Zobrazeno 1 - 10
of 1 057
pro vyhledávání: '"Mahyari A"'
Backdoor attacks pose a critical threat by embedding hidden triggers into inputs, causing models to misclassify them into target labels. While extensive research has focused on mitigating these attacks in object recognition models through weight fine
Externí odkaz:
http://arxiv.org/abs/2412.08755
Pedestrian dynamics simulates the fine-scaled trajectories of individuals in a crowd. It has been used to suggest public health interventions to reduce infection risk in important components of air travel, such as during boarding and in airport secur
Externí odkaz:
http://arxiv.org/abs/2410.14018
As networks continue to expand and become more interconnected, the need for novel malware detection methods becomes more pronounced. Traditional security measures are increasingly inadequate against the sophistication of modern cyber attacks. Deep Pa
Externí odkaz:
http://arxiv.org/abs/2409.18219
As the complexity and connectivity of networks increase, the need for novel malware detection approaches becomes imperative. Traditional security defenses are becoming less effective against the advanced tactics of today's cyberattacks. Deep Packet I
Externí odkaz:
http://arxiv.org/abs/2409.11254
Autor:
Mahyari, Andrew A
Software vulnerabilities, caused by unintentional flaws in source code, are a primary root cause of cyberattacks. Static analysis of source code has been widely used to detect these unintentional defects introduced by software developers. Large Langu
Externí odkaz:
http://arxiv.org/abs/2408.03489
As malicious cyber threats become more sophisticated in breaching computer networks, the need for effective intrusion detection systems (IDSs) becomes crucial. Techniques such as Deep Packet Inspection (DPI) have been introduced to allow IDSs analyze
Externí odkaz:
http://arxiv.org/abs/2403.18223
Autor:
Mahyari, Arash
Publikováno v:
22nd IEEE International Conference on Software, Quality, Reliability, and Security (QRS 2022)
Software vulnerabilities, caused by unintentional flaws in source codes, are the main root cause of cyberattacks. Source code static analysis has been used extensively to detect the unintentional defects, i.e. vulnerabilities, introduced into the sou
Externí odkaz:
http://arxiv.org/abs/2211.08517
Autor:
Sujittra Khampang, Chanchao Lorthongpanich, Chuti Laowtammathron, Phatchanat Klaihmon, Sukanya Meesa, Wichuda Suksomboon, Nittaya Jiamvoraphong, Pakpoom Kheolamai, Sudjit Luanpitpong, Charles A. Easley, Eisa Mahyari, Surapol Issaragrisil
Publikováno v:
Scientific Reports, Vol 14, Iss 1, Pp 1-15 (2024)
Abstract YAP plays a vital role in controlling growth and differentiation in various cell lineages. Although the expression of YAP in mice testicular and spermatogenic cells suggests its role in mammalian spermatogenesis, the role of YAP in the devel
Externí odkaz:
https://doaj.org/article/923d5e1ad63b41af8fd9c050f9bc7c1b
Autor:
Zahra Javanmardifard, Saeid Rahmani, Hadi Bayat, Hanifeh Mirtavoos-Mahyari, Mostafa Ghanei, Seyed Javad Mowla
Publikováno v:
Frontiers in Genetics, Vol 15 (2024)
BackgroundAccurate differentiation between lung adenocarcinoma (AC) and lung squamous cell carcinoma (SCC) is crucial owing to their distinct therapeutic approaches. MicroRNAs (miRNAs) exhibit variable expression across subtypes, making them promisin
Externí odkaz:
https://doaj.org/article/dad97e96d71842b5adb393c1d5939274
Autor:
Montazeri, Esmaeil, Riasi, Ahmad, Ghorbani, Gholam Reza, Mahyari, Saeid Ansari, Jamali, Ali, Hosseini Ghaffari, Morteza
Publikováno v:
In Animal Feed Science and Technology December 2024 318