Picture for Ahmed Abusnaina

Ahmed Abusnaina

Burning the Adversarial Bridges: Robust Windows Malware Detection Against Binary-level Mutations

Add code
Oct 05, 2023
Viaarxiv icon

ML-based IoT Malware Detection Under Adversarial Settings: A Systematic Evaluation

Add code
Aug 30, 2021
Figure 1 for ML-based IoT Malware Detection Under Adversarial Settings: A Systematic Evaluation
Figure 2 for ML-based IoT Malware Detection Under Adversarial Settings: A Systematic Evaluation
Figure 3 for ML-based IoT Malware Detection Under Adversarial Settings: A Systematic Evaluation
Figure 4 for ML-based IoT Malware Detection Under Adversarial Settings: A Systematic Evaluation
Viaarxiv icon

Hate, Obscenity, and Insults: Measuring the Exposure of Children to Inappropriate Comments in YouTube

Add code
Mar 03, 2021
Figure 1 for Hate, Obscenity, and Insults: Measuring the Exposure of Children to Inappropriate Comments in YouTube
Figure 2 for Hate, Obscenity, and Insults: Measuring the Exposure of Children to Inappropriate Comments in YouTube
Figure 3 for Hate, Obscenity, and Insults: Measuring the Exposure of Children to Inappropriate Comments in YouTube
Figure 4 for Hate, Obscenity, and Insults: Measuring the Exposure of Children to Inappropriate Comments in YouTube
Viaarxiv icon

Sensor-based Continuous Authentication of Smartphones' Users Using Behavioral Biometrics: A Survey

Add code
Jan 23, 2020
Figure 1 for Sensor-based Continuous Authentication of Smartphones' Users Using Behavioral Biometrics: A Survey
Figure 2 for Sensor-based Continuous Authentication of Smartphones' Users Using Behavioral Biometrics: A Survey
Figure 3 for Sensor-based Continuous Authentication of Smartphones' Users Using Behavioral Biometrics: A Survey
Figure 4 for Sensor-based Continuous Authentication of Smartphones' Users Using Behavioral Biometrics: A Survey
Viaarxiv icon

COPYCAT: Practical Adversarial Attacks on Visualization-Based Malware Detection

Add code
Sep 20, 2019
Figure 1 for COPYCAT: Practical Adversarial Attacks on Visualization-Based Malware Detection
Figure 2 for COPYCAT: Practical Adversarial Attacks on Visualization-Based Malware Detection
Figure 3 for COPYCAT: Practical Adversarial Attacks on Visualization-Based Malware Detection
Figure 4 for COPYCAT: Practical Adversarial Attacks on Visualization-Based Malware Detection
Viaarxiv icon

Examining Adversarial Learning against Graph-based IoT Malware Detection Systems

Add code
Feb 15, 2019
Figure 1 for Examining Adversarial Learning against Graph-based IoT Malware Detection Systems
Figure 2 for Examining Adversarial Learning against Graph-based IoT Malware Detection Systems
Figure 3 for Examining Adversarial Learning against Graph-based IoT Malware Detection Systems
Viaarxiv icon