Picture for Bassem Ouni

Bassem Ouni

TESSER: Transfer-Enhancing Adversarial Attacks from Vision Transformers via Spectral and Semantic Regularization

Add code
May 26, 2025
Viaarxiv icon

Breaking the Limits of Quantization-Aware Defenses: QADT-R for Robustness Against Patch-Based Adversarial Attacks in QNNs

Add code
Mar 10, 2025
Figure 1 for Breaking the Limits of Quantization-Aware Defenses: QADT-R for Robustness Against Patch-Based Adversarial Attacks in QNNs
Figure 2 for Breaking the Limits of Quantization-Aware Defenses: QADT-R for Robustness Against Patch-Based Adversarial Attacks in QNNs
Figure 3 for Breaking the Limits of Quantization-Aware Defenses: QADT-R for Robustness Against Patch-Based Adversarial Attacks in QNNs
Figure 4 for Breaking the Limits of Quantization-Aware Defenses: QADT-R for Robustness Against Patch-Based Adversarial Attacks in QNNs
Viaarxiv icon

Enhancing Mutual Trustworthiness in Federated Learning for Data-Rich Smart Cities

Add code
May 01, 2024
Figure 1 for Enhancing Mutual Trustworthiness in Federated Learning for Data-Rich Smart Cities
Figure 2 for Enhancing Mutual Trustworthiness in Federated Learning for Data-Rich Smart Cities
Figure 3 for Enhancing Mutual Trustworthiness in Federated Learning for Data-Rich Smart Cities
Figure 4 for Enhancing Mutual Trustworthiness in Federated Learning for Data-Rich Smart Cities
Viaarxiv icon

SSAP: A Shape-Sensitive Adversarial Patch for Comprehensive Disruption of Monocular Depth Estimation in Autonomous Navigation Applications

Add code
Mar 18, 2024
Figure 1 for SSAP: A Shape-Sensitive Adversarial Patch for Comprehensive Disruption of Monocular Depth Estimation in Autonomous Navigation Applications
Figure 2 for SSAP: A Shape-Sensitive Adversarial Patch for Comprehensive Disruption of Monocular Depth Estimation in Autonomous Navigation Applications
Figure 3 for SSAP: A Shape-Sensitive Adversarial Patch for Comprehensive Disruption of Monocular Depth Estimation in Autonomous Navigation Applications
Figure 4 for SSAP: A Shape-Sensitive Adversarial Patch for Comprehensive Disruption of Monocular Depth Estimation in Autonomous Navigation Applications
Viaarxiv icon

ODDR: Outlier Detection & Dimension Reduction Based Defense Against Adversarial Patches

Add code
Nov 20, 2023
Figure 1 for ODDR: Outlier Detection & Dimension Reduction Based Defense Against Adversarial Patches
Figure 2 for ODDR: Outlier Detection & Dimension Reduction Based Defense Against Adversarial Patches
Figure 3 for ODDR: Outlier Detection & Dimension Reduction Based Defense Against Adversarial Patches
Figure 4 for ODDR: Outlier Detection & Dimension Reduction Based Defense Against Adversarial Patches
Viaarxiv icon

Enhancing IoT Security via Automatic Network Traffic Analysis: The Transition from Machine Learning to Deep Learning

Add code
Nov 20, 2023
Figure 1 for Enhancing IoT Security via Automatic Network Traffic Analysis: The Transition from Machine Learning to Deep Learning
Figure 2 for Enhancing IoT Security via Automatic Network Traffic Analysis: The Transition from Machine Learning to Deep Learning
Figure 3 for Enhancing IoT Security via Automatic Network Traffic Analysis: The Transition from Machine Learning to Deep Learning
Figure 4 for Enhancing IoT Security via Automatic Network Traffic Analysis: The Transition from Machine Learning to Deep Learning
Viaarxiv icon

Physical Adversarial Attacks For Camera-based Smart Systems: Current Trends, Categorization, Applications, Research Challenges, and Future Outlook

Add code
Aug 11, 2023
Figure 1 for Physical Adversarial Attacks For Camera-based Smart Systems: Current Trends, Categorization, Applications, Research Challenges, and Future Outlook
Figure 2 for Physical Adversarial Attacks For Camera-based Smart Systems: Current Trends, Categorization, Applications, Research Challenges, and Future Outlook
Figure 3 for Physical Adversarial Attacks For Camera-based Smart Systems: Current Trends, Categorization, Applications, Research Challenges, and Future Outlook
Figure 4 for Physical Adversarial Attacks For Camera-based Smart Systems: Current Trends, Categorization, Applications, Research Challenges, and Future Outlook
Viaarxiv icon

SAAM: Stealthy Adversarial Attack on Monoculor Depth Estimation

Add code
Aug 06, 2023
Figure 1 for SAAM: Stealthy Adversarial Attack on Monoculor Depth Estimation
Figure 2 for SAAM: Stealthy Adversarial Attack on Monoculor Depth Estimation
Figure 3 for SAAM: Stealthy Adversarial Attack on Monoculor Depth Estimation
Figure 4 for SAAM: Stealthy Adversarial Attack on Monoculor Depth Estimation
Viaarxiv icon

An Incremental Gray-box Physical Adversarial Attack on Neural Network Training

Add code
Feb 20, 2023
Figure 1 for An Incremental Gray-box Physical Adversarial Attack on Neural Network Training
Figure 2 for An Incremental Gray-box Physical Adversarial Attack on Neural Network Training
Figure 3 for An Incremental Gray-box Physical Adversarial Attack on Neural Network Training
Viaarxiv icon

Harris Hawks Feature Selection in Distributed Machine Learning for Secure IoT Environments

Add code
Feb 20, 2023
Figure 1 for Harris Hawks Feature Selection in Distributed Machine Learning for Secure IoT Environments
Figure 2 for Harris Hawks Feature Selection in Distributed Machine Learning for Secure IoT Environments
Figure 3 for Harris Hawks Feature Selection in Distributed Machine Learning for Secure IoT Environments
Figure 4 for Harris Hawks Feature Selection in Distributed Machine Learning for Secure IoT Environments
Viaarxiv icon