Alert button
Picture for Abdullah Al-Dujaili

Abdullah Al-Dujaili

Alert button

Min-Max Optimization without Gradients: Convergence and Applications to Adversarial ML

Add code
Bookmark button
Alert button
Sep 30, 2019
Sijia Liu, Songtao Lu, Xiangyi Chen, Yao Feng, Kaidi Xu, Abdullah Al-Dujaili, Minyi Hong, Una-May Obelilly

Figure 1 for Min-Max Optimization without Gradients: Convergence and Applications to Adversarial ML
Figure 2 for Min-Max Optimization without Gradients: Convergence and Applications to Adversarial ML
Figure 3 for Min-Max Optimization without Gradients: Convergence and Applications to Adversarial ML
Figure 4 for Min-Max Optimization without Gradients: Convergence and Applications to Adversarial ML
Viaarxiv icon

There are No Bit Parts for Sign Bits in Black-Box Attacks

Add code
Bookmark button
Alert button
Apr 03, 2019
Abdullah Al-Dujaili, Una-May O'Reilly

Figure 1 for There are No Bit Parts for Sign Bits in Black-Box Attacks
Figure 2 for There are No Bit Parts for Sign Bits in Black-Box Attacks
Figure 3 for There are No Bit Parts for Sign Bits in Black-Box Attacks
Figure 4 for There are No Bit Parts for Sign Bits in Black-Box Attacks
Viaarxiv icon

Multivariate Time-series Similarity Assessment via Unsupervised Representation Learning and Stratified Locality Sensitive Hashing: Application to Early Acute Hypotensive Episode Detection

Add code
Bookmark button
Alert button
Dec 04, 2018
Jwala Dhamala, Emmanuel Azuh, Abdullah Al-Dujaili, Jonathan Rubin, Una-May O'Reilly

Figure 1 for Multivariate Time-series Similarity Assessment via Unsupervised Representation Learning and Stratified Locality Sensitive Hashing: Application to Early Acute Hypotensive Episode Detection
Figure 2 for Multivariate Time-series Similarity Assessment via Unsupervised Representation Learning and Stratified Locality Sensitive Hashing: Application to Early Acute Hypotensive Episode Detection
Figure 3 for Multivariate Time-series Similarity Assessment via Unsupervised Representation Learning and Stratified Locality Sensitive Hashing: Application to Early Acute Hypotensive Episode Detection
Figure 4 for Multivariate Time-series Similarity Assessment via Unsupervised Representation Learning and Stratified Locality Sensitive Hashing: Application to Early Acute Hypotensive Episode Detection
Viaarxiv icon

Lipizzaner: A System That Scales Robust Generative Adversarial Network Training

Add code
Bookmark button
Alert button
Nov 30, 2018
Tom Schmiedlechner, Ignavier Ng Zhi Yong, Abdullah Al-Dujaili, Erik Hemberg, Una-May O'Reilly

Figure 1 for Lipizzaner: A System That Scales Robust Generative Adversarial Network Training
Figure 2 for Lipizzaner: A System That Scales Robust Generative Adversarial Network Training
Figure 3 for Lipizzaner: A System That Scales Robust Generative Adversarial Network Training
Figure 4 for Lipizzaner: A System That Scales Robust Generative Adversarial Network Training
Viaarxiv icon

AST-Based Deep Learning for Detecting Malicious PowerShell

Add code
Bookmark button
Alert button
Oct 03, 2018
Gili Rusak, Abdullah Al-Dujaili, Una-May O'Reilly

Figure 1 for AST-Based Deep Learning for Detecting Malicious PowerShell
Figure 2 for AST-Based Deep Learning for Detecting Malicious PowerShell
Figure 3 for AST-Based Deep Learning for Detecting Malicious PowerShell
Viaarxiv icon

Towards Distributed Coevolutionary GANs

Add code
Bookmark button
Alert button
Aug 31, 2018
Abdullah Al-Dujaili, Tom Schmiedlechner, and Erik Hemberg, Una-May O'Reilly

Figure 1 for Towards Distributed Coevolutionary GANs
Figure 2 for Towards Distributed Coevolutionary GANs
Figure 3 for Towards Distributed Coevolutionary GANs
Figure 4 for Towards Distributed Coevolutionary GANs
Viaarxiv icon

On Visual Hallmarks of Robustness to Adversarial Malware

Add code
Bookmark button
Alert button
May 09, 2018
Alex Huang, Abdullah Al-Dujaili, Erik Hemberg, Una-May O'Reilly

Figure 1 for On Visual Hallmarks of Robustness to Adversarial Malware
Figure 2 for On Visual Hallmarks of Robustness to Adversarial Malware
Figure 3 for On Visual Hallmarks of Robustness to Adversarial Malware
Figure 4 for On Visual Hallmarks of Robustness to Adversarial Malware
Viaarxiv icon

Adversarial Deep Learning for Robust Detection of Binary Encoded Malware

Add code
Bookmark button
Alert button
Mar 25, 2018
Abdullah Al-Dujaili, Alex Huang, Erik Hemberg, Una-May O'Reilly

Figure 1 for Adversarial Deep Learning for Robust Detection of Binary Encoded Malware
Figure 2 for Adversarial Deep Learning for Robust Detection of Binary Encoded Malware
Figure 3 for Adversarial Deep Learning for Robust Detection of Binary Encoded Malware
Figure 4 for Adversarial Deep Learning for Robust Detection of Binary Encoded Malware
Viaarxiv icon

BMOBench: Black-Box Multi-Objective Optimization Benchmarking Platform

Add code
Bookmark button
Alert button
Jul 01, 2017
Abdullah Al-Dujaili, S. Suresh

Figure 1 for BMOBench: Black-Box Multi-Objective Optimization Benchmarking Platform
Figure 2 for BMOBench: Black-Box Multi-Objective Optimization Benchmarking Platform
Figure 3 for BMOBench: Black-Box Multi-Objective Optimization Benchmarking Platform
Figure 4 for BMOBench: Black-Box Multi-Objective Optimization Benchmarking Platform
Viaarxiv icon