Mohamad Nassar, Ph.D.

Mohamad Nassar Image
Assistant Professor

Electrical & Computer Engineering and Computer Science Department
Tagliatela College of Engineering
Education

Bachelor of Engineering, Communication & Computer Engineering, Lebanese University
M.S., Computer Science, University of Lorraine
Doctor of Philosophy, Computer Science, University of Lorraine

About Mohamad

Dr. Mohamad Nassar is a tenure-track assistant professor in computer science and data science at the University of New Haven. He served in a similar position at The University of Alabama in Huntsville (2023-24), UNewHaven (2021-23) and the American University of Beirut (AUB) (2016-21). Before joining AUB, he completed a postdoctoral research stay at the department of computer science and engineering at Qatar University. Nassar received his research masterӰԭs degree (DEA) in computer science in 2005 and the Ph.D. degree in 2009, both from Nancy University (currently University of Lorraine), France. He worked as an expert research engineer at INRIA Nancy, France (2009-10) and Ericsson, Ireland (2011). Nassar has published more than 40 peer-reviewed conference and journal articles. He is active in research on AI for cybersecurity and explainable AI.

Publications

[J1] Y. Nasser and M. Nassar, ӰԭToward hardware-assisted malware detection utilizing explainable machine learning: A survey,Ӱԭ IEEE Access, 2023.

[J2] S. A. H. Ibrahim and M. Nassar, ӰԭOn the security of deep learning novelty detection,Ӱԭ Expert Systems with Applications, vol. 207, p. 117964, 2022.

[J3] E. Chicha, B. A. Bouna, M. Nassar, R. Chbeir, R. A. Haraty, M. Oussalah, D. Benslimane, and M. N. Alraja, ӰԭA user-centric mechanism for sequentially releasing graph datasets under blowfish privacy,Ӱԭ ACM Transactions on Internet Technology (TOIT), vol. 21, no. 1, pp. 1Ӱԭ25, 2021.

[J4] M. Nassar, K. Salah, M. H. ur Rehman, and D. Svetinovic, ӰԭBlockchain for explainable and trustworthy artificial intelligence,Ӱԭ Wiley Interdisciplinary Reviews: Data Mining and Knowledge Discovery, p. e1340, 2019.

[J5] K. Dassouki, H. Safa, M. Nassar, and A. Hijazi, ӰԭProtecting from cloud-based sip flooding attacks by leveraging temporal and structural fingerprints,Ӱԭ Computers & Security, vol. 70, pp. 618Ӱԭ633, 2017.

[J6] E. Chicha, B. Al Bouna, M. Nassar, and R. Chbeir, ӰԭCloud-based differentially private image classification,Ӱԭ Wireless Networks, pp. 1Ӱԭ8, 2018.

[J7] M. Nassar, Q. Malluhi, M. Atallah, and A. Shikfa, ӰԭSecuring aggregate queries for dna databases,Ӱԭ IEEE Transactions on Cloud Computing, vol. 7, no. 3, pp. 827Ӱԭ837, 2017.

[J8] T. Jung, S. Martin, M. Nassar, D. Ernst, and G. Leduc, ӰԭOutbound spit filter with optimal performance guarantees,Ӱԭ Computer Networks, vol. 57, no. 7, pp. 1630Ӱԭ1643, 2013.

[J9] Y. Rebahi, M. Nassar, T. Magedanz, and O. Festor, ӰԭA survey on fraud and service misuse in voice over ip (voip) networks,Ӱԭ information security technical report, vol. 16, no. 1, pp. 12Ӱԭ19, 2011.

Conference publications

[C1] M. Mekni, S. Atilho, B. Greenfield, B. Placzek, and M. Nassar, ӰԭReal-time smart parking integration in intelligent transportation systems (its),Ӱԭ in Proceedings of the Future Technologies Conference, pp. 212Ӱԭ236, Springer, 2023.

[C2] C. Barone, M. Mekni, and M. Nassar, ӰԭGargoyle guard: Enhancing cybersecurity with artificial intelligence techniques,Ӱԭ in The Third Intelligent Cybersecurity Conference (ICSC2023), https://www.icsc-conference.org/2023/index.php, 2023.

[C3] K. Samrouth, M. Nassar, and H. Harb, ӰԭRevisiting attack trees for modeling machine pwning in training environments,Ӱԭ in The Third Intelligent Cybersecurity Conference (ICSC2023), https://www.icsc-conference.org/2023/index.php, 2023.

