Alert button
Picture for Mahathir Almashor

Mahathir Almashor

Alert button

Blockchain-based Federated Learning with Secure Aggregation in Trusted Execution Environment for Internet-of-Things

Add code
Bookmark button
Alert button
Apr 25, 2023
Aditya Pribadi Kalapaaking, Ibrahim Khalil, Mohammad Saidur Rahman, Mohammed Atiquzzaman, Xun Yi, Mahathir Almashor

Figure 1 for Blockchain-based Federated Learning with Secure Aggregation in Trusted Execution Environment for Internet-of-Things
Figure 2 for Blockchain-based Federated Learning with Secure Aggregation in Trusted Execution Environment for Internet-of-Things
Figure 3 for Blockchain-based Federated Learning with Secure Aggregation in Trusted Execution Environment for Internet-of-Things
Figure 4 for Blockchain-based Federated Learning with Secure Aggregation in Trusted Execution Environment for Internet-of-Things
Viaarxiv icon

PhishClone: Measuring the Efficacy of Cloning Evasion Attacks

Add code
Bookmark button
Alert button
Sep 04, 2022
Arthur Wong, Alsharif Abuadbba, Mahathir Almashor, Salil Kanhere

Figure 1 for PhishClone: Measuring the Efficacy of Cloning Evasion Attacks
Figure 2 for PhishClone: Measuring the Efficacy of Cloning Evasion Attacks
Figure 3 for PhishClone: Measuring the Efficacy of Cloning Evasion Attacks
Figure 4 for PhishClone: Measuring the Efficacy of Cloning Evasion Attacks
Viaarxiv icon

Towards Web Phishing Detection Limitations and Mitigation

Add code
Bookmark button
Alert button
Apr 03, 2022
Alsharif Abuadbba, Shuo Wang, Mahathir Almashor, Muhammed Ejaz Ahmed, Raj Gaire, Seyit Camtepe, Surya Nepal

Figure 1 for Towards Web Phishing Detection Limitations and Mitigation
Figure 2 for Towards Web Phishing Detection Limitations and Mitigation
Figure 3 for Towards Web Phishing Detection Limitations and Mitigation
Figure 4 for Towards Web Phishing Detection Limitations and Mitigation
Viaarxiv icon

Resurrecting Trust in Facial Recognition: Mitigating Backdoor Attacks in Face Recognition to Prevent Potential Privacy Breaches

Add code
Bookmark button
Alert button
Feb 18, 2022
Reena Zelenkova, Jack Swallow, M. A. P. Chamikara, Dongxi Liu, Mohan Baruwal Chhetri, Seyit Camtepe, Marthie Grobler, Mahathir Almashor

Figure 1 for Resurrecting Trust in Facial Recognition: Mitigating Backdoor Attacks in Face Recognition to Prevent Potential Privacy Breaches
Figure 2 for Resurrecting Trust in Facial Recognition: Mitigating Backdoor Attacks in Face Recognition to Prevent Potential Privacy Breaches
Figure 3 for Resurrecting Trust in Facial Recognition: Mitigating Backdoor Attacks in Face Recognition to Prevent Potential Privacy Breaches
Figure 4 for Resurrecting Trust in Facial Recognition: Mitigating Backdoor Attacks in Face Recognition to Prevent Potential Privacy Breaches
Viaarxiv icon

Characterizing Malicious URL Campaigns

Add code
Bookmark button
Alert button
Aug 29, 2021
Mahathir Almashor, Ejaz Ahmed, Benjamin Pick, Sharif Abuadbba, Raj Gaire, Seyit Camtepe, Surya Nepal

Figure 1 for Characterizing Malicious URL Campaigns
Figure 2 for Characterizing Malicious URL Campaigns
Figure 3 for Characterizing Malicious URL Campaigns
Figure 4 for Characterizing Malicious URL Campaigns
Viaarxiv icon

FedEmail: Performance Measurement of Privacy-friendly Phishing Detection Enabled by Federated Learning

Add code
Bookmark button
Alert button
Jul 27, 2020
Chandra Thapa, Jun Wen Tang, Sharif Abuadbba, Yansong Gao, Yifeng Zheng, Seyit A. Camtepe, Surya Nepal, Mahathir Almashor

Figure 1 for FedEmail: Performance Measurement of Privacy-friendly Phishing Detection Enabled by Federated Learning
Figure 2 for FedEmail: Performance Measurement of Privacy-friendly Phishing Detection Enabled by Federated Learning
Figure 3 for FedEmail: Performance Measurement of Privacy-friendly Phishing Detection Enabled by Federated Learning
Figure 4 for FedEmail: Performance Measurement of Privacy-friendly Phishing Detection Enabled by Federated Learning
Viaarxiv icon