Alert button
Picture for Mohammed Abuhamad

Mohammed Abuhamad

Alert button

Unveiling Vulnerabilities in Interpretable Deep Learning Systems with Query-Efficient Black-box Attacks

Jul 21, 2023
Eldor Abdukhamidov, Mohammed Abuhamad, Simon S. Woo, Eric Chan-Tin, Tamer Abuhmed

Figure 1 for Unveiling Vulnerabilities in Interpretable Deep Learning Systems with Query-Efficient Black-box Attacks
Figure 2 for Unveiling Vulnerabilities in Interpretable Deep Learning Systems with Query-Efficient Black-box Attacks
Figure 3 for Unveiling Vulnerabilities in Interpretable Deep Learning Systems with Query-Efficient Black-box Attacks
Viaarxiv icon

Microbial Genetic Algorithm-based Black-box Attack against Interpretable Deep Learning Systems

Jul 13, 2023
Eldor Abdukhamidov, Mohammed Abuhamad, Simon S. Woo, Eric Chan-Tin, Tamer Abuhmed

Figure 1 for Microbial Genetic Algorithm-based Black-box Attack against Interpretable Deep Learning Systems
Figure 2 for Microbial Genetic Algorithm-based Black-box Attack against Interpretable Deep Learning Systems
Figure 3 for Microbial Genetic Algorithm-based Black-box Attack against Interpretable Deep Learning Systems
Figure 4 for Microbial Genetic Algorithm-based Black-box Attack against Interpretable Deep Learning Systems
Viaarxiv icon

Single-Class Target-Specific Attack against Interpretable Deep Learning Systems

Jul 12, 2023
Eldor Abdukhamidov, Mohammed Abuhamad, George K. Thiruvathukal, Hyoungshick Kim, Tamer Abuhmed

Figure 1 for Single-Class Target-Specific Attack against Interpretable Deep Learning Systems
Figure 2 for Single-Class Target-Specific Attack against Interpretable Deep Learning Systems
Figure 3 for Single-Class Target-Specific Attack against Interpretable Deep Learning Systems
Figure 4 for Single-Class Target-Specific Attack against Interpretable Deep Learning Systems
Viaarxiv icon

SHIELD: Thwarting Code Authorship Attribution

Apr 26, 2023
Mohammed Abuhamad, Changhun Jung, David Mohaisen, DaeHun Nyang

Figure 1 for SHIELD: Thwarting Code Authorship Attribution
Figure 2 for SHIELD: Thwarting Code Authorship Attribution
Figure 3 for SHIELD: Thwarting Code Authorship Attribution
Figure 4 for SHIELD: Thwarting Code Authorship Attribution
Viaarxiv icon

Interpretations Cannot Be Trusted: Stealthy and Effective Adversarial Perturbations against Interpretable Deep Learning

Nov 29, 2022
Eldor Abdukhamidov, Mohammed Abuhamad, Simon S. Woo, Eric Chan-Tin, Tamer Abuhmed

Figure 1 for Interpretations Cannot Be Trusted: Stealthy and Effective Adversarial Perturbations against Interpretable Deep Learning
Figure 2 for Interpretations Cannot Be Trusted: Stealthy and Effective Adversarial Perturbations against Interpretable Deep Learning
Figure 3 for Interpretations Cannot Be Trusted: Stealthy and Effective Adversarial Perturbations against Interpretable Deep Learning
Figure 4 for Interpretations Cannot Be Trusted: Stealthy and Effective Adversarial Perturbations against Interpretable Deep Learning
Viaarxiv icon

Hate, Obscenity, and Insults: Measuring the Exposure of Children to Inappropriate Comments in YouTube

Mar 03, 2021
Sultan Alshamrani, Ahmed Abusnaina, Mohammed Abuhamad, Daehun Nyang, David Mohaisen

Figure 1 for Hate, Obscenity, and Insults: Measuring the Exposure of Children to Inappropriate Comments in YouTube
Figure 2 for Hate, Obscenity, and Insults: Measuring the Exposure of Children to Inappropriate Comments in YouTube
Figure 3 for Hate, Obscenity, and Insults: Measuring the Exposure of Children to Inappropriate Comments in YouTube
Figure 4 for Hate, Obscenity, and Insults: Measuring the Exposure of Children to Inappropriate Comments in YouTube
Viaarxiv icon

Sensor-based Continuous Authentication of Smartphones' Users Using Behavioral Biometrics: A Survey

Jan 23, 2020
Mohammed Abuhamad, Ahmed Abusnaina, DaeHun Nyang, David Mohaisen

Figure 1 for Sensor-based Continuous Authentication of Smartphones' Users Using Behavioral Biometrics: A Survey
Figure 2 for Sensor-based Continuous Authentication of Smartphones' Users Using Behavioral Biometrics: A Survey
Figure 3 for Sensor-based Continuous Authentication of Smartphones' Users Using Behavioral Biometrics: A Survey
Figure 4 for Sensor-based Continuous Authentication of Smartphones' Users Using Behavioral Biometrics: A Survey
Viaarxiv icon

W-Net: A CNN-based Architecture for White Blood Cells Image Classification

Oct 02, 2019
Changhun Jung, Mohammed Abuhamad, Jumabek Alikhanov, Aziz Mohaisen, Kyungja Han, DaeHun Nyang

Figure 1 for W-Net: A CNN-based Architecture for White Blood Cells Image Classification
Figure 2 for W-Net: A CNN-based Architecture for White Blood Cells Image Classification
Figure 3 for W-Net: A CNN-based Architecture for White Blood Cells Image Classification
Figure 4 for W-Net: A CNN-based Architecture for White Blood Cells Image Classification
Viaarxiv icon