Alert button
Picture for Ehsan Nowroozi

Ehsan Nowroozi

Alert button

Mitigating Label Flipping Attacks in Malicious URL Detectors Using Ensemble Trees

Add code
Bookmark button
Alert button
Mar 05, 2024
Ehsan Nowroozi, Nada Jadalla, Samaneh Ghelichkhani, Alireza Jolfaei

Figure 1 for Mitigating Label Flipping Attacks in Malicious URL Detectors Using Ensemble Trees
Figure 2 for Mitigating Label Flipping Attacks in Malicious URL Detectors Using Ensemble Trees
Figure 3 for Mitigating Label Flipping Attacks in Malicious URL Detectors Using Ensemble Trees
Figure 4 for Mitigating Label Flipping Attacks in Malicious URL Detectors Using Ensemble Trees
Viaarxiv icon

Federated Learning Under Attack: Exposing Vulnerabilities through Data Poisoning Attacks in Computer Networks

Add code
Bookmark button
Alert button
Mar 05, 2024
Ehsan Nowroozi, Imran Haider, Rahim Taheri, Mauro Conti

Figure 1 for Federated Learning Under Attack: Exposing Vulnerabilities through Data Poisoning Attacks in Computer Networks
Figure 2 for Federated Learning Under Attack: Exposing Vulnerabilities through Data Poisoning Attacks in Computer Networks
Figure 3 for Federated Learning Under Attack: Exposing Vulnerabilities through Data Poisoning Attacks in Computer Networks
Figure 4 for Federated Learning Under Attack: Exposing Vulnerabilities through Data Poisoning Attacks in Computer Networks
Viaarxiv icon

Unscrambling the Rectification of Adversarial Attacks Transferability across Computer Networks

Add code
Bookmark button
Alert button
Oct 26, 2023
Ehsan Nowroozi, Samaneh Ghelichkhani, Imran Haider, Ali Dehghantanha

Viaarxiv icon

Spritz-PS: Validation of Synthetic Face Images Using a Large Dataset of Printed Documents

Add code
Bookmark button
Alert button
Apr 06, 2023
Ehsan Nowroozi, Yoosef Habibi, Mauro Conti

Figure 1 for Spritz-PS: Validation of Synthetic Face Images Using a Large Dataset of Printed Documents
Figure 2 for Spritz-PS: Validation of Synthetic Face Images Using a Large Dataset of Printed Documents
Figure 3 for Spritz-PS: Validation of Synthetic Face Images Using a Large Dataset of Printed Documents
Figure 4 for Spritz-PS: Validation of Synthetic Face Images Using a Large Dataset of Printed Documents
Viaarxiv icon

SPRITZ-1.5C: Employing Deep Ensemble Learning for Improving the Security of Computer Networks against Adversarial Attacks

Add code
Bookmark button
Alert button
Sep 25, 2022
Ehsan Nowroozi, Mohammadreza Mohammadi, Erkay Savas, Mauro Conti, Yassine Mekdad

Figure 1 for SPRITZ-1.5C: Employing Deep Ensemble Learning for Improving the Security of Computer Networks against Adversarial Attacks
Figure 2 for SPRITZ-1.5C: Employing Deep Ensemble Learning for Improving the Security of Computer Networks against Adversarial Attacks
Figure 3 for SPRITZ-1.5C: Employing Deep Ensemble Learning for Improving the Security of Computer Networks against Adversarial Attacks
Figure 4 for SPRITZ-1.5C: Employing Deep Ensemble Learning for Improving the Security of Computer Networks against Adversarial Attacks
Viaarxiv icon

Resisting Deep Learning Models Against Adversarial Attack Transferability via Feature Randomization

Add code
Bookmark button
Alert button
Sep 11, 2022
Ehsan Nowroozi, Mohammadreza Mohammadi, Pargol Golmohammadi, Yassine Mekdad, Mauro Conti, Selcuk Uluagac

Figure 1 for Resisting Deep Learning Models Against Adversarial Attack Transferability via Feature Randomization
Figure 2 for Resisting Deep Learning Models Against Adversarial Attack Transferability via Feature Randomization
Figure 3 for Resisting Deep Learning Models Against Adversarial Attack Transferability via Feature Randomization
Figure 4 for Resisting Deep Learning Models Against Adversarial Attack Transferability via Feature Randomization
Viaarxiv icon

An Adversarial Attack Analysis on Malicious Advertisement URL Detection Framework

Add code
Bookmark button
Alert button
Apr 27, 2022
Ehsan Nowroozi, Abhishek, Mohammadreza Mohammadi, Mauro Conti

Figure 1 for An Adversarial Attack Analysis on Malicious Advertisement URL Detection Framework
Figure 2 for An Adversarial Attack Analysis on Malicious Advertisement URL Detection Framework
Figure 3 for An Adversarial Attack Analysis on Malicious Advertisement URL Detection Framework
Figure 4 for An Adversarial Attack Analysis on Malicious Advertisement URL Detection Framework
Viaarxiv icon

Real or Virtual: A Video Conferencing Background Manipulation-Detection System

Add code
Bookmark button
Alert button
Apr 25, 2022
Ehsan Nowroozi, Yassine Mekdad, Mauro Conti, Simone Milani, Selcuk Uluagac, Berrin Yanikoglu

Figure 1 for Real or Virtual: A Video Conferencing Background Manipulation-Detection System
Figure 2 for Real or Virtual: A Video Conferencing Background Manipulation-Detection System
Figure 3 for Real or Virtual: A Video Conferencing Background Manipulation-Detection System
Figure 4 for Real or Virtual: A Video Conferencing Background Manipulation-Detection System
Viaarxiv icon

Detecting High-Quality GAN-Generated Face Images using Neural Networks

Add code
Bookmark button
Alert button
Mar 03, 2022
Ehsan Nowroozi, Mauro Conti, Yassine Mekdad

Figure 1 for Detecting High-Quality GAN-Generated Face Images using Neural Networks
Figure 2 for Detecting High-Quality GAN-Generated Face Images using Neural Networks
Figure 3 for Detecting High-Quality GAN-Generated Face Images using Neural Networks
Figure 4 for Detecting High-Quality GAN-Generated Face Images using Neural Networks
Viaarxiv icon

Demystifying the Transferability of Adversarial Attacks in Computer Networks

Add code
Bookmark button
Alert button
Oct 09, 2021
Ehsan Nowroozi, Mauro Conti, Yassine Mekdad, Mohammad Hajian Berenjestanaki, Abdeslam EL Fergougui

Figure 1 for Demystifying the Transferability of Adversarial Attacks in Computer Networks
Figure 2 for Demystifying the Transferability of Adversarial Attacks in Computer Networks
Figure 3 for Demystifying the Transferability of Adversarial Attacks in Computer Networks
Figure 4 for Demystifying the Transferability of Adversarial Attacks in Computer Networks
Viaarxiv icon