Picture for Abdallah Khreishah

Abdallah Khreishah

Demo: SGCode: A Flexible Prompt-Optimizing System for Secure Generation of Code

Add code
Sep 11, 2024
Figure 1 for Demo: SGCode: A Flexible Prompt-Optimizing System for Secure Generation of Code
Figure 2 for Demo: SGCode: A Flexible Prompt-Optimizing System for Secure Generation of Code
Figure 3 for Demo: SGCode: A Flexible Prompt-Optimizing System for Secure Generation of Code
Viaarxiv icon

Genetic Algorithm-Based Dynamic Backdoor Attack on Federated Learning-Based Network Traffic Classification

Add code
Sep 27, 2023
Figure 1 for Genetic Algorithm-Based Dynamic Backdoor Attack on Federated Learning-Based Network Traffic Classification
Figure 2 for Genetic Algorithm-Based Dynamic Backdoor Attack on Federated Learning-Based Network Traffic Classification
Figure 3 for Genetic Algorithm-Based Dynamic Backdoor Attack on Federated Learning-Based Network Traffic Classification
Figure 4 for Genetic Algorithm-Based Dynamic Backdoor Attack on Federated Learning-Based Network Traffic Classification
Viaarxiv icon

Multi-Instance Adversarial Attack on GNN-Based Malicious Domain Detection

Add code
Aug 22, 2023
Figure 1 for Multi-Instance Adversarial Attack on GNN-Based Malicious Domain Detection
Figure 2 for Multi-Instance Adversarial Attack on GNN-Based Malicious Domain Detection
Figure 3 for Multi-Instance Adversarial Attack on GNN-Based Malicious Domain Detection
Figure 4 for Multi-Instance Adversarial Attack on GNN-Based Malicious Domain Detection
Viaarxiv icon

Semi-decentralized Inference in Heterogeneous Graph Neural Networks for Traffic Demand Forecasting: An Edge-Computing Approach

Add code
Feb 28, 2023
Viaarxiv icon

Heterogeneous Randomized Response for Differential Privacy in Graph Neural Networks

Add code
Nov 10, 2022
Figure 1 for Heterogeneous Randomized Response for Differential Privacy in Graph Neural Networks
Figure 2 for Heterogeneous Randomized Response for Differential Privacy in Graph Neural Networks
Figure 3 for Heterogeneous Randomized Response for Differential Privacy in Graph Neural Networks
Figure 4 for Heterogeneous Randomized Response for Differential Privacy in Graph Neural Networks
Viaarxiv icon

An Adaptive Black-box Defense against Trojan Attacks

Add code
Sep 05, 2022
Figure 1 for An Adaptive Black-box Defense against Trojan Attacks
Figure 2 for An Adaptive Black-box Defense against Trojan Attacks
Figure 3 for An Adaptive Black-box Defense against Trojan Attacks
Figure 4 for An Adaptive Black-box Defense against Trojan Attacks
Viaarxiv icon

Model Transferring Attacks to Backdoor HyperNetwork in Personalized Federated Learning

Add code
Jan 19, 2022
Figure 1 for Model Transferring Attacks to Backdoor HyperNetwork in Personalized Federated Learning
Figure 2 for Model Transferring Attacks to Backdoor HyperNetwork in Personalized Federated Learning
Figure 3 for Model Transferring Attacks to Backdoor HyperNetwork in Personalized Federated Learning
Figure 4 for Model Transferring Attacks to Backdoor HyperNetwork in Personalized Federated Learning
Viaarxiv icon

Adversarial Attacks and Defenses for Social Network Text Processing Applications: Techniques, Challenges and Future Research Directions

Add code
Oct 26, 2021
Figure 1 for Adversarial Attacks and Defenses for Social Network Text Processing Applications: Techniques, Challenges and Future Research Directions
Figure 2 for Adversarial Attacks and Defenses for Social Network Text Processing Applications: Techniques, Challenges and Future Research Directions
Figure 3 for Adversarial Attacks and Defenses for Social Network Text Processing Applications: Techniques, Challenges and Future Research Directions
Figure 4 for Adversarial Attacks and Defenses for Social Network Text Processing Applications: Techniques, Challenges and Future Research Directions
Viaarxiv icon

Smart Traffic Monitoring System using Computer Vision and Edge Computing

Add code
Sep 07, 2021
Figure 1 for Smart Traffic Monitoring System using Computer Vision and Edge Computing
Figure 2 for Smart Traffic Monitoring System using Computer Vision and Edge Computing
Figure 3 for Smart Traffic Monitoring System using Computer Vision and Edge Computing
Figure 4 for Smart Traffic Monitoring System using Computer Vision and Edge Computing
Viaarxiv icon

A Synergetic Attack against Neural Network Classifiers combining Backdoor and Adversarial Examples

Add code
Sep 03, 2021
Figure 1 for A Synergetic Attack against Neural Network Classifiers combining Backdoor and Adversarial Examples
Figure 2 for A Synergetic Attack against Neural Network Classifiers combining Backdoor and Adversarial Examples
Figure 3 for A Synergetic Attack against Neural Network Classifiers combining Backdoor and Adversarial Examples
Figure 4 for A Synergetic Attack against Neural Network Classifiers combining Backdoor and Adversarial Examples
Viaarxiv icon