Alert button
Picture for Mohammad Shojafar

Mohammad Shojafar

Alert button

Multi-Agent Context Learning Strategy for Interference-Aware Beam Allocation in mmWave Vehicular Communications

Add code
Bookmark button
Alert button
Jan 04, 2024
Abdulkadir Kose, Haeyoung Lee, Chuan Heng Foh, Mohammad Shojafar

Viaarxiv icon

SETTI: A Self-supervised Adversarial Malware Detection Architecture in an IoT Environment

Add code
Bookmark button
Alert button
Apr 16, 2022
Marjan Golmaryami, Rahim Taheri, Zahra Pooranian, Mohammad Shojafar, Pei Xiao

Figure 1 for SETTI: A Self-supervised Adversarial Malware Detection Architecture in an IoT Environment
Figure 2 for SETTI: A Self-supervised Adversarial Malware Detection Architecture in an IoT Environment
Figure 3 for SETTI: A Self-supervised Adversarial Malware Detection Architecture in an IoT Environment
Figure 4 for SETTI: A Self-supervised Adversarial Malware Detection Architecture in an IoT Environment
Viaarxiv icon

Deep Image: A precious image based deep learning method for online malware detection in IoT Environment

Add code
Bookmark button
Alert button
Apr 04, 2022
Meysam Ghahramani, Rahim Taheri, Mohammad Shojafar, Reza Javidan, Shaohua Wan

Figure 1 for Deep Image: A precious image based deep learning method for online malware detection in IoT Environment
Figure 2 for Deep Image: A precious image based deep learning method for online malware detection in IoT Environment
Figure 3 for Deep Image: A precious image based deep learning method for online malware detection in IoT Environment
Figure 4 for Deep Image: A precious image based deep learning method for online malware detection in IoT Environment
Viaarxiv icon

Similarity-based Android Malware Detection Using Hamming Distance of Static Binary Features

Add code
Bookmark button
Alert button
Aug 13, 2019
Rahim Taheri, Meysam Ghahramani, Reza Javidan, Mohammad Shojafar, Zahra Pooranian, Mauro Conti

Figure 1 for Similarity-based Android Malware Detection Using Hamming Distance of Static Binary Features
Figure 2 for Similarity-based Android Malware Detection Using Hamming Distance of Static Binary Features
Figure 3 for Similarity-based Android Malware Detection Using Hamming Distance of Static Binary Features
Figure 4 for Similarity-based Android Malware Detection Using Hamming Distance of Static Binary Features
Viaarxiv icon

On Defending Against Label Flipping Attacks on Malware Detection Systems

Add code
Bookmark button
Alert button
Aug 13, 2019
Rahim Taheri, Reza Javidan, Mohammad Shojafar, Zahra Pooranian, Ali Miri, Mauro Conti

Figure 1 for On Defending Against Label Flipping Attacks on Malware Detection Systems
Figure 2 for On Defending Against Label Flipping Attacks on Malware Detection Systems
Figure 3 for On Defending Against Label Flipping Attacks on Malware Detection Systems
Figure 4 for On Defending Against Label Flipping Attacks on Malware Detection Systems
Viaarxiv icon

Can Machine Learning Model with Static Features be Fooled: an Adversarial Machine Learning Approach

Add code
Bookmark button
Alert button
Apr 20, 2019
Rahim Taheri, Reza Javidan, Mohammad Shojafar, Vinod P, Mauro Conti

Figure 1 for Can Machine Learning Model with Static Features be Fooled: an Adversarial Machine Learning Approach
Figure 2 for Can Machine Learning Model with Static Features be Fooled: an Adversarial Machine Learning Approach
Figure 3 for Can Machine Learning Model with Static Features be Fooled: an Adversarial Machine Learning Approach
Figure 4 for Can Machine Learning Model with Static Features be Fooled: an Adversarial Machine Learning Approach
Viaarxiv icon

FeatureAnalytics: An approach to derive relevant attributes for analyzing Android Malware

Add code
Bookmark button
Alert button
Sep 17, 2018
Deepa K, Radhamani G, Vinod P, Mohammad Shojafar, Neeraj Kumar, Mauro Conti

Figure 1 for FeatureAnalytics: An approach to derive relevant attributes for analyzing Android Malware
Figure 2 for FeatureAnalytics: An approach to derive relevant attributes for analyzing Android Malware
Figure 3 for FeatureAnalytics: An approach to derive relevant attributes for analyzing Android Malware
Figure 4 for FeatureAnalytics: An approach to derive relevant attributes for analyzing Android Malware
Viaarxiv icon

Hybrid Genetic Algorithm for Cloud Computing Applications

Add code
Bookmark button
Alert button
Apr 22, 2014
Saeed Javanmardi, Mohammad Shojafar, Danilo Amendola, Nicola Cordeschi, Hongbo Liu, Ajith Abraham

Figure 1 for Hybrid Genetic Algorithm for Cloud Computing Applications
Figure 2 for Hybrid Genetic Algorithm for Cloud Computing Applications
Figure 3 for Hybrid Genetic Algorithm for Cloud Computing Applications
Figure 4 for Hybrid Genetic Algorithm for Cloud Computing Applications
Viaarxiv icon