Alert button
Picture for Rahim Taheri

Rahim Taheri

Alert button

Federated Learning Under Attack: Exposing Vulnerabilities through Data Poisoning Attacks in Computer Networks

Add code
Bookmark button
Alert button
Mar 05, 2024
Ehsan Nowroozi, Imran Haider, Rahim Taheri, Mauro Conti

Figure 1 for Federated Learning Under Attack: Exposing Vulnerabilities through Data Poisoning Attacks in Computer Networks
Figure 2 for Federated Learning Under Attack: Exposing Vulnerabilities through Data Poisoning Attacks in Computer Networks
Figure 3 for Federated Learning Under Attack: Exposing Vulnerabilities through Data Poisoning Attacks in Computer Networks
Figure 4 for Federated Learning Under Attack: Exposing Vulnerabilities through Data Poisoning Attacks in Computer Networks
Viaarxiv icon

UNBUS: Uncertainty-aware Deep Botnet Detection System in Presence of Perturbed Samples

Add code
Bookmark button
Alert button
Apr 28, 2022
Rahim Taheri

Figure 1 for UNBUS: Uncertainty-aware Deep Botnet Detection System in Presence of Perturbed Samples
Figure 2 for UNBUS: Uncertainty-aware Deep Botnet Detection System in Presence of Perturbed Samples
Figure 3 for UNBUS: Uncertainty-aware Deep Botnet Detection System in Presence of Perturbed Samples
Figure 4 for UNBUS: Uncertainty-aware Deep Botnet Detection System in Presence of Perturbed Samples
Viaarxiv icon

SETTI: A Self-supervised Adversarial Malware Detection Architecture in an IoT Environment

Add code
Bookmark button
Alert button
Apr 16, 2022
Marjan Golmaryami, Rahim Taheri, Zahra Pooranian, Mohammad Shojafar, Pei Xiao

Figure 1 for SETTI: A Self-supervised Adversarial Malware Detection Architecture in an IoT Environment
Figure 2 for SETTI: A Self-supervised Adversarial Malware Detection Architecture in an IoT Environment
Figure 3 for SETTI: A Self-supervised Adversarial Malware Detection Architecture in an IoT Environment
Figure 4 for SETTI: A Self-supervised Adversarial Malware Detection Architecture in an IoT Environment
Viaarxiv icon

Deep Image: A precious image based deep learning method for online malware detection in IoT Environment

Add code
Bookmark button
Alert button
Apr 04, 2022
Meysam Ghahramani, Rahim Taheri, Mohammad Shojafar, Reza Javidan, Shaohua Wan

Figure 1 for Deep Image: A precious image based deep learning method for online malware detection in IoT Environment
Figure 2 for Deep Image: A precious image based deep learning method for online malware detection in IoT Environment
Figure 3 for Deep Image: A precious image based deep learning method for online malware detection in IoT Environment
Figure 4 for Deep Image: A precious image based deep learning method for online malware detection in IoT Environment
Viaarxiv icon

Similarity-based Android Malware Detection Using Hamming Distance of Static Binary Features

Add code
Bookmark button
Alert button
Aug 13, 2019
Rahim Taheri, Meysam Ghahramani, Reza Javidan, Mohammad Shojafar, Zahra Pooranian, Mauro Conti

Figure 1 for Similarity-based Android Malware Detection Using Hamming Distance of Static Binary Features
Figure 2 for Similarity-based Android Malware Detection Using Hamming Distance of Static Binary Features
Figure 3 for Similarity-based Android Malware Detection Using Hamming Distance of Static Binary Features
Figure 4 for Similarity-based Android Malware Detection Using Hamming Distance of Static Binary Features
Viaarxiv icon

On Defending Against Label Flipping Attacks on Malware Detection Systems

Add code
Bookmark button
Alert button
Aug 13, 2019
Rahim Taheri, Reza Javidan, Mohammad Shojafar, Zahra Pooranian, Ali Miri, Mauro Conti

Figure 1 for On Defending Against Label Flipping Attacks on Malware Detection Systems
Figure 2 for On Defending Against Label Flipping Attacks on Malware Detection Systems
Figure 3 for On Defending Against Label Flipping Attacks on Malware Detection Systems
Figure 4 for On Defending Against Label Flipping Attacks on Malware Detection Systems
Viaarxiv icon

Can Machine Learning Model with Static Features be Fooled: an Adversarial Machine Learning Approach

Add code
Bookmark button
Alert button
Apr 20, 2019
Rahim Taheri, Reza Javidan, Mohammad Shojafar, Vinod P, Mauro Conti

Figure 1 for Can Machine Learning Model with Static Features be Fooled: an Adversarial Machine Learning Approach
Figure 2 for Can Machine Learning Model with Static Features be Fooled: an Adversarial Machine Learning Approach
Figure 3 for Can Machine Learning Model with Static Features be Fooled: an Adversarial Machine Learning Approach
Figure 4 for Can Machine Learning Model with Static Features be Fooled: an Adversarial Machine Learning Approach
Viaarxiv icon