[C4] C. S. Jayaramireddy, S. Naraharisetti, S. S. Veera Venkata, M. Nassar, and M. Mekni, ӰԭA survey of reinforcement learning toolkits for gaming: Applications, challenges and trends,Ӱԭ in Proceedings of the Future Technologies Conference, pp. 165Ӱԭ184, Springer, Cham, 2023.

[C5] K. L. Pasala, C. S. Jayaramireddy, S. Naraharisetti, S. S. Veera Venkata, S. Atilho, B. Greenfield, B. Placzek, M. Nassar, and M. Mekni, ӰԭSmart parking system (sps): An intelligent imageprocessing based parking solution,Ӱԭ in Conference on Sustainable Urban Mobility, pp. 291Ӱԭ299, Springer, 2022.

[C6] T. Edwards, S. McCullough, M. Nassar, and I. Baggili, ӰԭOn exploring the subdomain of artificial intelligence (ai) model forensics,Ӱԭ in EAI ICDF2C, https://icdf2c.eaiconferences. org/2021/, 2021.

[C7] D. Al Bared and M. Nassar, ӰԭSegmentation fault: A cheap defense against adversarial machine learning,Ӱԭ in 2021 3rd IEEE Middle East and North Africa COMMunications Conference (MENACOMM), pp. 37Ӱԭ42, IEEE, 2021.

[C8] S. Hajj Ibrahim and M. Nassar, ӰԭHack the box: Fooling deep learning abstraction-based monitors,Ӱԭ in The 2nd Workshop on Artificial Intelligence for Anomalies and Novelties (AI4AN 2021), co-located with IJCAI 2021, 2021.

[C9] M. Nassar, J. Khoury, A. Erradi, and E. Bou-Harb, ӰԭGame theoretical model for cybersecurity risk assessment of industrial control systems,Ӱԭ in 2021 11th IFIP International Conference on New Technologies, Mobility and Security (NTMS), pp. 1Ӱԭ7, IEEE, 2021.

[C10] N. M. Farroukh, M. Nassar, S. Elbassuoni, and H. Safa, ӰԭKeep it flat (kif): Resource management in integrated cloud-fog networks,Ӱԭ in ICWMC 2021, The Seventeenth International Conference on Wireless and Mobile Communications, no. ISBN: 978-1-61208-878-5, IARIA, 2021.

[C11] M. Nassar, E. Chicha, B. A. Bouna, and R. Chbeir, ӰԭVip blowfish privacy in communication graphs,Ӱԭ in Proceedings of the 17th International Joint Conference on e-Business and Telecommunications, fICETEg, vol. 2, pp. 459Ӱԭ467, Lieusaint, Paris, France, July 8-10, 2020, 2020.

[C12] J. Khoury and M. Nassar, ӰԭA hybrid game theory and reinforcement learning approach for cyber-physical systems security,Ӱԭ in NOMS 2020-2020 IEEE/IFIP Network Operations and Management Symposium, pp. 1Ӱԭ9, IEEE, 2020.

[C13] M. Nassar, A. Itani, M. Karout, M. El Baba, and O. A. S. Kaakaji, ӰԭShoplifting smart stores using adversarial machine learning,Ӱԭ in AICCSA, 2019.

[C14] N. Khan and M. Nassar, ӰԭA look into privacy-preserving blockchains,Ӱԭ in 2019 IEEE/ACS 16th International Conference on Computer Systems and Applications (AICCSA), pp. 1Ӱԭ6, IEEE, 2019.

[C15] M. Nassar, H. Safa, A. A. Mutawa, A. Helal, and I. Gaba, ӰԭChi squared feature selection over apache spark,Ӱԭ in Proceedings of the 23rd International Database Applications & Engineering Symposium, pp. 1Ӱԭ5, 2019.

[C16] M. A. Kadri, M. Nassar, and H. Safa, ӰԭTransfer learning for malware multi-classification,Ӱԭ in Proceedings of the 23rd International Database Applications & Engineering Symposium, p. 19, ACM, 2019.

[C17] M. Nassar, B. Rawda, and M. Mardini, Ӱԭselect: Secure election as a service,Ӱԭ in Proceedings of the 23rd International Database Applications & Engineering Symposium, 2019.

