Alert button
Picture for Aminollah Khormali

Aminollah Khormali

Alert button

Self-Supervised Graph Transformer for Deepfake Detection

Add code
Bookmark button
Alert button
Jul 27, 2023
Aminollah Khormali, Jiann-Shiun Yuan

Figure 1 for Self-Supervised Graph Transformer for Deepfake Detection
Figure 2 for Self-Supervised Graph Transformer for Deepfake Detection
Figure 3 for Self-Supervised Graph Transformer for Deepfake Detection
Figure 4 for Self-Supervised Graph Transformer for Deepfake Detection
Viaarxiv icon

Deep Biological Pathway Informed Pathology-Genomic Multimodal Survival Prediction

Add code
Bookmark button
Alert button
Jan 06, 2023
Lin Qiu, Aminollah Khormali, Kai Liu

Figure 1 for Deep Biological Pathway Informed Pathology-Genomic Multimodal Survival Prediction
Figure 2 for Deep Biological Pathway Informed Pathology-Genomic Multimodal Survival Prediction
Figure 3 for Deep Biological Pathway Informed Pathology-Genomic Multimodal Survival Prediction
Figure 4 for Deep Biological Pathway Informed Pathology-Genomic Multimodal Survival Prediction
Viaarxiv icon

Generating Adversarial Examples with an Optimized Quality

Add code
Bookmark button
Alert button
Jun 30, 2020
Aminollah Khormali, DaeHun Nyang, David Mohaisen

Figure 1 for Generating Adversarial Examples with an Optimized Quality
Figure 2 for Generating Adversarial Examples with an Optimized Quality
Figure 3 for Generating Adversarial Examples with an Optimized Quality
Figure 4 for Generating Adversarial Examples with an Optimized Quality
Viaarxiv icon

COPYCAT: Practical Adversarial Attacks on Visualization-Based Malware Detection

Add code
Bookmark button
Alert button
Sep 20, 2019
Aminollah Khormali, Ahmed Abusnaina, Songqing Chen, DaeHun Nyang, Aziz Mohaisen

Figure 1 for COPYCAT: Practical Adversarial Attacks on Visualization-Based Malware Detection
Figure 2 for COPYCAT: Practical Adversarial Attacks on Visualization-Based Malware Detection
Figure 3 for COPYCAT: Practical Adversarial Attacks on Visualization-Based Malware Detection
Figure 4 for COPYCAT: Practical Adversarial Attacks on Visualization-Based Malware Detection
Viaarxiv icon

Examining Adversarial Learning against Graph-based IoT Malware Detection Systems

Add code
Bookmark button
Alert button
Feb 15, 2019
Ahmed Abusnaina, Aminollah Khormali, Hisham Alasmary, Jeman Park, Afsah Anwar, Ulku Meteriz, Aziz Mohaisen

Figure 1 for Examining Adversarial Learning against Graph-based IoT Malware Detection Systems
Figure 2 for Examining Adversarial Learning against Graph-based IoT Malware Detection Systems
Figure 3 for Examining Adversarial Learning against Graph-based IoT Malware Detection Systems
Viaarxiv icon