June 2019.

    Comments: New formatting. A few changes in introduction, discussion and conclusion

  32. arXiv:1906.00166  [pdf, other

    cs.CR

    A Longitudinal Analysis of Online Ad-Blocking Blacklists

    Authors: Saad Sajid Hashmi, Muhammad Ikram, Mohamed Ali Kaafar

    Abstract: Websites employ third-party ads and tracking services leveraging cookies and JavaScript code, to deliver ads and track users' behavior, causing privacy concerns. To limit online tracking and block advertisements, several ad-blocking (black) lists have been curated consisting of URLs and domains of well-known ads and tracking services. Using Internet Archive's Wayback Machine in this paper, we coll… ▽ More

    Submitted 1 June, 2019; originally announced June 2019.

    Comments: 9

  33. arXiv:1905.09136  [pdf, other

    cs.CR

    DaDiDroid: An Obfuscation Resilient Tool for Detecting Android Malware via Weighted Directed Call Graph Modelling

    Authors: Muhammad Ikram, Pierrick Beaume, Mohamed Ali Kaafar

    Abstract: With the number of new mobile malware instances increasing by over 50\% annually since 2012 [24], malware embedding in mobile apps is arguably one of the most serious security issues mobile platforms are exposed to. While obfuscation techniques are successfully used to protect the intellectual property of apps' developers, they are unfortunately also often used by cybercriminals to hide malicious… ▽ More

    Submitted 21 August, 2019; v1 submitted 22 May, 2019; originally announced May 2019.

    Comments: 9 pages. arXiv admin note: text overlap with arXiv:1801.01633 by other authors

  34. arXiv:1904.10629  [pdf, other

    cs.CR

    A Decade of Mal-Activity Reporting: A Retrospective Analysis of Internet Malicious Activity Blacklists

    Authors: Benjamin Zi Hao Zhao, Muhammad Ikram, Hassan Jameel Asghar, Mohamed Ali Kaafar, Abdelberi Chaabane, Kanchana Thilakarathna

    Abstract: This paper focuses on reporting of Internet malicious activity (or mal-activity in short) by public blacklists with the objective of providing a systematic characterization of what has been reported over the years, and more importantly, the evolution of reported activities. Using an initial seed of 22 blacklists, covering the period from January 2007 to June 2017, we collect more than 51 million m… ▽ More

    Submitted 23 April, 2019; originally announced April 2019.

    Comments: ACM Asia Conference on Computer and Communications Security (AsiaCCS), 13 pages

  35. arXiv:1901.07699  [pdf, other

    cs.CR

    The Chain of Implicit Trust: An Analysis of the Web Third-party Resources Loading

    Authors: Muhammad Ikram, Rahat Masood, Gareth Tyson, Mohamed Ali Kaafar, Noha Loizon, Roya Ensafi

    Abstract: The Web is a tangled mass of interconnected services, where websites import a range of external resources from various third-party domains. However, the latter can further load resources hosted on other domains. For each website, this creates a dependency chain underpinned by a form of implicit trust between the first-party and transitively connected third-parties. The chain can only be loosely co… ▽ More

    Submitted 18 February, 2019; v1 submitted 22 January, 2019; originally announced January 2019.

    Comments: 12 pages

  36. arXiv:1807.04798  [pdf, other

    cs.CV

    Hydranet: Data Augmentation for Regression Neural Networks

    Authors: Florian Dubost, Gerda Bortsova, Hieab Adams, M. Arfan Ikram, Wiro Niessen, Meike Vernooij, Marleen de Bruijne

    Abstract: Deep learning techniques are often criticized to heavily depend on a large quantity of labeled data. This problem is even more challenging in medical image analysis where the annotator expertise is often scarce. We propose a novel data-augmentation method to regularize neural network regressors that learn from a single global label per image. The principle of the method is to create new samples by… ▽ More

    Submitted 29 July, 2019; v1 submitted 12 July, 2018; originally announced July 2018.

    Comments: accepted in MICCAI 2019

  37. arXiv:1802.05914  [pdf, other

    cs.CV

    3D Regression Neural Network for the Quantification of Enlarged Perivascular Spaces in Brain MRI

    Authors: Florian Dubost, Hieab Adams, Gerda Bortsova, M. Arfan Ikram, Wiro Niessen, Meike Vernooij, Marleen de Bruijne

    Abstract: Enlarged perivascular spaces (EPVS) in the brain are an emerging imaging marker for cerebral small vessel disease, and have been shown to be related to increased risk of various neurological diseases, including stroke and dementia. Automatic quantification of EPVS would greatly help to advance research into its etiology and its potential as a risk indicator of disease. We propose a convolutional n… ▽ More

    Submitted 28 October, 2018; v1 submitted 16 February, 2018; originally announced February 2018.

