Picture for Yassine Mekdad

Yassine Mekdad

SPRITZ-1.5C: Employing Deep Ensemble Learning for Improving the Security of Computer Networks against Adversarial Attacks

Sep 25, 2022
Figure 1 for SPRITZ-1.5C: Employing Deep Ensemble Learning for Improving the Security of Computer Networks against Adversarial Attacks
Figure 2 for SPRITZ-1.5C: Employing Deep Ensemble Learning for Improving the Security of Computer Networks against Adversarial Attacks
Figure 3 for SPRITZ-1.5C: Employing Deep Ensemble Learning for Improving the Security of Computer Networks against Adversarial Attacks
Figure 4 for SPRITZ-1.5C: Employing Deep Ensemble Learning for Improving the Security of Computer Networks against Adversarial Attacks
Viaarxiv icon

Resisting Deep Learning Models Against Adversarial Attack Transferability via Feature Randomization

Sep 11, 2022
Figure 1 for Resisting Deep Learning Models Against Adversarial Attack Transferability via Feature Randomization
Figure 2 for Resisting Deep Learning Models Against Adversarial Attack Transferability via Feature Randomization
Figure 3 for Resisting Deep Learning Models Against Adversarial Attack Transferability via Feature Randomization
Figure 4 for Resisting Deep Learning Models Against Adversarial Attack Transferability via Feature Randomization
Viaarxiv icon

Real or Virtual: A Video Conferencing Background Manipulation-Detection System

Apr 25, 2022
Figure 1 for Real or Virtual: A Video Conferencing Background Manipulation-Detection System
Figure 2 for Real or Virtual: A Video Conferencing Background Manipulation-Detection System
Figure 3 for Real or Virtual: A Video Conferencing Background Manipulation-Detection System
Figure 4 for Real or Virtual: A Video Conferencing Background Manipulation-Detection System
Viaarxiv icon

Detecting High-Quality GAN-Generated Face Images using Neural Networks

Mar 03, 2022
Figure 1 for Detecting High-Quality GAN-Generated Face Images using Neural Networks
Figure 2 for Detecting High-Quality GAN-Generated Face Images using Neural Networks
Figure 3 for Detecting High-Quality GAN-Generated Face Images using Neural Networks
Figure 4 for Detecting High-Quality GAN-Generated Face Images using Neural Networks
Viaarxiv icon

Demystifying the Transferability of Adversarial Attacks in Computer Networks

Oct 09, 2021
Figure 1 for Demystifying the Transferability of Adversarial Attacks in Computer Networks
Figure 2 for Demystifying the Transferability of Adversarial Attacks in Computer Networks
Figure 3 for Demystifying the Transferability of Adversarial Attacks in Computer Networks
Figure 4 for Demystifying the Transferability of Adversarial Attacks in Computer Networks
Viaarxiv icon