default search action
Abdullah Al-Dujaili
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2021
- [j7]Erik Hemberg, Jamal Toutouh, Abdullah Al-Dujaili, Tom Schmiedlechner, Una-May O'Reilly:
Spatial Coevolution for Generative Adversarial Network Training. ACM Trans. Evol. Learn. Optim. 1(2): 6:1-6:28 (2021) - 2020
- [j6]Lenos Ioannou, Abdullah Al-Dujaili, Suhaib A. Fahmy:
High Throughput Spatial Convolution Filters on FPGAs. IEEE Trans. Very Large Scale Integr. Syst. 28(6): 1392-1402 (2020) - [c18]Sicco Verwer, Azqa Nadeem, Christian A. Hammerschmidt, Laurens Bliek, Abdullah Al-Dujaili, Una-May O'Reilly:
The Robust Malware Detection Challenge and Greedy Random Accelerated Multi-Bit Search. AISec@CCS 2020: 61-70 - [c17]Abdullah Al-Dujaili, Una-May O'Reilly:
Sign Bits Are All You Need for Black-Box Attacks. ICLR 2020 - [c16]Sijia Liu, Songtao Lu, Xiangyi Chen, Yao Feng, Kaidi Xu, Abdullah Al-Dujaili, Mingyi Hong, Una-May O'Reilly:
Min-Max Optimization without Gradients: Convergence and Applications to Black-Box Evasion and Poisoning Attacks. ICML 2020: 6282-6293
2010 – 2019
- 2019
- [j5]Abdullah Al-Dujaili, Suresh Sundaram:
Revisiting norm optimization for multi-objective black-box problems: a finite-time analysis. J. Glob. Optim. 73(3): 659-673 (2019) - [i12]Abdullah Al-Dujaili, Una-May O'Reilly:
There are No Bit Parts for Sign Bits in Black-Box Attacks. CoRR abs/1902.06894 (2019) - [i11]Sijia Liu, Songtao Lu, Xiangyi Chen, Yao Feng, Kaidi Xu, Abdullah Al-Dujaili, Mingyi Hong, Una-May O'Reilly:
Min-Max Optimization without Gradients: Convergence and Applications to Adversarial ML. CoRR abs/1909.13806 (2019) - 2018
- [j4]Abdullah Al-Dujaili, Suresh Sundaram:
Multi-Objective Simultaneous Optimistic Optimization. Inf. Sci. 424: 159-174 (2018) - [j3]Cheryl Sze Yin Wong, Abdullah Al-Dujaili, Suresh Sundaram, N. Sundararajan:
Pareto-aware strategies for faster convergence in multi-objective multi-scale search optimization. Inf. Sci. 454-455: 1-15 (2018) - [c15]Pavitra Krishnaswamy, Savitha Ramasamy, Abdullah Al-Dujaili, Srinath Sridharan, Geraldine Goh, Shao Chuen Tong, Khin Chaw Yu Aung, Gerard Leong Kui Toh, Michael Ross Macdonald, Sheldon Lee Shao Guang, Yan Cao, Suresh Sundaram, Chow Wai Leng:
A Predictive Analytics Methodology to Assess and Optimize Readmission Risk in Heart Failure Patients. AAAI Workshops 2018: 463-464 - [c14]Gili Rusak, Abdullah Al-Dujaili, Una-May O'Reilly:
AST-Based Deep Learning for Detecting Malicious PowerShell. CCS 2018: 2276-2278 - [c13]Abdullah Al-Dujaili, Alex Huang, Erik Hemberg, Una-May O'Reilly:
Adversarial Deep Learning for Robust Detection of Binary Encoded Malware. IEEE Symposium on Security and Privacy Workshops 2018: 76-82 - [i10]Alex Huang, Abdullah Al-Dujaili, Erik Hemberg, Una-May O'Reilly:
Adversarial Deep Learning for Robust Detection of Binary Encoded Malware. CoRR abs/1801.02950 (2018) - [i9]Abdullah Al-Dujaili, Erik Hemberg, Una-May O'Reilly:
Approximating Nash Equilibria for Black-Box Games: A Bayesian Optimization Approach. CoRR abs/1804.10586 (2018) - [i8]Alex Huang, Abdullah Al-Dujaili, Erik Hemberg, Una-May O'Reilly:
On Visual Hallmarks of Robustness to Adversarial Malware. CoRR abs/1805.03553 (2018) - [i7]Abdullah Al-Dujaili, Shashank Srikant, Erik Hemberg, Una-May O'Reilly:
On the Application of Danskin's Theorem to Derivative-Free Minimax Optimization. CoRR abs/1805.06322 (2018) - [i6]Tom Schmiedlechner, Abdullah Al-Dujaili, Erik Hemberg, Una-May O'Reilly:
