Alert button
Picture for Mahmoud Nabil

Mahmoud Nabil

Alert button

Negative Selection Approach to support Formal Verification and Validation of BlackBox Models' Input Constraints

Add code
Bookmark button
Alert button
Sep 03, 2022
Abdul-Rauf Nuhu, Kishor Datta Gupta, Wendwosen Bellete Bedada, Mahmoud Nabil, Lydia Asrat Zeleke, Abdollah Homaifar, Edward Tunstel

Figure 1 for Negative Selection Approach to support Formal Verification and Validation of BlackBox Models' Input Constraints
Figure 2 for Negative Selection Approach to support Formal Verification and Validation of BlackBox Models' Input Constraints
Figure 3 for Negative Selection Approach to support Formal Verification and Validation of BlackBox Models' Input Constraints
Figure 4 for Negative Selection Approach to support Formal Verification and Validation of BlackBox Models' Input Constraints
Viaarxiv icon

Enabling Content-Centric Device-to-Device Communication in the Millimeter-Wave Band

Add code
Bookmark button
Alert button
Apr 12, 2021
Niloofar Bahadori, Mahmoud Nabil, Brian Kelley, Abdollah Homaifar

Figure 1 for Enabling Content-Centric Device-to-Device Communication in the Millimeter-Wave Band
Figure 2 for Enabling Content-Centric Device-to-Device Communication in the Millimeter-Wave Band
Figure 3 for Enabling Content-Centric Device-to-Device Communication in the Millimeter-Wave Band
Figure 4 for Enabling Content-Centric Device-to-Device Communication in the Millimeter-Wave Band
Viaarxiv icon

Mimic Learning to Generate a Shareable Network Intrusion Detection Model

Add code
Bookmark button
Alert button
May 02, 2019
Ahmed Shafee, Mohamed Baza, Douglas A. Talbert, Mostafa M. Fouda, Mahmoud Nabil, Mohamed Mahmoud

Figure 1 for Mimic Learning to Generate a Shareable Network Intrusion Detection Model
Figure 2 for Mimic Learning to Generate a Shareable Network Intrusion Detection Model
Figure 3 for Mimic Learning to Generate a Shareable Network Intrusion Detection Model
Figure 4 for Mimic Learning to Generate a Shareable Network Intrusion Detection Model
Viaarxiv icon

Deep Recurrent Electricity Theft Detection in AMI Networks with Random Tuning of Hyper-parameters

Add code
Bookmark button
Alert button
Sep 06, 2018
Mahmoud Nabil, Muhammad Ismail, Mohamed Mahmoud, Mostafa Shahin, Khalid Qaraqe, Erchin Serpedin

Figure 1 for Deep Recurrent Electricity Theft Detection in AMI Networks with Random Tuning of Hyper-parameters
Figure 2 for Deep Recurrent Electricity Theft Detection in AMI Networks with Random Tuning of Hyper-parameters
Figure 3 for Deep Recurrent Electricity Theft Detection in AMI Networks with Random Tuning of Hyper-parameters
Figure 4 for Deep Recurrent Electricity Theft Detection in AMI Networks with Random Tuning of Hyper-parameters
Viaarxiv icon

Random Projection and Its Applications

Add code
Bookmark button
Alert button
Oct 09, 2017
Mahmoud Nabil

Figure 1 for Random Projection and Its Applications
Figure 2 for Random Projection and Its Applications
Figure 3 for Random Projection and Its Applications
Viaarxiv icon

LABR: A Large Scale Arabic Sentiment Analysis Benchmark

Add code
Bookmark button
Alert button
May 03, 2015
Mahmoud Nabil, Mohamed Aly, Amir Atiya

Figure 1 for LABR: A Large Scale Arabic Sentiment Analysis Benchmark
Figure 2 for LABR: A Large Scale Arabic Sentiment Analysis Benchmark
Figure 3 for LABR: A Large Scale Arabic Sentiment Analysis Benchmark
Figure 4 for LABR: A Large Scale Arabic Sentiment Analysis Benchmark
Viaarxiv icon