Alert button
Picture for Ashraf Matrawy

Ashraf Matrawy

Alert button

Introducing Adaptive Continuous Adversarial Training (ACAT) to Enhance ML Robustness

Add code
Bookmark button
Alert button
Mar 15, 2024
Mohamed elShehaby, Aditya Kotha, Ashraf Matrawy

Figure 1 for Introducing Adaptive Continuous Adversarial Training (ACAT) to Enhance ML Robustness
Figure 2 for Introducing Adaptive Continuous Adversarial Training (ACAT) to Enhance ML Robustness
Figure 3 for Introducing Adaptive Continuous Adversarial Training (ACAT) to Enhance ML Robustness
Figure 4 for Introducing Adaptive Continuous Adversarial Training (ACAT) to Enhance ML Robustness
Viaarxiv icon

Adversarial Evasion Attacks Practicality in Networks: Testing the Impact of Dynamic Learning

Add code
Bookmark button
Alert button
Jun 08, 2023
Mohamed el Shehaby, Ashraf Matrawy

Figure 1 for Adversarial Evasion Attacks Practicality in Networks: Testing the Impact of Dynamic Learning
Figure 2 for Adversarial Evasion Attacks Practicality in Networks: Testing the Impact of Dynamic Learning
Figure 3 for Adversarial Evasion Attacks Practicality in Networks: Testing the Impact of Dynamic Learning
Figure 4 for Adversarial Evasion Attacks Practicality in Networks: Testing the Impact of Dynamic Learning
Viaarxiv icon

Evaluating Resilience of Encrypted Traffic Classification Against Adversarial Evasion Attacks

Add code
Bookmark button
Alert button
May 30, 2021
Ramy Maarouf, Danish Sattar, Ashraf Matrawy

Figure 1 for Evaluating Resilience of Encrypted Traffic Classification Against Adversarial Evasion Attacks
Figure 2 for Evaluating Resilience of Encrypted Traffic Classification Against Adversarial Evasion Attacks
Figure 3 for Evaluating Resilience of Encrypted Traffic Classification Against Adversarial Evasion Attacks
Figure 4 for Evaluating Resilience of Encrypted Traffic Classification Against Adversarial Evasion Attacks
Viaarxiv icon

DiPSeN: Differentially Private Self-normalizing Neural Networks For Adversarial Robustness in Federated Learning

Add code
Bookmark button
Alert button
Jan 08, 2021
Olakunle Ibitoye, M. Omair Shafiq, Ashraf Matrawy

Figure 1 for DiPSeN: Differentially Private Self-normalizing Neural Networks For Adversarial Robustness in Federated Learning
Figure 2 for DiPSeN: Differentially Private Self-normalizing Neural Networks For Adversarial Robustness in Federated Learning
Figure 3 for DiPSeN: Differentially Private Self-normalizing Neural Networks For Adversarial Robustness in Federated Learning
Figure 4 for DiPSeN: Differentially Private Self-normalizing Neural Networks For Adversarial Robustness in Federated Learning
Viaarxiv icon

A GAN-based Approach for Mitigating Inference Attacks in Smart Home Environment

Add code
Bookmark button
Alert button
Nov 13, 2020
Olakunle Ibitoye, Ashraf Matrawy, M. Omair Shafiq

Figure 1 for A GAN-based Approach for Mitigating Inference Attacks in Smart Home Environment
Figure 2 for A GAN-based Approach for Mitigating Inference Attacks in Smart Home Environment
Figure 3 for A GAN-based Approach for Mitigating Inference Attacks in Smart Home Environment
Figure 4 for A GAN-based Approach for Mitigating Inference Attacks in Smart Home Environment
Viaarxiv icon

Evaluation of Adversarial Training on Different Types of Neural Networks in Deep Learning-based IDSs

Add code
Bookmark button
Alert button
Jul 08, 2020
Rana Abou Khamis, Ashraf Matrawy

Figure 1 for Evaluation of Adversarial Training on Different Types of Neural Networks in Deep Learning-based IDSs
Figure 2 for Evaluation of Adversarial Training on Different Types of Neural Networks in Deep Learning-based IDSs
Figure 3 for Evaluation of Adversarial Training on Different Types of Neural Networks in Deep Learning-based IDSs
Figure 4 for Evaluation of Adversarial Training on Different Types of Neural Networks in Deep Learning-based IDSs
Viaarxiv icon

The Threat of Adversarial Attacks on Machine Learning in Network Security -- A Survey

Add code
Bookmark button
Alert button
Nov 06, 2019
Olakunle Ibitoye, Rana Abou-Khamis, Ashraf Matrawy, M. Omair Shafiq

Figure 1 for The Threat of Adversarial Attacks on Machine Learning in Network Security -- A Survey
Figure 2 for The Threat of Adversarial Attacks on Machine Learning in Network Security -- A Survey
Figure 3 for The Threat of Adversarial Attacks on Machine Learning in Network Security -- A Survey
Figure 4 for The Threat of Adversarial Attacks on Machine Learning in Network Security -- A Survey
Viaarxiv icon

Investigating Resistance of Deep Learning-based IDS against Adversaries using min-max Optimization

Add code
Bookmark button
Alert button
Oct 30, 2019
Rana Abou Khamis, Omair Shafiq, Ashraf Matrawy

Figure 1 for Investigating Resistance of Deep Learning-based IDS against Adversaries using min-max Optimization
Figure 2 for Investigating Resistance of Deep Learning-based IDS against Adversaries using min-max Optimization
Figure 3 for Investigating Resistance of Deep Learning-based IDS against Adversaries using min-max Optimization
Figure 4 for Investigating Resistance of Deep Learning-based IDS against Adversaries using min-max Optimization
Viaarxiv icon

Analyzing Adversarial Attacks Against Deep Learning for Intrusion Detection in IoT Networks

Add code
Bookmark button
Alert button
May 13, 2019
Olakunle Ibitoye, Omair Shafiq, Ashraf Matrawy

Figure 1 for Analyzing Adversarial Attacks Against Deep Learning for Intrusion Detection in IoT Networks
Figure 2 for Analyzing Adversarial Attacks Against Deep Learning for Intrusion Detection in IoT Networks
Figure 3 for Analyzing Adversarial Attacks Against Deep Learning for Intrusion Detection in IoT Networks
Figure 4 for Analyzing Adversarial Attacks Against Deep Learning for Intrusion Detection in IoT Networks
Viaarxiv icon

A Clustering-based Consistency Adaptation Strategy for Distributed SDN Controllers

Add code
Bookmark button
Alert button
May 25, 2017
Mohamed Aslan, Ashraf Matrawy

Figure 1 for A Clustering-based Consistency Adaptation Strategy for Distributed SDN Controllers
Figure 2 for A Clustering-based Consistency Adaptation Strategy for Distributed SDN Controllers
Figure 3 for A Clustering-based Consistency Adaptation Strategy for Distributed SDN Controllers
Figure 4 for A Clustering-based Consistency Adaptation Strategy for Distributed SDN Controllers
Viaarxiv icon