Picture for Salah Ghamizi

Salah Ghamizi

Can Large Language Models Reason and Optimize Under Constraints?

Add code
Mar 24, 2026
Viaarxiv icon

Physics-Aware Heterogeneous GNN Architecture for Real-Time BESS Optimization in Unbalanced Distribution Systems

Add code
Dec 10, 2025
Viaarxiv icon

Insights on Adversarial Attacks for Tabular Machine Learning via a Systematic Literature Review

Add code
Jun 18, 2025
Figure 1 for Insights on Adversarial Attacks for Tabular Machine Learning via a Systematic Literature Review
Figure 2 for Insights on Adversarial Attacks for Tabular Machine Learning via a Systematic Literature Review
Figure 3 for Insights on Adversarial Attacks for Tabular Machine Learning via a Systematic Literature Review
Figure 4 for Insights on Adversarial Attacks for Tabular Machine Learning via a Systematic Literature Review
Viaarxiv icon

Brain Imaging Foundation Models, Are We There Yet? A Systematic Review of Foundation Models for Brain Imaging and Biomedical Research

Add code
Jun 16, 2025
Viaarxiv icon

SafePowerGraph-LLM: Novel Power Grid Graph Embedding and Optimization with Large Language Models

Add code
Jan 13, 2025
Figure 1 for SafePowerGraph-LLM: Novel Power Grid Graph Embedding and Optimization with Large Language Models
Figure 2 for SafePowerGraph-LLM: Novel Power Grid Graph Embedding and Optimization with Large Language Models
Figure 3 for SafePowerGraph-LLM: Novel Power Grid Graph Embedding and Optimization with Large Language Models
Figure 4 for SafePowerGraph-LLM: Novel Power Grid Graph Embedding and Optimization with Large Language Models
Viaarxiv icon

RobustBlack: Challenging Black-Box Adversarial Attacks on State-of-the-Art Defenses

Add code
Dec 30, 2024
Figure 1 for RobustBlack: Challenging Black-Box Adversarial Attacks on State-of-the-Art Defenses
Figure 2 for RobustBlack: Challenging Black-Box Adversarial Attacks on State-of-the-Art Defenses
Figure 3 for RobustBlack: Challenging Black-Box Adversarial Attacks on State-of-the-Art Defenses
Figure 4 for RobustBlack: Challenging Black-Box Adversarial Attacks on State-of-the-Art Defenses
Viaarxiv icon

TabularBench: Benchmarking Adversarial Robustness for Tabular Deep Learning in Real-world Use-cases

Add code
Aug 14, 2024
Figure 1 for TabularBench: Benchmarking Adversarial Robustness for Tabular Deep Learning in Real-world Use-cases
Figure 2 for TabularBench: Benchmarking Adversarial Robustness for Tabular Deep Learning in Real-world Use-cases
Figure 3 for TabularBench: Benchmarking Adversarial Robustness for Tabular Deep Learning in Real-world Use-cases
Figure 4 for TabularBench: Benchmarking Adversarial Robustness for Tabular Deep Learning in Real-world Use-cases
Viaarxiv icon

SafePowerGraph: Safety-aware Evaluation of Graph Neural Networks for Transmission Power Grids

Add code
Jul 17, 2024
Figure 1 for SafePowerGraph: Safety-aware Evaluation of Graph Neural Networks for Transmission Power Grids
Figure 2 for SafePowerGraph: Safety-aware Evaluation of Graph Neural Networks for Transmission Power Grids
Figure 3 for SafePowerGraph: Safety-aware Evaluation of Graph Neural Networks for Transmission Power Grids
Figure 4 for SafePowerGraph: Safety-aware Evaluation of Graph Neural Networks for Transmission Power Grids
Viaarxiv icon

Robustness Analysis of AI Models in Critical Energy Systems

Add code
Jun 20, 2024
Figure 1 for Robustness Analysis of AI Models in Critical Energy Systems
Figure 2 for Robustness Analysis of AI Models in Critical Energy Systems
Figure 3 for Robustness Analysis of AI Models in Critical Energy Systems
Figure 4 for Robustness Analysis of AI Models in Critical Energy Systems
Viaarxiv icon

Constrained Adaptive Attack: Effective Adversarial Attack Against Deep Neural Networks for Tabular Data

Add code
Jun 02, 2024
Figure 1 for Constrained Adaptive Attack: Effective Adversarial Attack Against Deep Neural Networks for Tabular Data
Figure 2 for Constrained Adaptive Attack: Effective Adversarial Attack Against Deep Neural Networks for Tabular Data
Figure 3 for Constrained Adaptive Attack: Effective Adversarial Attack Against Deep Neural Networks for Tabular Data
Figure 4 for Constrained Adaptive Attack: Effective Adversarial Attack Against Deep Neural Networks for Tabular Data
Viaarxiv icon