Zobrazeno 1 - 10
of 47
pro vyhledávání: '"Nowroozi, Ehsan"'
Malicious URLs provide adversarial opportunities across various industries, including transportation, healthcare, energy, and banking which could be detrimental to business operations. Consequently, the detection of these URLs is of crucial importanc
Externí odkaz:
http://arxiv.org/abs/2403.02995
Federated Learning (FL) is a machine learning (ML) approach that enables multiple decentralized devices or edge servers to collaboratively train a shared model without exchanging raw data. During the training and sharing of model updates between clie
Externí odkaz:
http://arxiv.org/abs/2403.02983
Convolutional neural networks (CNNs) models play a vital role in achieving state-of-the-art performances in various technological fields. CNNs are not limited to Natural Language Processing (NLP) or Computer Vision (CV) but also have substantial appl
Externí odkaz:
http://arxiv.org/abs/2311.03373
The capability of doing effective forensic analysis on printed and scanned (PS) images is essential in many applications. PS documents may be used to conceal the artifacts of images which is due to the synthetic nature of images since these artifacts
Externí odkaz:
http://arxiv.org/abs/2304.02982
Digital wallet as a software program or a digital device allows users to conduct various transactions. Hot and cold digital wallets are considered as two types of this wallet. Digital wallets need an online connection fall into the first group, where
Externí odkaz:
http://arxiv.org/abs/2303.12940
In the past few years, Convolutional Neural Networks (CNN) have demonstrated promising performance in various real-world cybersecurity applications, such as network and multimedia security. However, the underlying fragility of CNN structures poses ma
Externí odkaz:
http://arxiv.org/abs/2209.12195
Autor:
Nowroozi, Ehsan, Mohammadi, Mohammadreza, Golmohammadi, Pargol, Mekdad, Yassine, Conti, Mauro, Uluagac, Selcuk
In the past decades, the rise of artificial intelligence has given us the capabilities to solve the most challenging problems in our day-to-day lives, such as cancer prediction and autonomous navigation. However, these applications might not be relia
Externí odkaz:
http://arxiv.org/abs/2209.04930
Malicious advertisement URLs pose a security risk since they are the source of cyber-attacks, and the need to address this issue is growing in both industry and academia. Generally, the attacker delivers an attack vector to the user by means of an em
Externí odkaz:
http://arxiv.org/abs/2204.13172
Autor:
Nowroozi, Ehsan, Mekdad, Yassine, Conti, Mauro, Milani, Simone, Uluagac, Selcuk, Yanikoglu, Berrin
Recently, the popularity and wide use of the last-generation video conferencing technologies created an exponential growth in its market size. Such technology allows participants in different geographic regions to have a virtual face-to-face meeting.
Externí odkaz:
http://arxiv.org/abs/2204.11853
In the past decades, the excessive use of the last-generation GAN (Generative Adversarial Networks) models in computer vision has enabled the creation of artificial face images that are visually indistinguishable from genuine ones. These images are p
Externí odkaz:
http://arxiv.org/abs/2203.01716