Alert button
Picture for Izzat Alsmadi

Izzat Alsmadi

Alert button

Mutation-Based Adversarial Attacks on Neural Text Detectors

Add code
Bookmark button
Alert button
Feb 11, 2023
Gongbo Liang, Jesus Guerrero, Izzat Alsmadi

Figure 1 for Mutation-Based Adversarial Attacks on Neural Text Detectors
Figure 2 for Mutation-Based Adversarial Attacks on Neural Text Detectors
Figure 3 for Mutation-Based Adversarial Attacks on Neural Text Detectors
Viaarxiv icon

A Mutation-based Text Generation for Adversarial Machine Learning Applications

Add code
Bookmark button
Alert button
Dec 21, 2022
Jesus Guerrero, Gongbo Liang, Izzat Alsmadi

Figure 1 for A Mutation-based Text Generation for Adversarial Machine Learning Applications
Figure 2 for A Mutation-based Text Generation for Adversarial Machine Learning Applications
Figure 3 for A Mutation-based Text Generation for Adversarial Machine Learning Applications
Figure 4 for A Mutation-based Text Generation for Adversarial Machine Learning Applications
Viaarxiv icon

Synthetic Text Detection: Systemic Literature Review

Add code
Bookmark button
Alert button
Oct 01, 2022
Jesus Guerrero, Izzat Alsmadi

Figure 1 for Synthetic Text Detection: Systemic Literature Review
Figure 2 for Synthetic Text Detection: Systemic Literature Review
Figure 3 for Synthetic Text Detection: Systemic Literature Review
Viaarxiv icon

Benchmark Assessment for DeepSpeed Optimization Library

Add code
Bookmark button
Alert button
Feb 12, 2022
Gongbo Liang, Izzat Alsmadi

Figure 1 for Benchmark Assessment for DeepSpeed Optimization Library
Figure 2 for Benchmark Assessment for DeepSpeed Optimization Library
Viaarxiv icon

Adversarial Attacks and Defenses for Social Network Text Processing Applications: Techniques, Challenges and Future Research Directions

Add code
Bookmark button
Alert button
Oct 26, 2021
Izzat Alsmadi, Kashif Ahmad, Mahmoud Nazzal, Firoj Alam, Ala Al-Fuqaha, Abdallah Khreishah, Abdulelah Algosaibi

Figure 1 for Adversarial Attacks and Defenses for Social Network Text Processing Applications: Techniques, Challenges and Future Research Directions
Figure 2 for Adversarial Attacks and Defenses for Social Network Text Processing Applications: Techniques, Challenges and Future Research Directions
Figure 3 for Adversarial Attacks and Defenses for Social Network Text Processing Applications: Techniques, Challenges and Future Research Directions
Figure 4 for Adversarial Attacks and Defenses for Social Network Text Processing Applications: Techniques, Challenges and Future Research Directions
Viaarxiv icon

Adversarial Machine Learning in Text Analysis and Generation

Add code
Bookmark button
Alert button
Jan 14, 2021
Izzat Alsmadi

Viaarxiv icon