Home
Publications
Teaching
Contact
Publications
Type
Conference paper
Journal article
Thesis
Date
2026
2025
2024
2022
2021
2020
2019
2018
2017
2016
2013
Visibility-Aware GHOST: Mitigating Visibility Asymmetry in Subtree-Based Proof-of-Work Consensus
Abdulwahab Almusailem
,
Othman Alenezi
,
Ameer Mohammed
Applied Cryptography and Network Security (ACNS), 2026
Time-Delayed Publicly Verifiable Quantum Computation with Classical Verifiers
Ameer Mohammed
,
Aydin Abadi
,
Jaffer Mahdi
Proceedings of the 33rd ACM Conference on Computer and Communications Security (ACM CCS), 2026
Anonymous Command Authorization for IoT Devices Using Zero-Knowledge Proofs
Mohammad Mahdi
,
Ahmad Alqattan
,
Ameer Mohammed
Proceedings of the 22nd Annual International Conference on Distributed Computing in Smart Systems and the Internet of Things (DCOSS-IoT), 2026
Evaluating the Effectiveness of Q-Learning in Ant Colony Optimization for the Traveling Salesman Problem
Ameer Mohammed
,
Reham Kablaoui
,
Yousef Alfezea
IEEE Access, 2026
DOI
An Empirical Eye-Tracking Study of Cross-Lingual Program Comprehension and Debugging
Ameer Mohammed
,
Reem Albaghli
,
Hanaa Alrushood
,
Fatme Ghaddar
Journal of Systems and Software, 2026
DOI
Quantum Federated Learning for Adaptive Intrusion Detection Systems in Software-Defined Networks
Yousef Alfezea
,
Ameer Mohammed
International Symposium on Networks, Computers and Communications, 2025
DOI
Competition-style Sorting Networks (CSN): A Framework for Hardware-based Sorting Operations
Abbas Fairouz
,
Jassim Aljuraidan
,
Ameer Mohammed
IEEE Transactions on Computers, 2025
Vulnerability of Deep Forest to Adversarial Attacks
Ziad Tariq Ali
,
Ameer Mohammed
,
Imtiaz Ahmad
IEEE Transactions on Information Forensics and Security, 2024
Evaluating the adversarial robustness of Arabic spam classifiers
Anwar Alajmi
,
Imtiaz Ahmad
,
Ameer Mohammed
Neural Computing and Applications, 2024
Enhancing adversarial robustness with randomized interlayer processing
Ameer Mohammed
,
Ziad Tariq Ali
,
Imtiaz Ahmad
Expert Systems with Applications, 2024
Evaluating Adversarial Robustness of Secret Key-Based Defenses
Ziad Tariq Ali
,
Ameer Mohammed
,
Imtiaz Ahmad
IEEE Access, 2022
Deep forest model for diagnosing COVID-19 from routine blood tests
Maryam AlJame
,
Ayyub Imtiaz
,
Imtiaz Ahmad
,
Ameer Mohammed
International Journal on Artifical Intelligence Tools, 2021
Incremental Deployment of Hybrid IP/SDN Network with Optimized Traffic Engineering
Ali Kelkawi
,
Ameer Mohammed
,
Anwar Alyatama
IEEE Conference on Network Function Virtualization and Software Defined Networks, 2020
Ensemble learning model for diagnosing COVID-19 from routine blood tests
Maryam AlJame
,
Imtiaz Ahmad
,
Ayyub Imtiaz
,
Ameer Mohammed
Informatics in Medicine Unlocked, 2020
Fair and Privacy-Respecting Bitcoin Payments for Smart Grid Data
Tassos Dimitriou
,
Ameer Mohammed
IEEE Internet of Things Journal, 2020
Universal Multi-party Poisoning Attacks
Saeed Mahloujifar
,
Mohammad Mahmoody
,
Ameer Mohammed
International Conference on Machine Learning, 2019
PDF
Cite
The Computational Complexity of Program Obfuscation
Ameer Mohammed
Computer Science Department, University of Virginia, 2018
PDF
Cite
When does Functional Encryption Imply Obfuscation?
Sanjam Garg
,
Mohammad Mahmoody
,
Ameer Mohammed
Theory of Cryptography Conference, 2017
PDF
Cite
Lower Bounds on Indistinguishability Obfuscation from All-or-Nothing Encryption Primitives
Sanjam Garg
,
Mohammad Mahmoody
,
Ameer Mohammed
CRYPTO, 2017
PDF
Cite
On the Power of Hierarchical Identity-based Encryption
Mohammad Mahmoody
,
Ameer Mohammed
EUROCRYPT, 2016
PDF
Cite
Cryptographic Applications of Learning with Errors
Ameer Mohammed
Carnegie Mellon University, 2013
PDF
Cite
Cite
×