[C18] H. Safa, M. Nassar, and W. A. R. Al Orabi, ӰԭBenchmarking convolutional and recurrent neural networks for malware classification,Ӱԭ in 2019 15th International Wireless Communications & Mobile Computing Conference (IWCMC), pp. 561Ӱԭ566, IEEE, 2019. Mohamad Nassar Page 6 of 12

[C19] M. Nassar, Q. Malluhi, and T. Khan, ӰԭA scheme for three-way secure and verifiable e-voting,Ӱԭ in 15th ACS/IEEE International Conference on Computer Systems and Applications (AICCSA 2018), 2018.

[C20] M. Nassar and H. Safa, ӰԭThrottling malware families in 2d,Ӱԭ in 12th International Conference on Autonomous Infrastructure, Management and Security (IFIP AIMS 2018), http://www.aims-conference.org/2018/program.html, 2018.

[C21] Y. Awad, M. Nassar, and H. Safa, ӰԭModeling malware as a language,Ӱԭ in 2018 IEEE International Conference on Communications (ICC), pp. 1Ӱԭ6, IEEE, 2018.

[C22] H. Bou-Ammar, M. Jaber, and M. Nassar, ӰԭCorrectness-by-learning of infinite-state component-based systems,Ӱԭ in International Conference on Formal Aspects of Component Software, pp. 162Ӱԭ178, Springer, Cham, 2017.

[C23] M. Jaber, M. Nassar, W. A. R. Al Orabi, B. A. Farraj, M. O. Kayali, and C. Helwe, ӰԭReconfigurable and adaptive spark applications.,Ӱԭ in CLOSER - 7th International Conference on Cloud Computing and Services Science, pp. 84Ӱԭ91, 2017.

[C24] M. Nassar, N. Wehbe, and B. Al Bouna, ӰԭK-nn classification under homomorphic encryption: application on a labeled eigen faces dataset,Ӱԭ in 2016 IEEE Intl Conference on Computational Science and Engineering (CSE) and IEEE Intl Conference on Embedded and Ubiquitous Computing (EUC) and 15th Intl Symposium on Distributed Computing and Applications for Business Engineering (DCABES), pp. 546Ӱԭ552, IEEE, 2016.

[C25] S. Barakat, B. A. Bouna, M. Nassar, and C. Guyeux, ӰԭOn the evaluation of the privacy breach in disassociated set-valued datasets,Ӱԭ in Proceedings of the 13th International Joint Conference on e-Business and Telecommunications (ICETE 2016), SECRYPT, Lisbon, Portugal,, vol. 4, 2016.

[C26] M. Nassar, A. Erradi, and Q. M. Malluhi, ӰԭPaillierӰԭs encryption: Implementation and cloud applications,Ӱԭ in 2015 International Conference on Applied Research in Computer Science and Engineering (ICAR), pp. 1Ӱԭ5, IEEE, 2015.

[C27] M. Nassar, A. A.-R. Orabi, M. Doha, and B. Al Bouna, ӰԭAn sql-like query tool for data anonymization and outsourcing,Ӱԭ in 2015 International Conference on Cyber Situational Awareness, Data Analytics and Assessment (CyberSA), pp. 1Ӱԭ3, IEEE, 2015.

[C28] M. Nassar, A. Erradi, and Q. M. Malluhi, ӰԭA domain specific language for secure outsourcing of computation to the cloud,Ӱԭ in 2015 IEEE 19th International Enterprise Distributed Object Computing Conference, pp. 134Ӱԭ141, IEEE, 2015.

[C29] F. Sabry, A. Erradi, M. Nassar, and Q. M. Malluhi, ӰԭAutomatic generation of optimized workflow for distributed computations on large-scale matrices,Ӱԭ in International Conference on Service-Oriented Computing, pp. 79Ӱԭ92, Springer, 2014.

[C30] M. Nassar, A. Erradi, F. Sabry, and Q. M. Malluhi, ӰԭA model driven framework for secure outsourcing of computation to the cloud,Ӱԭ in 2014 IEEE 7th International Conference on Cloud Computing, pp. 968Ӱԭ969, IEEE, 2014.

[C31] M. Nassar, B. al Bouna, and Q. Malluhi, ӰԭSecure outsourcing of network flow data analysis,Ӱԭ in 2013 IEEE International Congress on Big Data, pp. 431Ӱԭ432, IEEE, 2013.

