Picture for Ehsan Nowroozi

Ehsan Nowroozi

Mitigating Label Flipping Attacks in Malicious URL Detectors Using Ensemble Trees

Add code
Mar 05, 2024
Figure 1 for Mitigating Label Flipping Attacks in Malicious URL Detectors Using Ensemble Trees
Figure 2 for Mitigating Label Flipping Attacks in Malicious URL Detectors Using Ensemble Trees
Figure 3 for Mitigating Label Flipping Attacks in Malicious URL Detectors Using Ensemble Trees
Figure 4 for Mitigating Label Flipping Attacks in Malicious URL Detectors Using Ensemble Trees
Viaarxiv icon

Federated Learning Under Attack: Exposing Vulnerabilities through Data Poisoning Attacks in Computer Networks

Add code
Mar 05, 2024
Figure 1 for Federated Learning Under Attack: Exposing Vulnerabilities through Data Poisoning Attacks in Computer Networks
Figure 2 for Federated Learning Under Attack: Exposing Vulnerabilities through Data Poisoning Attacks in Computer Networks
Figure 3 for Federated Learning Under Attack: Exposing Vulnerabilities through Data Poisoning Attacks in Computer Networks
Figure 4 for Federated Learning Under Attack: Exposing Vulnerabilities through Data Poisoning Attacks in Computer Networks
Viaarxiv icon

Unscrambling the Rectification of Adversarial Attacks Transferability across Computer Networks

Add code
Oct 26, 2023
Viaarxiv icon

Spritz-PS: Validation of Synthetic Face Images Using a Large Dataset of Printed Documents

Add code
Apr 06, 2023
Figure 1 for Spritz-PS: Validation of Synthetic Face Images Using a Large Dataset of Printed Documents
Figure 2 for Spritz-PS: Validation of Synthetic Face Images Using a Large Dataset of Printed Documents
Figure 3 for Spritz-PS: Validation of Synthetic Face Images Using a Large Dataset of Printed Documents
Figure 4 for Spritz-PS: Validation of Synthetic Face Images Using a Large Dataset of Printed Documents
Viaarxiv icon

SPRITZ-1.5C: Employing Deep Ensemble Learning for Improving the Security of Computer Networks against Adversarial Attacks

Add code
Sep 25, 2022
Figure 1 for SPRITZ-1.5C: Employing Deep Ensemble Learning for Improving the Security of Computer Networks against Adversarial Attacks
Figure 2 for SPRITZ-1.5C: Employing Deep Ensemble Learning for Improving the Security of Computer Networks against Adversarial Attacks
Figure 3 for SPRITZ-1.5C: Employing Deep Ensemble Learning for Improving the Security of Computer Networks against Adversarial Attacks
Figure 4 for SPRITZ-1.5C: Employing Deep Ensemble Learning for Improving the Security of Computer Networks against Adversarial Attacks
Viaarxiv icon

Resisting Deep Learning Models Against Adversarial Attack Transferability via Feature Randomization

Add code
Sep 11, 2022
Figure 1 for Resisting Deep Learning Models Against Adversarial Attack Transferability via Feature Randomization
Figure 2 for Resisting Deep Learning Models Against Adversarial Attack Transferability via Feature Randomization
Figure 3 for Resisting Deep Learning Models Against Adversarial Attack Transferability via Feature Randomization
Figure 4 for Resisting Deep Learning Models Against Adversarial Attack Transferability via Feature Randomization
Viaarxiv icon

An Adversarial Attack Analysis on Malicious Advertisement URL Detection Framework

Add code
Apr 27, 2022
Figure 1 for An Adversarial Attack Analysis on Malicious Advertisement URL Detection Framework
Figure 2 for An Adversarial Attack Analysis on Malicious Advertisement URL Detection Framework
Figure 3 for An Adversarial Attack Analysis on Malicious Advertisement URL Detection Framework
Figure 4 for An Adversarial Attack Analysis on Malicious Advertisement URL Detection Framework
Viaarxiv icon

Real or Virtual: A Video Conferencing Background Manipulation-Detection System

Add code
Apr 25, 2022
Figure 1 for Real or Virtual: A Video Conferencing Background Manipulation-Detection System
Figure 2 for Real or Virtual: A Video Conferencing Background Manipulation-Detection System
Figure 3 for Real or Virtual: A Video Conferencing Background Manipulation-Detection System
Figure 4 for Real or Virtual: A Video Conferencing Background Manipulation-Detection System
Viaarxiv icon

Detecting High-Quality GAN-Generated Face Images using Neural Networks

Add code
Mar 03, 2022
Figure 1 for Detecting High-Quality GAN-Generated Face Images using Neural Networks
Figure 2 for Detecting High-Quality GAN-Generated Face Images using Neural Networks
Figure 3 for Detecting High-Quality GAN-Generated Face Images using Neural Networks
Figure 4 for Detecting High-Quality GAN-Generated Face Images using Neural Networks
Viaarxiv icon

Demystifying the Transferability of Adversarial Attacks in Computer Networks

Add code
Oct 09, 2021
Figure 1 for Demystifying the Transferability of Adversarial Attacks in Computer Networks
Figure 2 for Demystifying the Transferability of Adversarial Attacks in Computer Networks
Figure 3 for Demystifying the Transferability of Adversarial Attacks in Computer Networks
Figure 4 for Demystifying the Transferability of Adversarial Attacks in Computer Networks
Viaarxiv icon