Alert button
Picture for Seyit Camtepe

Seyit Camtepe

Alert button

Radio Signal Classification by Adversarially Robust Quantum Machine Learning

Add code
Bookmark button
Alert button
Dec 13, 2023
Yanqiu Wu, Eromanga Adermann, Chandra Thapa, Seyit Camtepe, Hajime Suzuki, Muhammad Usman

Viaarxiv icon

Parameter-Saving Adversarial Training: Reinforcing Multi-Perturbation Robustness via Hypernetworks

Add code
Bookmark button
Alert button
Sep 28, 2023
Huihui Gong, Minjing Dong, Siqi Ma, Seyit Camtepe, Surya Nepal, Chang Xu

Figure 1 for Parameter-Saving Adversarial Training: Reinforcing Multi-Perturbation Robustness via Hypernetworks
Figure 2 for Parameter-Saving Adversarial Training: Reinforcing Multi-Perturbation Robustness via Hypernetworks
Figure 3 for Parameter-Saving Adversarial Training: Reinforcing Multi-Perturbation Robustness via Hypernetworks
Figure 4 for Parameter-Saving Adversarial Training: Reinforcing Multi-Perturbation Robustness via Hypernetworks
Viaarxiv icon

Stealthy Physical Masked Face Recognition Attack via Adversarial Style Optimization

Add code
Bookmark button
Alert button
Sep 18, 2023
Huihui Gong, Minjing Dong, Siqi Ma, Seyit Camtepe, Surya Nepal, Chang Xu

Figure 1 for Stealthy Physical Masked Face Recognition Attack via Adversarial Style Optimization
Figure 2 for Stealthy Physical Masked Face Recognition Attack via Adversarial Style Optimization
Figure 3 for Stealthy Physical Masked Face Recognition Attack via Adversarial Style Optimization
Figure 4 for Stealthy Physical Masked Face Recognition Attack via Adversarial Style Optimization
Viaarxiv icon

Reducing Adversarial Training Cost with Gradient Approximation

Add code
Bookmark button
Alert button
Sep 18, 2023
Huihui Gong, Shuo Yang, Siqi Ma, Seyit Camtepe, Surya Nepal, Chang Xu

Figure 1 for Reducing Adversarial Training Cost with Gradient Approximation
Figure 2 for Reducing Adversarial Training Cost with Gradient Approximation
Figure 3 for Reducing Adversarial Training Cost with Gradient Approximation
Figure 4 for Reducing Adversarial Training Cost with Gradient Approximation
Viaarxiv icon

Quantum-Inspired Machine Learning: a Survey

Add code
Bookmark button
Alert button
Sep 08, 2023
Larry Huynh, Jin Hong, Ajmal Mian, Hajime Suzuki, Yanqiu Wu, Seyit Camtepe

Figure 1 for Quantum-Inspired Machine Learning: a Survey
Figure 2 for Quantum-Inspired Machine Learning: a Survey
Figure 3 for Quantum-Inspired Machine Learning: a Survey
Figure 4 for Quantum-Inspired Machine Learning: a Survey
Viaarxiv icon

Classification and Explanation of Distributed Denial-of-Service (DDoS) Attack Detection using Machine Learning and Shapley Additive Explanation (SHAP) Methods

Add code
Bookmark button
Alert button
Jun 27, 2023
Yuanyuan Wei, Julian Jang-Jaccard, Amardeep Singh, Fariza Sabrina, Seyit Camtepe

Figure 1 for Classification and Explanation of Distributed Denial-of-Service (DDoS) Attack Detection using Machine Learning and Shapley Additive Explanation (SHAP) Methods
Figure 2 for Classification and Explanation of Distributed Denial-of-Service (DDoS) Attack Detection using Machine Learning and Shapley Additive Explanation (SHAP) Methods
Figure 3 for Classification and Explanation of Distributed Denial-of-Service (DDoS) Attack Detection using Machine Learning and Shapley Additive Explanation (SHAP) Methods
Figure 4 for Classification and Explanation of Distributed Denial-of-Service (DDoS) Attack Detection using Machine Learning and Shapley Additive Explanation (SHAP) Methods
Viaarxiv icon

Access-based Lightweight Physical Layer Authentication for the Internet of Things Devices

Add code
Bookmark button
Alert button
Mar 01, 2023
Saud Khan, Chandra Thapa, Salman Durrani, Seyit Camtepe

Figure 1 for Access-based Lightweight Physical Layer Authentication for the Internet of Things Devices
Figure 2 for Access-based Lightweight Physical Layer Authentication for the Internet of Things Devices
Figure 3 for Access-based Lightweight Physical Layer Authentication for the Internet of Things Devices
Figure 4 for Access-based Lightweight Physical Layer Authentication for the Internet of Things Devices
Viaarxiv icon

On the Use of Power Amplifier Nonlinearity Quotient to Improve Radio Frequency Fingerprint Identification in Time-Varying Channels

Add code
Bookmark button
Alert button
Feb 27, 2023
Lu Yang, Seyit Camtepe, Yansong Gao, Vicky Liu, Dhammika Jayalath

Figure 1 for On the Use of Power Amplifier Nonlinearity Quotient to Improve Radio Frequency Fingerprint Identification in Time-Varying Channels
Figure 2 for On the Use of Power Amplifier Nonlinearity Quotient to Improve Radio Frequency Fingerprint Identification in Time-Varying Channels
Figure 3 for On the Use of Power Amplifier Nonlinearity Quotient to Improve Radio Frequency Fingerprint Identification in Time-Varying Channels
Figure 4 for On the Use of Power Amplifier Nonlinearity Quotient to Improve Radio Frequency Fingerprint Identification in Time-Varying Channels
Viaarxiv icon

An Information-Theoretic and Contrastive Learning-based Approach for Identifying Code Statements Causing Software Vulnerability

Add code
Bookmark button
Alert button
Sep 20, 2022
Van Nguyen, Trung Le, Chakkrit Tantithamthavorn, John Grundy, Hung Nguyen, Seyit Camtepe, Paul Quirk, Dinh Phung

Figure 1 for An Information-Theoretic and Contrastive Learning-based Approach for Identifying Code Statements Causing Software Vulnerability
Figure 2 for An Information-Theoretic and Contrastive Learning-based Approach for Identifying Code Statements Causing Software Vulnerability
Figure 3 for An Information-Theoretic and Contrastive Learning-based Approach for Identifying Code Statements Causing Software Vulnerability
Figure 4 for An Information-Theoretic and Contrastive Learning-based Approach for Identifying Code Statements Causing Software Vulnerability
Viaarxiv icon