[C32] S. Wang, M. Nassar, M. Atallah, and Q. Malluhi, ӰԭSecure and private outsourcing of shapebased feature extraction,Ӱԭ in International conference on information and communications security, pp. 90Ӱԭ99, Springer, Cham, 2013. Mohamad Nassar Page 7 of 12

[C33] M. Nassar, A. Erradi, and Q. M. Malluhi, ӰԭPractical and secure outsourcing of matrix computations to the cloud,Ӱԭ in 2013 IEEE 33rd International Conference on Distributed Computing Systems Workshops, pp. 70Ӱԭ75, IEEE, 2013.

[C34] M. Nassar, A. Erradi, F. Sabri, and Q. M. Malluhi, ӰԭSecure outsourcing of matrix operations as a service,Ӱԭ in 2013 IEEE Sixth International Conference on Cloud Computing, pp. 918Ӱԭ925, IEEE, 2013.

[C35] M. Wang, S. B. Handurukande, and M. Nassar, ӰԭRpig: A scalable framework for machine learning and advanced statistical functionalities,Ӱԭ in 4th IEEE International Conference on Cloud Computing Technology and Science Proceedings, pp. 293Ӱԭ300, IEEE, 2012.

[C36] M. Nassar, S. Martin, G. Leduc, and O. Festor, ӰԭUsing decision trees for generating adaptive spit signatures,Ӱԭ in Proceedings of the 4th international conference on Security of information and networks, pp. 13Ӱԭ20, ACM, 2011.

[C37] R. Do Carmo, M. Nassar, and O. Festor, ӰԭArtemisa: An open-source honeypot back-end to support security in voip domains,Ӱԭ in 12th IFIP/IEEE International Symposium on Integrated Network Management (IM 2011) and Workshops, pp. 361Ӱԭ368, IEEE, 2011.

[C38] M. Nassar, O. Dabbebi, R. Badonnel, and O. Festor, ӰԭRisk management in voip infrastructures using support vector machines,Ӱԭ in 2010 International Conference on Network and Service Management, pp. 48Ӱԭ55, IEEE, 2010.

[C39] M. Nassar, R. State, and O. Festor, ӰԭA framework for monitoring sip enterprise networks,Ӱԭ in 2010 Fourth International Conference on Network and System Security, pp. 1Ӱԭ8, IEEE, 2010.

[C40] M. Nassar, R. State, and O. Festor, ӰԭLabeled voip data-set for intrusion detection evaluation,Ӱԭ Networked Services and Applications-Engineering, Control and Management, pp. 97Ӱԭ106, 2010.

[C41] M. Nassar, R. State, and O. Festor, ӰԭVoip malware: Attack tool & attack scenarios,Ӱԭ in 2009 IEEE International Conference on Communications, pp. 1Ӱԭ6, IEEE, 2009.

[C42] M. Nassar, R. State, and O. Festor, ӰԭMonitoring sip traffic using support vector machines,Ӱԭ in Recent Advances in Intrusion Detection, pp. 311Ӱԭ330, Springer, 2008.

[C43] M. Nassar, S. Niccolini, R. State, and T. Ewald, ӰԭHolistic voip intrusion detection and prevention system,Ӱԭ in Proceedings of the 1st international conference on Principles, systems and applications of IP telecommunications, pp. 1Ӱԭ9, 2007.

[C44] M. Nassar, O. Festor, et al., ӰԭIbgp confederation provisioning,Ӱԭ in IFIP International Conference on Autonomous Infrastructure, Management and Security, pp. 25Ӱԭ34, Springer, Berlin, Heidelberg, 2007.

[C45] M. Nassar, O. Festor, et al., ӰԭVoip honeypot architecture,Ӱԭ in Integrated Network Management, 2007. IMӰԭ07. 10th IFIP/IEEE International Symposium on, pp. 109Ӱԭ118, IEEE, 2007.

[C46] M. Nassar, R. State, and O. Festor, ӰԭIntrusion detection mechanisms for voip applications,Ӱԭ in Third annual VoIP security workshop (VSWӰԭ06), 2006.

Chapter in book and arxiv

[B1] Y. Rebahi, R. Ruppelt, M. Nassar, and O. Festor, ӰԭScamstop: A platform for mitigating fraud in voip environments,Ӱԭ in Network and Traffic Engineering in Emerging Distributed Computing Applications, pp. 302Ӱԭ325, IGI Global, 2013.

[B2] M. Nassar, ӰԭA practical scheme for two-party private linear least squares,Ӱԭ arXiv preprint arXiv:1901.09281, 2019.