Zobrazeno 1 - 10
of 19
pro vyhledávání: '"Ehsan Nowroozi"'
Publikováno v:
Journal of Imaging, Vol 7, Iss 3, p 50 (2021)
The possibility of carrying out a meaningful forensic analysis on printed and scanned images plays a major role in many applications. First of all, printed documents are often associated with criminal activities, such as terrorist plans, child pornog
Externí odkaz:
https://doaj.org/article/9ec3e3ddb8244f04b2fbd6ecd9f7ad88
Autor:
Ehsan Nowroozi, Yassine Mekdad
Publikováno v:
Big Data Analytics and Intelligent Systems for Cyber Threat Intelligence ISBN: 9781003373384
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::8a61c76884227301ce14c2a9d56a6c88
https://doi.org/10.1201/9781003373384-12
https://doi.org/10.1201/9781003373384-12
In the past few years, Convolutional Neural Networks (CNN) have demonstrated promising performance in various real-world cybersecurity applications, such as network and multimedia security. However, the underlying fragility of CNN structures poses ma
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::e77977191b0bab3f3ea9587692d7da2c
https://hdl.handle.net/11577/3482083
https://hdl.handle.net/11577/3482083
Publikováno v:
Advances in Information Security ISBN: 9783031255052
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::76a0023a2838c33f514b2ac47c63b973
https://doi.org/10.1007/978-3-031-25506-9_1
https://doi.org/10.1007/978-3-031-25506-9_1
Autor:
Ehsan Nowroozi, Yassine Mekdad, Mohammad Hajian Berenjestanaki, Mauro Conti, Abdeslam El Fergougui
Convolutional Neural Networks (CNNs) models are one of the most frequently used deep learning networks, and extensively used in both academia and industry. Recent studies demonstrated that adversarial attacks against such models can maintain their ef
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::571185d673710ffd33e3d1909e77ac38
Malicious advertisement URLs pose a security risk since they are the source of cyber-attacks, and the need to address this issue is growing in both industry and academia. Generally, the attacker delivers an attack vector to the user by means of an em
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::9401aa472470084c8fcabbf2000abfc3
Publikováno v:
Breakthroughs in Digital Biometrics and Forensics ISBN: 9783031107054
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::04399939193275008f456dd9adf5169f
https://doi.org/10.1007/978-3-031-10706-1_18
https://doi.org/10.1007/978-3-031-10706-1_18
This book explores various aspects of digital forensics, security and machine learning, while offering valuable insights into the ever-evolving landscape of multimedia forensics and data security. This book's content can be summarized in two main are
Image forensic plays a crucial role in both criminal investigations (e.g., dissemination of fake images to spread racial hate or false narratives about specific ethnicity groups) and civil litigation (e.g., defamation). Increasingly, machine learning
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::c0b98737f30c884664fad78ccf6bed56