Alert button
Picture for Abdallah Khreishah

Abdallah Khreishah

Alert button

Genetic Algorithm-Based Dynamic Backdoor Attack on Federated Learning-Based Network Traffic Classification

Add code
Bookmark button
Alert button
Sep 27, 2023
Mahmoud Nazzal, Nura Aljaafari, Ahmed Sawalmeh, Abdallah Khreishah, Muhammad Anan, Abdulelah Algosaibi, Mohammed Alnaeem, Adel Aldalbahi, Abdulaziz Alhumam, Conrado P. Vizcarra, Shadan Alhamed

Viaarxiv icon

Multi-Instance Adversarial Attack on GNN-Based Malicious Domain Detection

Add code
Bookmark button
Alert button
Aug 22, 2023
Mahmoud Nazzal, Issa Khalil, Abdallah Khreishah, NhatHai Phan, Yao Ma

Figure 1 for Multi-Instance Adversarial Attack on GNN-Based Malicious Domain Detection
Figure 2 for Multi-Instance Adversarial Attack on GNN-Based Malicious Domain Detection
Figure 3 for Multi-Instance Adversarial Attack on GNN-Based Malicious Domain Detection
Figure 4 for Multi-Instance Adversarial Attack on GNN-Based Malicious Domain Detection
Viaarxiv icon

Semi-decentralized Inference in Heterogeneous Graph Neural Networks for Traffic Demand Forecasting: An Edge-Computing Approach

Add code
Bookmark button
Alert button
Feb 28, 2023
Mahmoud Nazzal, Abdallah Khreishah, Joyoung Lee, Shaahin Angizi

Figure 1 for Semi-decentralized Inference in Heterogeneous Graph Neural Networks for Traffic Demand Forecasting: An Edge-Computing Approach
Figure 2 for Semi-decentralized Inference in Heterogeneous Graph Neural Networks for Traffic Demand Forecasting: An Edge-Computing Approach
Figure 3 for Semi-decentralized Inference in Heterogeneous Graph Neural Networks for Traffic Demand Forecasting: An Edge-Computing Approach
Figure 4 for Semi-decentralized Inference in Heterogeneous Graph Neural Networks for Traffic Demand Forecasting: An Edge-Computing Approach
Viaarxiv icon

Heterogeneous Randomized Response for Differential Privacy in Graph Neural Networks

Add code
Bookmark button
Alert button
Nov 10, 2022
Khang Tran, Phung Lai, NhatHai Phan, Issa Khalil, Yao Ma, Abdallah Khreishah, My Thai, Xintao Wu

Figure 1 for Heterogeneous Randomized Response for Differential Privacy in Graph Neural Networks
Figure 2 for Heterogeneous Randomized Response for Differential Privacy in Graph Neural Networks
Figure 3 for Heterogeneous Randomized Response for Differential Privacy in Graph Neural Networks
Figure 4 for Heterogeneous Randomized Response for Differential Privacy in Graph Neural Networks
Viaarxiv icon

An Adaptive Black-box Defense against Trojan Attacks (TrojDef)

Add code
Bookmark button
Alert button
Sep 05, 2022
Guanxiong Liu, Abdallah Khreishah, Fatima Sharadgah, Issa Khalil

Figure 1 for An Adaptive Black-box Defense against Trojan Attacks (TrojDef)
Figure 2 for An Adaptive Black-box Defense against Trojan Attacks (TrojDef)
Figure 3 for An Adaptive Black-box Defense against Trojan Attacks (TrojDef)
Figure 4 for An Adaptive Black-box Defense against Trojan Attacks (TrojDef)
Viaarxiv icon

Model Transferring Attacks to Backdoor HyperNetwork in Personalized Federated Learning

Add code
Bookmark button
Alert button
Jan 19, 2022
Phung Lai, NhatHai Phan, Abdallah Khreishah, Issa Khalil, Xintao Wu

Viaarxiv icon

Adversarial Attacks and Defenses for Social Network Text Processing Applications: Techniques, Challenges and Future Research Directions

Add code
Bookmark button
Alert button
Oct 26, 2021
Izzat Alsmadi, Kashif Ahmad, Mahmoud Nazzal, Firoj Alam, Ala Al-Fuqaha, Abdallah Khreishah, Abdulelah Algosaibi

Figure 1 for Adversarial Attacks and Defenses for Social Network Text Processing Applications: Techniques, Challenges and Future Research Directions
Figure 2 for Adversarial Attacks and Defenses for Social Network Text Processing Applications: Techniques, Challenges and Future Research Directions
Figure 3 for Adversarial Attacks and Defenses for Social Network Text Processing Applications: Techniques, Challenges and Future Research Directions
Figure 4 for Adversarial Attacks and Defenses for Social Network Text Processing Applications: Techniques, Challenges and Future Research Directions
Viaarxiv icon

Smart Traffic Monitoring System using Computer Vision and Edge Computing

Add code
Bookmark button
Alert button
Sep 07, 2021
Guanxiong Liu, Hang Shi, Abbas Kiani, Abdallah Khreishah, Jo Young Lee, Nirwan Ansari, Chengjun Liu, Mustafa Yousef

Figure 1 for Smart Traffic Monitoring System using Computer Vision and Edge Computing
Figure 2 for Smart Traffic Monitoring System using Computer Vision and Edge Computing
Figure 3 for Smart Traffic Monitoring System using Computer Vision and Edge Computing
Figure 4 for Smart Traffic Monitoring System using Computer Vision and Edge Computing
Viaarxiv icon

A Synergetic Attack against Neural Network Classifiers combining Backdoor and Adversarial Examples

Add code
Bookmark button
Alert button
Sep 03, 2021
Guanxiong Liu, Issa Khalil, Abdallah Khreishah, NhatHai Phan

Figure 1 for A Synergetic Attack against Neural Network Classifiers combining Backdoor and Adversarial Examples
Figure 2 for A Synergetic Attack against Neural Network Classifiers combining Backdoor and Adversarial Examples
Figure 3 for A Synergetic Attack against Neural Network Classifiers combining Backdoor and Adversarial Examples
Figure 4 for A Synergetic Attack against Neural Network Classifiers combining Backdoor and Adversarial Examples
Viaarxiv icon

ManiGen: A Manifold Aided Black-box Generator of Adversarial Examples

Add code
Bookmark button
Alert button
Jul 11, 2020
Guanxiong Liu, Issa Khalil, Abdallah Khreishah, Abdulelah Algosaibi, Adel Aldalbahi, Mohammed Alaneem, Abdulaziz Alhumam, Mohammed Anan

Figure 1 for ManiGen: A Manifold Aided Black-box Generator of Adversarial Examples
Figure 2 for ManiGen: A Manifold Aided Black-box Generator of Adversarial Examples
Figure 3 for ManiGen: A Manifold Aided Black-box Generator of Adversarial Examples
Figure 4 for ManiGen: A Manifold Aided Black-box Generator of Adversarial Examples
Viaarxiv icon