Picture for Ibrahim Yilmaz

Ibrahim Yilmaz

FIGO: Enhanced Fingerprint Identification Approach Using GAN and One Shot Learning Techniques

Add code
Aug 11, 2022
Figure 1 for FIGO: Enhanced Fingerprint Identification Approach Using GAN and One Shot Learning Techniques
Figure 2 for FIGO: Enhanced Fingerprint Identification Approach Using GAN and One Shot Learning Techniques
Figure 3 for FIGO: Enhanced Fingerprint Identification Approach Using GAN and One Shot Learning Techniques
Figure 4 for FIGO: Enhanced Fingerprint Identification Approach Using GAN and One Shot Learning Techniques
Viaarxiv icon

Privacy Protection of Grid Users Data with Blockchain and Adversarial Machine Learning

Add code
Jan 15, 2021
Figure 1 for Privacy Protection of Grid Users Data with Blockchain and Adversarial Machine Learning
Figure 2 for Privacy Protection of Grid Users Data with Blockchain and Adversarial Machine Learning
Viaarxiv icon

Improving DGA-Based Malicious Domain Classifiers for Malware Defense with Adversarial Machine Learning

Add code
Jan 02, 2021
Figure 1 for Improving DGA-Based Malicious Domain Classifiers for Malware Defense with Adversarial Machine Learning
Figure 2 for Improving DGA-Based Malicious Domain Classifiers for Malware Defense with Adversarial Machine Learning
Figure 3 for Improving DGA-Based Malicious Domain Classifiers for Malware Defense with Adversarial Machine Learning
Figure 4 for Improving DGA-Based Malicious Domain Classifiers for Malware Defense with Adversarial Machine Learning
Viaarxiv icon

Practical Fast Gradient Sign Attack against Mammographic Image Classifier

Add code
Jan 27, 2020
Figure 1 for Practical Fast Gradient Sign Attack against Mammographic Image Classifier
Figure 2 for Practical Fast Gradient Sign Attack against Mammographic Image Classifier
Figure 3 for Practical Fast Gradient Sign Attack against Mammographic Image Classifier
Figure 4 for Practical Fast Gradient Sign Attack against Mammographic Image Classifier
Viaarxiv icon

Expansion of Cyber Attack Data From Unbalanced Datasets Using Generative Techniques

Add code
Dec 10, 2019
Figure 1 for Expansion of Cyber Attack Data From Unbalanced Datasets Using Generative Techniques
Figure 2 for Expansion of Cyber Attack Data From Unbalanced Datasets Using Generative Techniques
Figure 3 for Expansion of Cyber Attack Data From Unbalanced Datasets Using Generative Techniques
Figure 4 for Expansion of Cyber Attack Data From Unbalanced Datasets Using Generative Techniques
Viaarxiv icon