Towards Distributed Coevolutionary GANs. CoRR abs/1807.08194 (2018) - [i5]Gili Rusak, Abdullah Al-Dujaili, Una-May O'Reilly:
AST-Based Deep Learning for Detecting Malicious PowerShell. CoRR abs/1810.09230 (2018) - [i4]Jwala Dhamala, Emmanuel Azuh, Abdullah Al-Dujaili, Jonathan Rubin, Una-May O'Reilly:
Multivariate Time-series Similarity Assessment via Unsupervised Representation Learning and Stratified Locality Sensitive Hashing: Application to Early Acute Hypotensive Episode Detection. CoRR abs/1811.06106 (2018) - [i3]Tom Schmiedlechner, Ignavier Ng Zhi Yong, Abdullah Al-Dujaili, Erik Hemberg, Una-May O'Reilly:
Lipizzaner: A System That Scales Robust Generative Adversarial Network Training. CoRR abs/1811.12843 (2018) - 2017
- [b1]Abdullah Al-Dujaili:
Multi-scale search for black-box optimization : theory & algorithms. Nanyang Technological University, Singapore, 2017 - [c12]Abdullah Al-Dujaili, Suresh Sundaram:
Embedded Bandits for Large-Scale Black-Box Optimization. AAAI 2017: 758-764 - [i2]Abdullah Al-Dujaili, Suhaib A. Fahmy:
High Throughput 2D Spatial Image Filters on FPGAs. CoRR abs/1710.05154 (2017) - 2016
- [j2]Abdullah Al-Dujaili, Suresh Sundaram:
A Naive multi-scale search algorithm for global optimization problems. Inf. Sci. 372: 294-312 (2016) - [j1]Abdullah Al-Dujaili, Suresh Sundaram, N. Sundararajan:
MSO: a framework for bound-constrained black-box global optimization algorithms. J. Glob. Optim. 66(4): 811-845 (2016) - [c11]Abdullah Al-Dujaili, Suresh Sundaram:
Dividing rectangles attack multi-objective optimization. CEC 2016: 3606-3613 - [c10]Abdullah Al-Dujaili, Suresh Sundaram:
Analysis of the Bayesian multi-scale optimistic optimization on the CEC2016 and BBOB testbeds. CEC 2016: 4988-4995 - [c9]Cheryl Sze Yin Wong, Abdullah Al-Dujaili, Suresh Sundaram:
Hypervolume-Based DIRECT for Multi-Objective Optimisation. GECCO (Companion) 2016: 1201-1208 - [c8]Abdullah Al-Dujaili, Suresh Sundaram:
A MATLAB Toolbox for Surrogate-Assisted Multi-Objective Optimization: A Preliminary Study. GECCO (Companion) 2016: 1209-1216 - [c7]Muhammad Rizwan Tanweer, Abdullah Al-Dujaili, Suresh Sundaram:
Multi-Objective Self Regulating Particle Swarm Optimization algorithm for BMOBench platform. SSCI 2016: 1-6 - [i1]Abdullah Al-Dujaili, Suresh Sundaram:
Embedded Bandits for Large-Scale Black-Box Optimization. CoRR abs/1611.08773 (2016) - 2015
- [c6]Abdullah Al-Dujaili, K. Subramanian, Suresh Sundaram:
HumanCog: A cognitive architecture for solving optimization problems. CEC 2015: 3220-3227 - [c5]Abdullah Al-Dujaili, François Merciol, Sébastien Lefèvre:
GraphBPT: An Efficient Hierarchical Data Structure for Image Representation and Probabilistic Inference. ISMM 2015: 301-312 - [c4]Muhammad Rizwan Tanweer, Abdullah Al-Dujaili, Suresh Sundaram:
Empirical Assessment of Human Learning Principles Inspired PSO Algorithms on Continuous Black-Box Optimization Testbed. SEMCCO 2015: 17-28 - [c3]Abdullah Al-Dujaili, Muhammad Rizwan Tanweer, Suresh Sundaram:
On the Performance of Particle Swarm Optimization Algorithms in Solving Cheap Problems. SSCI 2015: 1318-1325 - [c2]Abdullah Al-Dujaili, Muhammad Rizwan Tanweer, Suresh Sundaram:
DE vs. PSO: A Performance Assessment for Expensive Problems. SSCI 2015: 1711-1718 - 2012
- [c1]Abdullah Al-Dujaili, Florian Deragisch, Andrei Hagiescu, Weng-Fai Wong:
Guppy: A GPU-like soft-core processor. FPT 2012: 57-60
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-08-27 22:54 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint