default search action
Mohd Anwar
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c46]SeyyedPooya HekmatiAthar, Letu Qingge, Mohd Anwar:
Representation and Generation of Music: Incorporating Composers' Perspectives into Deep Learning Models. IEA/AIE 2024: 241-253 - [c45]Yang Liu, Mohd Anwar:
Analyzing Twitter Data for Insights into Public Sentiment During COVID-19 Pandemic. SoMeT 2024: 412-425 - 2023
- [j20]May Almousa, Mohd Anwar:
A URL-Based Social Semantic Attacks Detection With Character-Aware Language Model. IEEE Access 11: 10654-10663 (2023) - 2022
- [j19]Xuyang Yan, Shabnam Nazmi, Biniam Gebru, Mohd Anwar, Abdollah Homaifar, Mrinmoy Sarkar, Kishor Datta Gupta:
A clustering-based active learning method to query informative and representative samples. Appl. Intell. 52(11): 13250-13267 (2022) - [j18]Imano Williams, Xiaohong Yuan, Mohd Anwar, Jeffrey Todd McDonald:
An Automated Security Concerns Recommender Based on Use Case Specification Ontology. Autom. Softw. Eng. 29(2): 42 (2022) - [j17]Arnav Jhala, Yang Cheng, Jean Goodwin, Munindar P. Singh, Mohd Anwar, Lauren B. Davis, Steven Jiang, Anna Lee, Younho Seong, Siobahn Day Grady, Deepak Kumar, Tianduo Zhang:
A Digital Communication Twin for Addressing Misinformation: Vision, Challenges, Opportunities. IEEE Internet Comput. 26(2): 36-41 (2022) - [j16]Alex Sumner, Xiaohong Yuan, Mohd Anwar, Maranda E. McBride:
Examining Factors Impacting the Effectiveness of Anti-Phishing Trainings. J. Comput. Inf. Syst. 62(5): 975-997 (2022) - [j15]May Almousa, Tianyang Zhang, Abdolhossein Sarrafzadeh, Mohd Anwar:
Phishing website detection: How effective are deep learning-based models and hyperparameter optimization? Secur. Priv. 5(6) (2022) - [j14]Abeer Aljuaid, Mohd Anwar:
Survey of Supervised Learning for Medical Image Processing. SN Comput. Sci. 3(4): 292 (2022) - [c44]Yang Liu, Zhiying Yue, Mohd Anwar:
Monkeypox At-a-glance from Google Trends and Reddit. CHASE 2022: 166-167 - [c43]Abeer Aljuaid, Mai Almohaya, Mohd Anwar:
An Early Detection of Oral Epithelial Dysplasia Based on GoogLeNet Inception-v3. CHASE 2022: 172-173 - [c42]Sophina Luitel, Mohd Anwar:
Audio Sentiment Analysis using Spectrogram and Bag-of- Visual- Words. IRI 2022: 200-205 - [c41]Hilda Goins, Mohd Anwar:
Data-driven Assessment of Dementia Caregivers' Burden: One size does not fit all. TransAI 2022: 17-21 - [c40]Yang Liu, Mohd Anwar:
Learning Programming in Social Media: An NLP-powered Reddit Study. TransAI 2022: 55-58 - [c39]May Almousa, Ruben Furst, Mohd Anwar:
Characterizing Coding Style of Phishing Websites Using Machine Learning Techniques. TransAI 2022: 101-105 - [i5]Xuyang Yan, Shabnam Nazmi, Biniam Gebru, Mohd Anwar, Abdollah Homaifar, Mrinmoy Sarkar, Kishor Datta Gupta:
Mitigating shortage of labeled data using clustering-based active learning with diversity exploration. CoRR abs/2207.02964 (2022) - [i4]Nyteisha Bookert, May Almousa, Mohd Anwar:
Inclusive Privacy Design for Older Adults Living in Ambient Assisted Living. CoRR abs/2207.09592 (2022) - [i3]Nyteisha Bookert, Mohd Anwar:
Privacy Threats on the Internet of Medical Things. CoRR abs/2207.09593 (2022) - 2021
- [j13]Mohd Anwar:
Supporting Privacy, Trust, and Personalization in Online Learning. Int. J. Artif. Intell. Educ. 31(4): 769-783 (2021) - [j12]Yang Liu, Christopher Whitfield, Tianyang Zhang, Amanda Hauser, Taeyonn Reynolds, Mohd Anwar:
Monitoring COVID-19 pandemic through the lens of social media using natural language processing and machine learning. Health Inf. Sci. Syst. 9(1) (2021) - [j11]Shabnam Nazmi, Xuyang Yan, Abdollah Homaifar, Mohd Anwar:
Multi-label classification with local pairwise and high-order label correlations using graph partitioning. Knowl. Based Syst. 233: 107414 (2021) - [j10]SeyyedPooya HekmatiAthar, Hilda Goins, Raymond Samuel, Grace Byfield, Mohd Anwar:
Data-Driven Forecasting of Agitation for Persons with Dementia: A Deep Learning-Based Approach. SN Comput. Sci. 2(4): 326 (2021) - [c38]Christopher Whitfield, Yang Liu, Mohd Anwar:
Surveillance of COVID-19 pandemic using social media: a reddit study in North Carolina. BCB 2021: 43:1-43:8 - [c37]Shabnam Nazmi, Abdollah Homaifar, Mohd Anwar:
An effective action covering for multi-label learning classifier systems: a graph-theoretic approach. GECCO 2021: 340-348 - [c36]May Almousa, Yang Liu, Tianyang Zhang, Mohd Anwar:
A Study on Online Businesses' Commitment to Consumer Privacy. HCI (27) 2021: 391-402 - [c35]May Almousa, Sai Basavaraju, Mohd Anwar:
API-Based Ransomware Detection Using Machine Learning-Based Threat Detection Models. PST 2021: 1-7 - [c34]Aaditya Raval, Mohd Anwar:
Passive User Identification and Authentication with Smartphone Sensor Data. TransAI 2021: 1-7 - [c33]May Almousa, Janet Osawere, Mohd Anwar:
Identification of Ransomware families by Analyzing Network Traffic Using Machine Learning Techniques. TransAI 2021: 19-24 - [c32]Bernard Aldrich, Hilda Goins, Mohd Anwar:
Interpreting Keystrokes to Ascertain Human Mood. TransAI 2021: 112-115 - [i2]SeyyedPooya HekmatiAthar, Mohd Anwar:
Music Embedding: A Tool for Incorporating Music Theory into Computational Music Applications. CoRR abs/2104.11880 (2021) - [i1]Christopher Whitfield, Yang Liu, Mohd Anwar:
Surveillance of COVID-19 Pandemic using Social Media: A Reddit Study in North Carolina. CoRR abs/2106.04515 (2021) - 2020
- [j9]Hietam Elhoone, Tianyang Zhang, Mohd Anwar, Salil Desai:
Cyber-based design for additive manufacturing using artificial neural networks for Industry 4.0. Int. J. Prod. Res. 58(9): 2841-2861 (2020) - [j8]Brittany Davis, Janelle C. Mason, Mohd Anwar:
Vulnerability Studies and Security Postures of IoT Devices: A Smart Home Case Study. IEEE Internet Things J. 7(10): 10102-10110 (2020) - [c31]May Almousa, Mahsa Keshavarz, Mohd Anwar:
Awareness and Working Knowledge of Secure Design Principles: A User Study. HCI (30) 2020: 3-15 - [c30]Hilda Goins, SeyyedPooya HekmatiAthar, Grace Byfield, Raymond Samuel, Mohd Anwar:
Toward Data-Driven Assessment of Caregiver's Burden for Persons with Dementia using Machine Learning Models. IRI 2020: 379-384
2010 – 2019
- 2019
- [j7]Ling Li, Wu He, Li Xu, Ivan K. Ash, Mohd Anwar, Xiaohong Yuan:
Investigating the impact of cybersecurity policy awareness on employees' cybersecurity behavior. Int. J. Inf. Manag. 45: 13-24 (2019) - [c29]Wu He, Mohd Anwar, Ivan K. Ash, Ling Li, Xiaohong Yuan, Li Xu, Xin Tian:
Effects of Evidence-Based Malware Cybersecurity Training on Employees. AMCIS 2019 - [c28]Paul Biocco, Mohd Anwar:
Grid Authentication: A Memorability and User Sentiment Study. HCI (29) 2019: 3-18 - [c27]Mahsa Keshavarz, Mohd Anwar:
The Automatic Detection of Sensitive Data in Smart Homes. HCI (29) 2019: 404-416 - [c26]May Almousa, Mohd Anwar:
Detecting Exploit Websites Using Browser-based Predictive Analytics. PST 2019: 1-3 - 2018
- [c25]Amari Vaughn, Paul Biocco, Yang Liu, Mohd Anwar:
Activity Detection and Analysis Using Smartphone Sensors. IRI 2018: 102-107 - [c24]Opeyemi Aborisade, Mohd Anwar:
Classification for Authorship of Tweets by Comparing Logistic Regression and Naive Bayes Classifiers. IRI 2018: 269-276 - [c23]Brittany Davis, Christopher Whitfield, Mohd Anwar:
Extended Abstract: Ethical and Privacy Considerations in Cybersecurity. PST 2018: 1-2 - [c22]Mahsa Keshavarz, Mohd Anwar:
Towards Improving Privacy Control for Smart Homes: A Privacy Decision Framework. PST 2018: 1-3 - 2017
- [j6]Mohd Anwar, Wu He, Ivan K. Ash, Xiaohong Yuan, Ling Li, Li Xu:
Gender difference and employees' cybersecurity behaviors. Comput. Hum. Behav. 69: 437-443 (2017) - [j5]James Brown, Mohd Anwar, Gerry V. Dozier:
An artificial immunity approach to malware detection in a mobile platform. EURASIP J. Inf. Secur. 2017: 7 (2017) - [j4]Mohd Anwar, Peter Brusilovsky:
