Alert button
Picture for DaeHun Nyang

DaeHun Nyang

Alert button

Untargeted Code Authorship Evasion with Seq2Seq Transformation

Add code
Bookmark button
Alert button
Nov 26, 2023
Soohyeon Choi, Rhongho Jang, DaeHun Nyang, David Mohaisen

Viaarxiv icon

SHIELD: Thwarting Code Authorship Attribution

Add code
Bookmark button
Alert button
Apr 26, 2023
Mohammed Abuhamad, Changhun Jung, David Mohaisen, DaeHun Nyang

Figure 1 for SHIELD: Thwarting Code Authorship Attribution
Figure 2 for SHIELD: Thwarting Code Authorship Attribution
Figure 3 for SHIELD: Thwarting Code Authorship Attribution
Figure 4 for SHIELD: Thwarting Code Authorship Attribution
Viaarxiv icon

Robust Natural Language Processing: Recent Advances, Challenges, and Future Directions

Add code
Bookmark button
Alert button
Jan 03, 2022
Marwan Omar, Soohyeon Choi, DaeHun Nyang, David Mohaisen

Figure 1 for Robust Natural Language Processing: Recent Advances, Challenges, and Future Directions
Figure 2 for Robust Natural Language Processing: Recent Advances, Challenges, and Future Directions
Figure 3 for Robust Natural Language Processing: Recent Advances, Challenges, and Future Directions
Figure 4 for Robust Natural Language Processing: Recent Advances, Challenges, and Future Directions
Viaarxiv icon

Generating Adversarial Examples with an Optimized Quality

Add code
Bookmark button
Alert button
Jun 30, 2020
Aminollah Khormali, DaeHun Nyang, David Mohaisen

Figure 1 for Generating Adversarial Examples with an Optimized Quality
Figure 2 for Generating Adversarial Examples with an Optimized Quality
Figure 3 for Generating Adversarial Examples with an Optimized Quality
Figure 4 for Generating Adversarial Examples with an Optimized Quality
Viaarxiv icon

Sensor-based Continuous Authentication of Smartphones' Users Using Behavioral Biometrics: A Survey

Add code
Bookmark button
Alert button
Jan 23, 2020
Mohammed Abuhamad, Ahmed Abusnaina, DaeHun Nyang, David Mohaisen

Figure 1 for Sensor-based Continuous Authentication of Smartphones' Users Using Behavioral Biometrics: A Survey
Figure 2 for Sensor-based Continuous Authentication of Smartphones' Users Using Behavioral Biometrics: A Survey
Figure 3 for Sensor-based Continuous Authentication of Smartphones' Users Using Behavioral Biometrics: A Survey
Figure 4 for Sensor-based Continuous Authentication of Smartphones' Users Using Behavioral Biometrics: A Survey
Viaarxiv icon

W-Net: A CNN-based Architecture for White Blood Cells Image Classification

Add code
Bookmark button
Alert button
Oct 02, 2019
Changhun Jung, Mohammed Abuhamad, Jumabek Alikhanov, Aziz Mohaisen, Kyungja Han, DaeHun Nyang

Figure 1 for W-Net: A CNN-based Architecture for White Blood Cells Image Classification
Figure 2 for W-Net: A CNN-based Architecture for White Blood Cells Image Classification
Figure 3 for W-Net: A CNN-based Architecture for White Blood Cells Image Classification
Figure 4 for W-Net: A CNN-based Architecture for White Blood Cells Image Classification
Viaarxiv icon

COPYCAT: Practical Adversarial Attacks on Visualization-Based Malware Detection

Add code
Bookmark button
Alert button
Sep 20, 2019
Aminollah Khormali, Ahmed Abusnaina, Songqing Chen, DaeHun Nyang, Aziz Mohaisen

Figure 1 for COPYCAT: Practical Adversarial Attacks on Visualization-Based Malware Detection
Figure 2 for COPYCAT: Practical Adversarial Attacks on Visualization-Based Malware Detection
Figure 3 for COPYCAT: Practical Adversarial Attacks on Visualization-Based Malware Detection
Figure 4 for COPYCAT: Practical Adversarial Attacks on Visualization-Based Malware Detection
Viaarxiv icon