Peer-reviewed Publications

  • E. Grant, and S. Shao, "Software Engineering M.S. Program for Safety Critical System with Artificial Intelligence," The 10th International Conference on Computer and Communications (ICCC), 2024. (Accepted for Publication)

  • E. Grant, S. Shao, Q. Shi, and M. Arinaitwe, "Applying AI in Software Development Education," The 6th IEEE Eurasia Conference on IoT, Communication and Engineering, 2024. (Accepted for Publication)

  • Q. Shi, Z. Yang, A. Haidar, B. Terry, F. Li, J. Zhang and S. Shao, "Anomaly Transformer-based System Log Anomaly Detection," IEEE Cyber Awareness and Research Symposium, 2024. (Accepted for Publication)

  • F. Li, H. Wu, Q. Shi, S. Shao, J. Zhang, "Towards Quality Controllable Data Synthesis: A Case Study on Synthesizing Network Intrusions," IEEE Cyber Awareness and Research Symposium, 2024. (Accepted for Publication)

  • L. Yao, Q. Shi, Z. Yang, S. Shao, and S. Hariri, "Development of an Edge Resilient ML Ensemble to Tolerate ICS Adversarial Attack," In Dynamic Data Driven Applications Systems: 5th International Conference, DDDAS, Springer, 2024. (Accepted for Publication)

  • M.W.U. Rahman, M. Abrar, C. Hunter, S. Hariri, S. Shao, P. Satam, and S. Salehi, "Quantized Transformer Language Model Implementations on Edge Devices," The 22nd IEEE International Conference on Machine Learning and Applications, 2023.

  • L. Yao, S. Shao, and S. Hariri, "Resilient Machine Learning (rML) Against Adversarial Attacks on Industrial Control Systems," The 20th IEEE/ACS International Conference on Computer Systems and Applications, 2023.

  • T. Ha, S. Shao, and S. Hariri, "An Explainable Outlier Detection-based Data Cleaning Approach for Intrusion Detection," The 20th IEEE/ACS International Conference on Computer Systems and Applications, 2023.

  • I. Almazyad, S. Shao, and S. Hariri, "Anomaly Behavior Analysis of Smart Water Treatment Facility Service: Design, Analysis and Evaluation," The 20th IEEE/ACS International Conference on Computer Systems and Applications, 2023.

  • Y. Lin, S. Shao, M. H. Rahman, M. Shafae, and P. Satam, "DT4I4-Secure: Digital Twin Framework for Industry 4.0 Systems Security," The 14th IEEE Annual Ubiquitous Computing, Electronics and Mobile Communication Conference, 2023.

  • M. M. Lopez, S. Shao, S. Hariri, and S. Salehi, "Machine Learning for Intrusion Detection: Stream Classification Guided by Clustering for Sustainable Security in IoT," The 33rd ACM Great Lakes Symposium on VLSI, 2023.

  • P. Satam, C. Philipp, S. Shao, and S. Salehi, "CPS-TR: An Online Training Platform to Address Fourth Industrial Revolution Workforce Needs," The 13th IEEE Integrated STEM Education Conference, 2023.

  • S. Shao, S. Alharir, S. Hariri, P. Satam, S. Shiri, and A. Mbarki, "AI-based Arabic Language and Speech Tutor," The 19th IEEE/ACS International Conference on Computer Systems and Applications, 2022.

  • M. Rahman, S. Shao, P. Satam, S. Hariri, C. Padilla, Z. Taylor, and C. Nevarez, "A BERT-based Deep Learning Approach for Reputation Analysis in Social Media," The 19th IEEE/ACS International Conference on Computer Systems and Applications, 2022.

  • S. Elmadani, S. Hariri, and S. Shao, "Blockchain Based Methodology for Zero Trust Modeling and Quantification for 5G Networks," The Federated Systems & Testbeds Workshop on 5G and Beyond in the 19th IEEE/ACS International Conference on Computer Systems and Applications, 2022.

  • X. Gao, R. Sundaresh, P. Rohit, J. Rodríguez, J. Szep, S. Shao, P. Satam, J. Pacheco, and S. Hariri, "Selecting Post-Processing Schemes for Accurate Detection of Small Objects in Low-Resolution Wide-Area Aerial Imagery," Remote Sensing, 2022.

  • S. Shao, P. Satam, S. Satam, K. Al-Awady, G. Ditzler, S. Hariri, and C. Tunc, "Multi-Layer Mapping of Cyberspace for Intrusion Detection," The 18th IEEE/ACS International Conference on Computer Systems and Applications, 2021.

  • C. Wu, S. Shao, C. Tunc, P. Satam, and S. Hariri, "An Explainable and Efficient Deep Learning Framework for Video Anomaly Detection," Cluster Computing, 2021.

  • S. Shao, C. Tunc, A. Al-Shawi, and S. Hariri, "An Ensemble of Ensembles Approach to Author Attribution for Internet Relay Chat Forensics," ACM Transactions on Management Information Systems, 2020.

  • C. Wu, S. Shao, C. Tunc, and S. Hariri, "Video Anomaly Detection Using Pre-Trained Deep Convolutional Neural Nets and Context Mining," The 17th IEEE/ACS International Conference on Computer Systems and Applications, 2020.

  • S. Shao, C. Tunc, A. Al-Shawi, and S. Hariri, "One-class classification with deep autoencoder neural networks for author verification in internet relay chat," The 16th IEEE/ACS International Conference on Computer Systems and Applications, 2019.

  • S. Shao, C. Tunc, A. Al-Shawi, and S. Hariri, "Automated Twitter Author Clustering with Unsupervised Learning for Social Media Forensics," The 16th IEEE/ACS International Conference on Computer Systems and Applications, 2019.

  • S. Shao, C. Tunc, A. Al-Shawi, and S. Hariri, "Autonomic author identification in internet relay chat (IRC)," The 15th IEEE/ACS International Conference on Computer Systems and Applications, 2018.

  • J. Bernard, S. Shao, C. Tunc, H. Kheddouci, and S. Hariri, "Quasi-cliques analysis for IRC channel thread detection," The 7th International Conference on Complex Networks and their Applications, 2018.

  • S. Shao, C. Tunc, P. Satam, and S. Hariri, "Real-time IRC Threat Detection Framework," The 2nd IEEE International Workshops on Foundations and Applications of Self* Systems, 2017.

  • S. Shao, "Real-Time Automatic Framework for IRC Threat Information Detection," PhD Track/Doctoral Symposium in the 2nd IEEE International Workshops on Foundations and Applications of Self* Systems, 2017.