Alert button
Picture for Sharif Abuadbba

Sharif Abuadbba

Alert button

Contextual Chart Generation for Cyber Deception

Add code
Bookmark button
Alert button
Apr 07, 2024
David D. Nguyen, David Liebowitz, Surya Nepal, Salil S. Kanhere, Sharif Abuadbba

Viaarxiv icon

Interpretability and Transparency-Driven Detection and Transformation of Textual Adversarial Examples (IT-DT)

Add code
Bookmark button
Alert button
Jul 03, 2023
Bushra Sabir, M. Ali Babar, Sharif Abuadbba

Figure 1 for Interpretability and Transparency-Driven Detection and Transformation of Textual Adversarial Examples (IT-DT)
Figure 2 for Interpretability and Transparency-Driven Detection and Transformation of Textual Adversarial Examples (IT-DT)
Figure 3 for Interpretability and Transparency-Driven Detection and Transformation of Textual Adversarial Examples (IT-DT)
Figure 4 for Interpretability and Transparency-Driven Detection and Transformation of Textual Adversarial Examples (IT-DT)
Viaarxiv icon

Integrity Fingerprinting of DNN with Double Black-box Design and Verification

Add code
Bookmark button
Alert button
Mar 23, 2022
Shuo Wang, Sharif Abuadbba, Sidharth Agarwal, Kristen Moore, Surya Nepal, Salil Kanhere

Figure 1 for Integrity Fingerprinting of DNN with Double Black-box Design and Verification
Figure 2 for Integrity Fingerprinting of DNN with Double Black-box Design and Verification
Figure 3 for Integrity Fingerprinting of DNN with Double Black-box Design and Verification
Figure 4 for Integrity Fingerprinting of DNN with Double Black-box Design and Verification
Viaarxiv icon

Characterizing Malicious URL Campaigns

Add code
Bookmark button
Alert button
Aug 29, 2021
Mahathir Almashor, Ejaz Ahmed, Benjamin Pick, Sharif Abuadbba, Raj Gaire, Seyit Camtepe, Surya Nepal

Figure 1 for Characterizing Malicious URL Campaigns
Figure 2 for Characterizing Malicious URL Campaigns
Figure 3 for Characterizing Malicious URL Campaigns
Figure 4 for Characterizing Malicious URL Campaigns
Viaarxiv icon

Evaluation and Optimization of Distributed Machine Learning Techniques for Internet of Things

Add code
Bookmark button
Alert button
Mar 03, 2021
Yansong Gao, Minki Kim, Chandra Thapa, Sharif Abuadbba, Zhi Zhang, Seyit A. Camtepe, Hyoungshick Kim, Surya Nepal

Figure 1 for Evaluation and Optimization of Distributed Machine Learning Techniques for Internet of Things
Figure 2 for Evaluation and Optimization of Distributed Machine Learning Techniques for Internet of Things
Figure 3 for Evaluation and Optimization of Distributed Machine Learning Techniques for Internet of Things
Figure 4 for Evaluation and Optimization of Distributed Machine Learning Techniques for Internet of Things
Viaarxiv icon

FedEmail: Performance Measurement of Privacy-friendly Phishing Detection Enabled by Federated Learning

Add code
Bookmark button
Alert button
Jul 27, 2020
Chandra Thapa, Jun Wen Tang, Sharif Abuadbba, Yansong Gao, Yifeng Zheng, Seyit A. Camtepe, Surya Nepal, Mahathir Almashor

Figure 1 for FedEmail: Performance Measurement of Privacy-friendly Phishing Detection Enabled by Federated Learning
Figure 2 for FedEmail: Performance Measurement of Privacy-friendly Phishing Detection Enabled by Federated Learning
Figure 3 for FedEmail: Performance Measurement of Privacy-friendly Phishing Detection Enabled by Federated Learning
Figure 4 for FedEmail: Performance Measurement of Privacy-friendly Phishing Detection Enabled by Federated Learning
Viaarxiv icon

DeepCapture: Image Spam Detection Using Deep Learning and Data Augmentation

Add code
Bookmark button
Alert button
Jun 16, 2020
Bedeuro Kim, Sharif Abuadbba, Hyoungshick Kim

Figure 1 for DeepCapture: Image Spam Detection Using Deep Learning and Data Augmentation
Figure 2 for DeepCapture: Image Spam Detection Using Deep Learning and Data Augmentation
Figure 3 for DeepCapture: Image Spam Detection Using Deep Learning and Data Augmentation
Figure 4 for DeepCapture: Image Spam Detection Using Deep Learning and Data Augmentation
Viaarxiv icon

End-to-End Evaluation of Federated Learning and Split Learning for Internet of Things

Add code
Bookmark button
Alert button
Mar 30, 2020
Yansong Gao, Minki Kim, Sharif Abuadbba, Yeonjae Kim, Chandra Thapa, Kyuyeon Kim, Seyit A. Camtepe, Hyoungshick Kim, Surya Nepal

Figure 1 for End-to-End Evaluation of Federated Learning and Split Learning for Internet of Things
Figure 2 for End-to-End Evaluation of Federated Learning and Split Learning for Internet of Things
Figure 3 for End-to-End Evaluation of Federated Learning and Split Learning for Internet of Things
Figure 4 for End-to-End Evaluation of Federated Learning and Split Learning for Internet of Things
Viaarxiv icon

Can We Use Split Learning on 1D CNN Models for Privacy Preserving Training?

Add code
Bookmark button
Alert button
Mar 16, 2020
Sharif Abuadbba, Kyuyeon Kim, Minki Kim, Chandra Thapa, Seyit A. Camtepe, Yansong Gao, Hyoungshick Kim, Surya Nepal

Figure 1 for Can We Use Split Learning on 1D CNN Models for Privacy Preserving Training?
Figure 2 for Can We Use Split Learning on 1D CNN Models for Privacy Preserving Training?
Figure 3 for Can We Use Split Learning on 1D CNN Models for Privacy Preserving Training?
Figure 4 for Can We Use Split Learning on 1D CNN Models for Privacy Preserving Training?
Viaarxiv icon