Alert button
Picture for Yassine Mekdad

Yassine Mekdad

Alert button

SPRITZ-1.5C: Employing Deep Ensemble Learning for Improving the Security of Computer Networks against Adversarial Attacks

Sep 25, 2022
Ehsan Nowroozi, Mohammadreza Mohammadi, Erkay Savas, Mauro Conti, Yassine Mekdad

Figure 1 for SPRITZ-1.5C: Employing Deep Ensemble Learning for Improving the Security of Computer Networks against Adversarial Attacks
Figure 2 for SPRITZ-1.5C: Employing Deep Ensemble Learning for Improving the Security of Computer Networks against Adversarial Attacks
Figure 3 for SPRITZ-1.5C: Employing Deep Ensemble Learning for Improving the Security of Computer Networks against Adversarial Attacks
Figure 4 for SPRITZ-1.5C: Employing Deep Ensemble Learning for Improving the Security of Computer Networks against Adversarial Attacks
Viaarxiv icon

Resisting Deep Learning Models Against Adversarial Attack Transferability via Feature Randomization

Sep 11, 2022
Ehsan Nowroozi, Mohammadreza Mohammadi, Pargol Golmohammadi, Yassine Mekdad, Mauro Conti, Selcuk Uluagac

Figure 1 for Resisting Deep Learning Models Against Adversarial Attack Transferability via Feature Randomization
Figure 2 for Resisting Deep Learning Models Against Adversarial Attack Transferability via Feature Randomization
Figure 3 for Resisting Deep Learning Models Against Adversarial Attack Transferability via Feature Randomization
Figure 4 for Resisting Deep Learning Models Against Adversarial Attack Transferability via Feature Randomization
Viaarxiv icon

Real or Virtual: A Video Conferencing Background Manipulation-Detection System

Apr 25, 2022
Ehsan Nowroozi, Yassine Mekdad, Mauro Conti, Simone Milani, Selcuk Uluagac, Berrin Yanikoglu

Figure 1 for Real or Virtual: A Video Conferencing Background Manipulation-Detection System
Figure 2 for Real or Virtual: A Video Conferencing Background Manipulation-Detection System
Figure 3 for Real or Virtual: A Video Conferencing Background Manipulation-Detection System
Figure 4 for Real or Virtual: A Video Conferencing Background Manipulation-Detection System
Viaarxiv icon

Detecting High-Quality GAN-Generated Face Images using Neural Networks

Mar 03, 2022
Ehsan Nowroozi, Mauro Conti, Yassine Mekdad

Figure 1 for Detecting High-Quality GAN-Generated Face Images using Neural Networks
Figure 2 for Detecting High-Quality GAN-Generated Face Images using Neural Networks
Figure 3 for Detecting High-Quality GAN-Generated Face Images using Neural Networks
Figure 4 for Detecting High-Quality GAN-Generated Face Images using Neural Networks
Viaarxiv icon

Demystifying the Transferability of Adversarial Attacks in Computer Networks

Oct 09, 2021
Ehsan Nowroozi, Mauro Conti, Yassine Mekdad, Mohammad Hajian Berenjestanaki, Abdeslam EL Fergougui

Figure 1 for Demystifying the Transferability of Adversarial Attacks in Computer Networks
Figure 2 for Demystifying the Transferability of Adversarial Attacks in Computer Networks
Figure 3 for Demystifying the Transferability of Adversarial Attacks in Computer Networks
Figure 4 for Demystifying the Transferability of Adversarial Attacks in Computer Networks
Viaarxiv icon