Alert button
Picture for Surya Nepal

Surya Nepal

Alert button

Characterizing Malicious URL Campaigns

Aug 29, 2021
Mahathir Almashor, Ejaz Ahmed, Benjamin Pick, Sharif Abuadbba, Raj Gaire, Seyit Camtepe, Surya Nepal

Figure 1 for Characterizing Malicious URL Campaigns
Figure 2 for Characterizing Malicious URL Campaigns
Figure 3 for Characterizing Malicious URL Campaigns
Figure 4 for Characterizing Malicious URL Campaigns
Viaarxiv icon

FedDICE: A ransomware spread detection in a distributed integrated clinical environment using federated learning and SDN based mitigation

Jun 09, 2021
Chandra Thapa, Kallol Krishna Karmakar, Alberto Huertas Celdran, Seyit Camtepe, Vijay Varadharajan, Surya Nepal

Figure 1 for FedDICE: A ransomware spread detection in a distributed integrated clinical environment using federated learning and SDN based mitigation
Figure 2 for FedDICE: A ransomware spread detection in a distributed integrated clinical environment using federated learning and SDN based mitigation
Figure 3 for FedDICE: A ransomware spread detection in a distributed integrated clinical environment using federated learning and SDN based mitigation
Figure 4 for FedDICE: A ransomware spread detection in a distributed integrated clinical environment using federated learning and SDN based mitigation
Viaarxiv icon

A Comprehensive Survey on Community Detection with Deep Learning

May 26, 2021
Xing Su, Shan Xue, Fanzhen Liu, Jia Wu, Jian Yang, Chuan Zhou, Wenbin Hu, Cecile Paris, Surya Nepal, Di Jin, Quan Z. Sheng, Philip S. Yu

Figure 1 for A Comprehensive Survey on Community Detection with Deep Learning
Figure 2 for A Comprehensive Survey on Community Detection with Deep Learning
Figure 3 for A Comprehensive Survey on Community Detection with Deep Learning
Figure 4 for A Comprehensive Survey on Community Detection with Deep Learning
Viaarxiv icon

RAIDER: Reinforcement-aided Spear Phishing Detector

May 17, 2021
Keelan Evans, Alsharif Abuadbba, Mohiuddin Ahmed, Tingmin Wu, Mike Johnstone, Surya Nepal

Figure 1 for RAIDER: Reinforcement-aided Spear Phishing Detector
Figure 2 for RAIDER: Reinforcement-aided Spear Phishing Detector
Figure 3 for RAIDER: Reinforcement-aided Spear Phishing Detector
Figure 4 for RAIDER: Reinforcement-aided Spear Phishing Detector
Viaarxiv icon

Robust Training Using Natural Transformation

May 10, 2021
Shuo Wang, Lingjuan Lyu, Surya Nepal, Carsten Rudolph, Marthie Grobler, Kristen Moore

Figure 1 for Robust Training Using Natural Transformation
Figure 2 for Robust Training Using Natural Transformation
Figure 3 for Robust Training Using Natural Transformation
Figure 4 for Robust Training Using Natural Transformation
Viaarxiv icon

OCTOPUS: Overcoming Performance andPrivatization Bottlenecks in Distributed Learning

May 03, 2021
Shuo Wang, Surya Nepal, Kristen Moore, Marthie Grobler, Carsten Rudolph, Alsharif Abuadbba

Figure 1 for OCTOPUS: Overcoming Performance andPrivatization Bottlenecks in Distributed Learning
Figure 2 for OCTOPUS: Overcoming Performance andPrivatization Bottlenecks in Distributed Learning
Figure 3 for OCTOPUS: Overcoming Performance andPrivatization Bottlenecks in Distributed Learning
Figure 4 for OCTOPUS: Overcoming Performance andPrivatization Bottlenecks in Distributed Learning
Viaarxiv icon

Confined Gradient Descent: Privacy-preserving Optimization for Federated Learning

Apr 27, 2021
Yanjun Zhang, Guangdong Bai, Xue Li, Surya Nepal, Ryan K L Ko

Figure 1 for Confined Gradient Descent: Privacy-preserving Optimization for Federated Learning
Figure 2 for Confined Gradient Descent: Privacy-preserving Optimization for Federated Learning
Figure 3 for Confined Gradient Descent: Privacy-preserving Optimization for Federated Learning
Figure 4 for Confined Gradient Descent: Privacy-preserving Optimization for Federated Learning
Viaarxiv icon

Evaluation and Optimization of Distributed Machine Learning Techniques for Internet of Things

Mar 03, 2021
Yansong Gao, Minki Kim, Chandra Thapa, Sharif Abuadbba, Zhi Zhang, Seyit A. Camtepe, Hyoungshick Kim, Surya Nepal

Figure 1 for Evaluation and Optimization of Distributed Machine Learning Techniques for Internet of Things
Figure 2 for Evaluation and Optimization of Distributed Machine Learning Techniques for Internet of Things
Figure 3 for Evaluation and Optimization of Distributed Machine Learning Techniques for Internet of Things
Figure 4 for Evaluation and Optimization of Distributed Machine Learning Techniques for Internet of Things
Viaarxiv icon

Token-Modification Adversarial Attacks for Natural Language Processing: A Survey

Mar 01, 2021
Tom Roth, Yansong Gao, Alsharif Abuadbba, Surya Nepal, Wei Liu

Figure 1 for Token-Modification Adversarial Attacks for Natural Language Processing: A Survey
Figure 2 for Token-Modification Adversarial Attacks for Natural Language Processing: A Survey
Viaarxiv icon

DeepiSign: Invisible Fragile Watermark to Protect the Integrityand Authenticity of CNN

Jan 12, 2021
Alsharif Abuadbba, Hyoungshick Kim, Surya Nepal

Figure 1 for DeepiSign: Invisible Fragile Watermark to Protect the Integrityand Authenticity of CNN
Figure 2 for DeepiSign: Invisible Fragile Watermark to Protect the Integrityand Authenticity of CNN
Figure 3 for DeepiSign: Invisible Fragile Watermark to Protect the Integrityand Authenticity of CNN
Figure 4 for DeepiSign: Invisible Fragile Watermark to Protect the Integrityand Authenticity of CNN
Viaarxiv icon