Privacy and Territoriality Issues in an Online Social Learning Portal. Int. J. Inf. Secur. Priv. 11(1): 1-17 (2017) - [c21]Paul Biocco, Mohd Anwar:
Grid Framework to Address Password Memorability Issues and Offline Password Attacks. AHFE (9) 2017: 52-61 - [c20]Marguerite McDaniel, Mohd Anwar:
Zen_Space: A Smartphone App for Individually Tailored Stress Management Support for College Students. ICSH 2017: 123-133 - 2016
- [j3]Imano Williams, Xiaohong Yuan, Jeffrey Todd McDonald, Mohd Anwar:
A Method for Developing Abuse Cases and Its Evaluation. J. Softw. 11(5): 520-527 (2016) - [c19]Mohd Anwar, Wu He, Xiaohong Yuan:
Employment status and cybersecurity behaviors. BESC 2016: 1-2 - [c18]James Brown, Mohd Anwar, Gerry V. Dozier:
An Evolutionary General Regression Neural Network Classifier for Intrusion Detection. ICCCN 2016: 1-5 - [c17]James Brown, Mohd Anwar, Gerry V. Dozier:
Intrusion Detection Using a Multiple-Detector Set Artificial Immune System. IRI 2016: 283-286 - [c16]James Brown, Mohd Anwar, Gerry V. Dozier:
Detection of Mobile Malware: An Artificial Immunity Approach. IEEE Symposium on Security and Privacy Workshops 2016: 74-80 - [c15]Mohd Anwar, Sourav Saha, Matthew M. Ziegler, Lakshmi N. Reddy:
Early Scenario Pruning for Efficient Design Space Exploration in Physical Synthesis. VLSID 2016: 116-121 - 2015
- [j2]Konstantinos Pelechrinis, Vladimir Zadorozhny, Velin Kounev, Vladimir A. Oleshchuk, Mohd Anwar, Yiling Lin:
Automatic evaluation of information provider reliability and expertise. World Wide Web 18(1): 33-72 (2015) - [c14]Mohd Anwar, Ivan K. Ash, Wu He, Ling Li, Li Xu, Xiaohong Yuan:
A Security Behavior Model of Employees in Cyberspace. AMCIS 2015 - [c13]Mohd Anwar, Ashiq Imran:
Access Control for Multi-tenancy in Cloud-Based Health Information Systems. CSCloud 2015: 104-110 - [c12]Mohd Anwar, Zhuoning Yuan:
Linking Obesity and Tweets. ICSH 2015: 254-266 - [c11]Mohd Anwar, Ashiq Imran:
A Comparative Study of Graphical and Alphanumeric Passwords for Mobile Device Authentication. MAICS 2015: 13-18 - 2014
- [c10]Ling Li, Wu He, Li Xu, Ivan K. Ash, Mohd Anwar, Xiaohong Yuan:
Does Explicit Information Security Policy Affect Employees' Cyber Security Behavior? A Pilot Study. ES 2014: 169-173 - [c9]Mohd Anwar:
Leveraging online social media for capturing observations of daily living and ecological momentary assessment. IRI 2014: 104-108 - 2013
- [j1]Lei Jin, James B. D. Joshi, Mohd Anwar:
Mutual-friend based attacks in social network systems. Comput. Secur. 37: 15-30 (2013) - [c8]Mohd Anwar, Edward Hill, John Skujins, Kitty Huynh, Cristopher Doss:
Kalico: A Smartphone Application for Health-Smart Menu Selection within a Budget. ICSH 2013: 113-121 - [c7]Mohd Anwar, Syed Azeemuddin, Mohammed Zafar Ali Khan:
Design and Analysis of a Novel Noise Cancelling Topology for Common Gate UWB LNAs. VDAT 2013: 169-176 - 2012
- [c6]Lei Jin, Xuelian Long, James B. D. Joshi, Mohd Anwar:
Analysis of access control mechanisms for users' check-ins in Location-Based Social Network Systems. IRI 2012: 712-717 - 2011
- [c5]Jesus M. Gonzalez, Mohd Anwar, James B. D. Joshi:
A trust-based approach to mitigate rerouting attacks. CollaborateCom 2011: 520-523 - [c4]Nathalie Baracaldo, Claudia A. López, Mohd Anwar, Michael Lewis:
Simulating the effect of privacy concerns in online social networks. IRI 2011: 519-524 - [c3]Jesus M. Gonzalez, Mohd Anwar, James B. D. Joshi:
A trust-based approach against IP-spoofing attacks. PST 2011: 63-70 - [c2]Shashank Sharma, Syed Azeemuddin, Mohd Anwar:
A Self Learning VLSI Lab along with Web-Based Platform to Design Schematics and Layouts. T4E 2011: 205-207 - [c1]Jesus M. Gonzalez, Mohd Anwar, James B. D. Joshi:
Trust-Based Approaches to Solve Routing Issues in Ad-Hoc Wireless Networks: A Survey. TrustCom 2011: 556-563
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-23 20:29 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint