Peer-reviewed Publications
E. Grant, and S. Shao, "Software Engineering M.S. Program for Safety Critical System with Artificial Intelligence," The 10th International Conference on Computer and Communications (ICCC), 2024. (Accepted for Publication) E. Grant, S. Shao, Q. Shi, and M. Arinaitwe, "Applying AI in Software Development Education," The 6th IEEE Eurasia Conference on IoT, Communication and Engineering, 2024. (Accepted for Publication) Q. Shi, Z. Yang, A. Haidar, B. Terry, F. Li, J. Zhang and S. Shao, "Anomaly Transformer-based System Log Anomaly Detection," IEEE Cyber Awareness and Research Symposium, 2024. (Accepted for Publication) F. Li, H. Wu, Q. Shi, S. Shao, J. Zhang, "Towards Quality Controllable Data Synthesis: A Case Study on Synthesizing Network Intrusions," IEEE Cyber Awareness and Research Symposium, 2024. (Accepted for Publication) L. Yao, Q. Shi, Z. Yang, S. Shao, and S. Hariri, "Development of an Edge Resilient ML Ensemble to Tolerate ICS Adversarial Attack," In Dynamic Data Driven Applications Systems: 5th International Conference, DDDAS, Springer, 2024. (Accepted for Publication) M.W.U. Rahman, M. Abrar, C. Hunter, S. Hariri, S. Shao, P. Satam, and S. Salehi, "Quantized Transformer Language Model Implementations on Edge Devices," The 22nd IEEE International Conference on Machine Learning and Applications, 2023. L. Yao, S. Shao, and S. Hariri, "Resilient Machine Learning (rML) Against Adversarial Attacks on Industrial Control Systems," The 20th IEEE/ACS International Conference on Computer Systems and Applications, 2023. T. Ha, S. Shao, and S. Hariri, "An Explainable Outlier Detection-based Data Cleaning Approach for Intrusion Detection," The 20th IEEE/ACS International Conference on Computer Systems and Applications, 2023. I. Almazyad, S. Shao, and S. Hariri, "Anomaly Behavior Analysis of Smart Water Treatment Facility Service: Design, Analysis and Evaluation," The 20th IEEE/ACS International Conference on Computer Systems and Applications, 2023. Y. Lin, S. Shao, M. H. Rahman, M. Shafae, and P. Satam, "DT4I4-Secure: Digital Twin Framework for Industry 4.0 Systems Security," The 14th IEEE Annual Ubiquitous Computing, Electronics and Mobile Communication Conference, 2023. M. M. Lopez, S. Shao, S. Hariri, and S. Salehi, "Machine Learning for Intrusion Detection: Stream Classification Guided by Clustering for Sustainable Security in IoT," The 33rd ACM Great Lakes Symposium on VLSI, 2023. P. Satam, C. Philipp, S. Shao, and S. Salehi, "CPS-TR: An Online Training Platform to Address Fourth Industrial Revolution Workforce Needs," The 13th IEEE Integrated STEM Education Conference, 2023. S. Shao, S. Alharir, S. Hariri, P. Satam, S. Shiri, and A. Mbarki, "AI-based Arabic Language and Speech Tutor," The 19th IEEE/ACS International Conference on Computer Systems and Applications, 2022. M. Rahman, S. Shao, P. Satam, S. Hariri, C. Padilla, Z. Taylor, and C. Nevarez, "A BERT-based Deep Learning Approach for Reputation Analysis in Social Media," The 19th IEEE/ACS International Conference on Computer Systems and Applications, 2022. S. Elmadani, S. Hariri, and S. Shao, "Blockchain Based Methodology for Zero Trust Modeling and Quantification for 5G Networks," The Federated Systems & Testbeds Workshop on 5G and Beyond in the 19th IEEE/ACS International Conference on Computer Systems and Applications, 2022. X. Gao, R. Sundaresh, P. Rohit, J. RodrÃguez, J. Szep, S. Shao, P. Satam, J. Pacheco, and S. Hariri, "Selecting Post-Processing Schemes for Accurate Detection of Small Objects in Low-Resolution Wide-Area Aerial Imagery," Remote Sensing, 2022. S. Shao, P. Satam, S. Satam, K. Al-Awady, G. Ditzler, S. Hariri, and C. Tunc, "Multi-Layer Mapping of Cyberspace for Intrusion Detection," The 18th IEEE/ACS International Conference on Computer Systems and Applications, 2021. C. Wu, S. Shao, C. Tunc, P. Satam, and S. Hariri, "An Explainable and Efficient Deep Learning Framework for Video Anomaly Detection," Cluster Computing, 2021. S. Shao, C. Tunc, A. Al-Shawi, and S. Hariri, "An Ensemble of Ensembles Approach to Author Attribution for Internet Relay Chat Forensics," ACM Transactions on Management Information Systems, 2020. C. Wu, S. Shao, C. Tunc, and S. Hariri, "Video Anomaly Detection Using Pre-Trained Deep Convolutional Neural Nets and Context Mining," The 17th IEEE/ACS International Conference on Computer Systems and Applications, 2020. S. Shao, C. Tunc, A. Al-Shawi, and S. Hariri, "One-class classification with deep autoencoder neural networks for author verification in internet relay chat," The 16th IEEE/ACS International Conference on Computer Systems and Applications, 2019. S. Shao, C. Tunc, A. Al-Shawi, and S. Hariri, "Automated Twitter Author Clustering with Unsupervised Learning for Social Media Forensics," The 16th IEEE/ACS International Conference on Computer Systems and Applications, 2019. S. Shao, C. Tunc, A. Al-Shawi, and S. Hariri, "Autonomic author identification in internet relay chat (IRC)," The 15th IEEE/ACS International Conference on Computer Systems and Applications, 2018. J. Bernard, S. Shao, C. Tunc, H. Kheddouci, and S. Hariri, "Quasi-cliques analysis for IRC channel thread detection," The 7th International Conference on Complex Networks and their Applications, 2018. S. Shao, C. Tunc, P. Satam, and S. Hariri, "Real-time IRC Threat Detection Framework," The 2nd IEEE International Workshops on Foundations and Applications of Self* Systems, 2017. S. Shao, "Real-Time Automatic Framework for IRC Threat Information Detection," PhD Track/Doctoral Symposium in the 2nd IEEE International Workshops on Foundations and Applications of Self* Systems, 2017.