Alert button
Picture for Mahmoud Nazzal

Mahmoud Nazzal

Alert button

Genetic Algorithm-Based Dynamic Backdoor Attack on Federated Learning-Based Network Traffic Classification

Add code
Bookmark button
Alert button
Sep 27, 2023
Mahmoud Nazzal, Nura Aljaafari, Ahmed Sawalmeh, Abdallah Khreishah, Muhammad Anan, Abdulelah Algosaibi, Mohammed Alnaeem, Adel Aldalbahi, Abdulaziz Alhumam, Conrado P. Vizcarra, Shadan Alhamed

Viaarxiv icon

Multi-Instance Adversarial Attack on GNN-Based Malicious Domain Detection

Add code
Bookmark button
Alert button
Aug 22, 2023
Mahmoud Nazzal, Issa Khalil, Abdallah Khreishah, NhatHai Phan, Yao Ma

Figure 1 for Multi-Instance Adversarial Attack on GNN-Based Malicious Domain Detection
Figure 2 for Multi-Instance Adversarial Attack on GNN-Based Malicious Domain Detection
Figure 3 for Multi-Instance Adversarial Attack on GNN-Based Malicious Domain Detection
Figure 4 for Multi-Instance Adversarial Attack on GNN-Based Malicious Domain Detection
Viaarxiv icon

Semi-decentralized Inference in Heterogeneous Graph Neural Networks for Traffic Demand Forecasting: An Edge-Computing Approach

Add code
Bookmark button
Alert button
Feb 28, 2023
Mahmoud Nazzal, Abdallah Khreishah, Joyoung Lee, Shaahin Angizi

Figure 1 for Semi-decentralized Inference in Heterogeneous Graph Neural Networks for Traffic Demand Forecasting: An Edge-Computing Approach
Figure 2 for Semi-decentralized Inference in Heterogeneous Graph Neural Networks for Traffic Demand Forecasting: An Edge-Computing Approach
Figure 3 for Semi-decentralized Inference in Heterogeneous Graph Neural Networks for Traffic Demand Forecasting: An Edge-Computing Approach
Figure 4 for Semi-decentralized Inference in Heterogeneous Graph Neural Networks for Traffic Demand Forecasting: An Edge-Computing Approach
Viaarxiv icon

Adversarial Attacks and Defenses for Social Network Text Processing Applications: Techniques, Challenges and Future Research Directions

Add code
Bookmark button
Alert button
Oct 26, 2021
Izzat Alsmadi, Kashif Ahmad, Mahmoud Nazzal, Firoj Alam, Ala Al-Fuqaha, Abdallah Khreishah, Abdulelah Algosaibi

Figure 1 for Adversarial Attacks and Defenses for Social Network Text Processing Applications: Techniques, Challenges and Future Research Directions
Figure 2 for Adversarial Attacks and Defenses for Social Network Text Processing Applications: Techniques, Challenges and Future Research Directions
Figure 3 for Adversarial Attacks and Defenses for Social Network Text Processing Applications: Techniques, Challenges and Future Research Directions
Figure 4 for Adversarial Attacks and Defenses for Social Network Text Processing Applications: Techniques, Challenges and Future Research Directions
Viaarxiv icon