Alert button
Picture for Alsharif Abuadbba

Alsharif Abuadbba

Alert button

Profiler: Profile-Based Model to Detect Phishing Emails

Add code
Bookmark button
Alert button
Aug 18, 2022
Mariya Shmalko, Alsharif Abuadbba, Raj Gaire, Tingmin Wu, Hye-Young Paik, Surya Nepal

Figure 1 for Profiler: Profile-Based Model to Detect Phishing Emails
Figure 2 for Profiler: Profile-Based Model to Detect Phishing Emails
Figure 3 for Profiler: Profile-Based Model to Detect Phishing Emails
Figure 4 for Profiler: Profile-Based Model to Detect Phishing Emails
Viaarxiv icon

Binarizing Split Learning for Data Privacy Enhancement and Computation Reduction

Add code
Bookmark button
Alert button
Jun 10, 2022
Ngoc Duy Pham, Alsharif Abuadbba, Yansong Gao, Tran Khoa Phan, Naveen Chilamkurti

Figure 1 for Binarizing Split Learning for Data Privacy Enhancement and Computation Reduction
Figure 2 for Binarizing Split Learning for Data Privacy Enhancement and Computation Reduction
Figure 3 for Binarizing Split Learning for Data Privacy Enhancement and Computation Reduction
Figure 4 for Binarizing Split Learning for Data Privacy Enhancement and Computation Reduction
Viaarxiv icon

Towards A Critical Evaluation of Robustness for Deep Learning Backdoor Countermeasures

Add code
Bookmark button
Alert button
Apr 13, 2022
Huming Qiu, Hua Ma, Zhi Zhang, Alsharif Abuadbba, Wei Kang, Anmin Fu, Yansong Gao

Figure 1 for Towards A Critical Evaluation of Robustness for Deep Learning Backdoor Countermeasures
Figure 2 for Towards A Critical Evaluation of Robustness for Deep Learning Backdoor Countermeasures
Figure 3 for Towards A Critical Evaluation of Robustness for Deep Learning Backdoor Countermeasures
Figure 4 for Towards A Critical Evaluation of Robustness for Deep Learning Backdoor Countermeasures
Viaarxiv icon

Towards Web Phishing Detection Limitations and Mitigation

Add code
Bookmark button
Alert button
Apr 03, 2022
Alsharif Abuadbba, Shuo Wang, Mahathir Almashor, Muhammed Ejaz Ahmed, Raj Gaire, Seyit Camtepe, Surya Nepal

Figure 1 for Towards Web Phishing Detection Limitations and Mitigation
Figure 2 for Towards Web Phishing Detection Limitations and Mitigation
Figure 3 for Towards Web Phishing Detection Limitations and Mitigation
Figure 4 for Towards Web Phishing Detection Limitations and Mitigation
Viaarxiv icon

Email Summarization to Assist Users in Phishing Identification

Add code
Bookmark button
Alert button
Mar 24, 2022
Amir Kashapov, Tingmin Wu, Alsharif Abuadbba, Carsten Rudolph

Figure 1 for Email Summarization to Assist Users in Phishing Identification
Figure 2 for Email Summarization to Assist Users in Phishing Identification
Viaarxiv icon

Dangerous Cloaking: Natural Trigger based Backdoor Attacks on Object Detectors in the Physical World

Add code
Bookmark button
Alert button
Jan 21, 2022
Hua Ma, Yinshan Li, Yansong Gao, Alsharif Abuadbba, Zhi Zhang, Anmin Fu, Hyoungshick Kim, Said F. Al-Sarawi, Nepal Surya, Derek Abbott

Figure 1 for Dangerous Cloaking: Natural Trigger based Backdoor Attacks on Object Detectors in the Physical World
Figure 2 for Dangerous Cloaking: Natural Trigger based Backdoor Attacks on Object Detectors in the Physical World
Figure 3 for Dangerous Cloaking: Natural Trigger based Backdoor Attacks on Object Detectors in the Physical World
Figure 4 for Dangerous Cloaking: Natural Trigger based Backdoor Attacks on Object Detectors in the Physical World
Viaarxiv icon

NTD: Non-Transferability Enabled Backdoor Detection

Add code
Bookmark button
Alert button
Nov 22, 2021
Yinshan Li, Hua Ma, Zhi Zhang, Yansong Gao, Alsharif Abuadbba, Anmin Fu, Yifeng Zheng, Said F. Al-Sarawi, Derek Abbott

Figure 1 for NTD: Non-Transferability Enabled Backdoor Detection
Figure 2 for NTD: Non-Transferability Enabled Backdoor Detection
Figure 3 for NTD: Non-Transferability Enabled Backdoor Detection
Figure 4 for NTD: Non-Transferability Enabled Backdoor Detection
Viaarxiv icon

Quantization Backdoors to Deep Learning Models

Add code
Bookmark button
Alert button
Aug 20, 2021
Hua Ma, Huming Qiu, Yansong Gao, Zhi Zhang, Alsharif Abuadbba, Anmin Fu, Said Al-Sarawi, Derek Abbott

Figure 1 for Quantization Backdoors to Deep Learning Models
Figure 2 for Quantization Backdoors to Deep Learning Models
Figure 3 for Quantization Backdoors to Deep Learning Models
Figure 4 for Quantization Backdoors to Deep Learning Models
Viaarxiv icon

RAIDER: Reinforcement-aided Spear Phishing Detector

Add code
Bookmark button
Alert button
May 17, 2021
Keelan Evans, Alsharif Abuadbba, Mohiuddin Ahmed, Tingmin Wu, Mike Johnstone, Surya Nepal

Figure 1 for RAIDER: Reinforcement-aided Spear Phishing Detector
Figure 2 for RAIDER: Reinforcement-aided Spear Phishing Detector
Figure 3 for RAIDER: Reinforcement-aided Spear Phishing Detector
Figure 4 for RAIDER: Reinforcement-aided Spear Phishing Detector
Viaarxiv icon

OCTOPUS: Overcoming Performance andPrivatization Bottlenecks in Distributed Learning

Add code
Bookmark button
Alert button
May 03, 2021
Shuo Wang, Surya Nepal, Kristen Moore, Marthie Grobler, Carsten Rudolph, Alsharif Abuadbba

Figure 1 for OCTOPUS: Overcoming Performance andPrivatization Bottlenecks in Distributed Learning
Figure 2 for OCTOPUS: Overcoming Performance andPrivatization Bottlenecks in Distributed Learning
Figure 3 for OCTOPUS: Overcoming Performance andPrivatization Bottlenecks in Distributed Learning
Figure 4 for OCTOPUS: Overcoming Performance andPrivatization Bottlenecks in Distributed Learning
Viaarxiv icon