Alert button
Picture for Mostafa M. Fouda

Mostafa M. Fouda

Alert button

G2NetPL: Generic Game-Theoretic Network for Partial-Label Image Classification

Add code
Bookmark button
Alert button
Oct 20, 2022
Rabab Abdelfattah, Xin Zhang, Mostafa M. Fouda, Xiaofeng Wang, Song Wang

Figure 1 for G2NetPL: Generic Game-Theoretic Network for Partial-Label Image Classification
Figure 2 for G2NetPL: Generic Game-Theoretic Network for Partial-Label Image Classification
Figure 3 for G2NetPL: Generic Game-Theoretic Network for Partial-Label Image Classification
Figure 4 for G2NetPL: Generic Game-Theoretic Network for Partial-Label Image Classification
Viaarxiv icon

Detection of False-Reading Attacks in the AMI Net-Metering System

Add code
Bookmark button
Alert button
Dec 02, 2020
Mahmoud M. Badr, Mohamed I. Ibrahem, Mohamed Mahmoud, Mostafa M. Fouda, Waleed Alasmary

Figure 1 for Detection of False-Reading Attacks in the AMI Net-Metering System
Figure 2 for Detection of False-Reading Attacks in the AMI Net-Metering System
Figure 3 for Detection of False-Reading Attacks in the AMI Net-Metering System
Figure 4 for Detection of False-Reading Attacks in the AMI Net-Metering System
Viaarxiv icon

AI Aided Noise Processing of Spintronic Based IoT Sensor for Magnetocardiography Application

Add code
Bookmark button
Alert button
Nov 08, 2019
Attayeb Mohsen, Muftah Al-Mahdawi, Mostafa M. Fouda, Mikihiko Oogane, Yasuo Ando, Zubair Md Fadlullah

Figure 1 for AI Aided Noise Processing of Spintronic Based IoT Sensor for Magnetocardiography Application
Figure 2 for AI Aided Noise Processing of Spintronic Based IoT Sensor for Magnetocardiography Application
Figure 3 for AI Aided Noise Processing of Spintronic Based IoT Sensor for Magnetocardiography Application
Figure 4 for AI Aided Noise Processing of Spintronic Based IoT Sensor for Magnetocardiography Application
Viaarxiv icon

Mimic Learning to Generate a Shareable Network Intrusion Detection Model

Add code
Bookmark button
Alert button
May 02, 2019
Ahmed Shafee, Mohamed Baza, Douglas A. Talbert, Mostafa M. Fouda, Mahmoud Nabil, Mohamed Mahmoud

Figure 1 for Mimic Learning to Generate a Shareable Network Intrusion Detection Model
Figure 2 for Mimic Learning to Generate a Shareable Network Intrusion Detection Model
Figure 3 for Mimic Learning to Generate a Shareable Network Intrusion Detection Model
Figure 4 for Mimic Learning to Generate a Shareable Network Intrusion Detection Model
Viaarxiv icon