  38. arXiv:1709.02901  [pdf, other

    cs.CR

    A First Look at Ad Blocking Apps on Google Play

    Authors: Muhammad Ikram, Mohamed Ali Kaafar

    Abstract: Online advertisers and analytics services (or trackers), are constantly tracking users activities as they access web services either through browsers or a mobile apps. Numerous tools such as browser plugins and specialized mobile apps have been proposed to limit intrusive advertisements and prevent tracking on desktop computing and mobile phones. For desktop computing, browser plugins are heavily… ▽ More

    Submitted 12 September, 2017; v1 submitted 8 September, 2017; originally announced September 2017.

  39. arXiv:1707.00190  [pdf, other

    cs.CR cs.SI

    Measuring, Characterizing, and Detecting Facebook Like Farms

    Authors: Muhammad Ikram, Lucky Onwuzurike, Shehroze Farooqi, Emiliano De Cristofaro, Arik Friedman, Guillaume Jourjon, Dali Kaafar, M. Zubair Shafiq

    Abstract: Social networks offer convenient ways to seamlessly reach out to large audiences. In particular, Facebook pages are increasingly used by businesses, brands, and organizations to connect with multitudes of users worldwide. As the number of likes of a page has become a de-facto measure of its popularity and profitability, an underground market of services artificially inflating page likes, aka like… ▽ More

    Submitted 4 July, 2017; v1 submitted 1 July, 2017; originally announced July 2017.

    Comments: To appear in ACM Transactions on Privacy and Security (TOPS)

  40. arXiv:1703.04981  [pdf, other

    cs.CV stat.ML

    Transfer Learning by Asymmetric Image Weighting for Segmentation across Scanners

    Authors: Veronika Cheplygina, Annegreet van Opbroek, M. Arfan Ikram, Meike W. Vernooij, Marleen de Bruijne

    Abstract: Supervised learning has been very successful for automatic segmentation of images from a single scanner. However, several papers report deteriorated performances when using classifiers trained on images from one scanner to segment images from other scanners. We propose a transfer learning classifier that adapts to differences between training and test images. This method uses a weighted ensemble o… ▽ More

    Submitted 15 March, 2017; originally announced March 2017.

  41. arXiv:1603.06289  [pdf, other

    cs.CR

    Towards Seamless Tracking-Free Web: Improved Detection of Trackers via One-class Learning

    Authors: Muhammad Ikram, Hassan Jameel Asghar, Mohamed Ali Kaafar, Balachander Krishnamurthy, Anirban Mahanti

    Abstract: Numerous tools have been developed to aggressively block the execution of popular JavaScript programs (JS) in Web browsers. Such blocking also affects functionality of webpages and impairs user experience. As a consequence, many privacy preserving tools (PP-Tools) that have been developed to limit online tracking, often executed via JS, may suffer from poor performance and limited uptake. A mechan… ▽ More

    Submitted 20 March, 2016; originally announced March 2016.

  42. arXiv:1506.00506  [pdf, other

    cs.SI cs.CR

    Combating Fraud in Online Social Networks: Detecting Stealthy Facebook Like Farms

    Authors: Muhammad Ikram, Lucky Onwuzurike, Shehroze Farooqi, Emiliano De Cristofaro, Arik Friedman, Guillaume Jourjon, Mohammad Ali Kaafar, M. Zubair Shafiq

    Abstract: As businesses increasingly rely on social networking sites to engage with their customers, it is crucial to understand and counter reputation manipulation activities, including fraudulently boosting the number of Facebook page likes using like farms. To this end, several fraud detection algorithms have been proposed and some deployed by Facebook that use graph co-clustering to distinguish between… ▽ More

    Submitted 9 May, 2016; v1 submitted 1 June, 2015; originally announced June 2015.

  43. arXiv:1505.01637  [pdf, other

    cs.CY cs.CR

    Characterizing Key Stakeholders in an Online Black-Hat Marketplace

    Authors: Shehroze Farooqi, Muhammad Ikram, Emiliano De Cristofaro, Arik Friedman, Guillaume Jourjon, Mohamed Ali Kaafar, M. Zubair Shafiq, Fareed Zaffar

    Abstract: Over the past few years, many black-hat marketplaces have emerged that facilitate access to reputation manipulation services such as fake Facebook likes, fraudulent search engine optimization (SEO), or bogus Amazon reviews. In order to deploy effective technical and legal countermeasures, it is important to understand how these black-hat marketplaces operate, shedding light on the services they of… ▽ More

    Submitted 4 April, 2017; v1 submitted 7 May, 2015; originally announced May 2015.

    Comments: 12th IEEE/APWG Symposium on Electronic Crime Research (eCrime 2017)