Picture for Mahmoud Nabil

Mahmoud Nabil

Negative Selection Approach to support Formal Verification and Validation of BlackBox Models' Input Constraints

Add code
Sep 03, 2022
Figure 1 for Negative Selection Approach to support Formal Verification and Validation of BlackBox Models' Input Constraints
Figure 2 for Negative Selection Approach to support Formal Verification and Validation of BlackBox Models' Input Constraints
Figure 3 for Negative Selection Approach to support Formal Verification and Validation of BlackBox Models' Input Constraints
Figure 4 for Negative Selection Approach to support Formal Verification and Validation of BlackBox Models' Input Constraints
Viaarxiv icon

Enabling Content-Centric Device-to-Device Communication in the Millimeter-Wave Band

Add code
Apr 12, 2021
Figure 1 for Enabling Content-Centric Device-to-Device Communication in the Millimeter-Wave Band
Figure 2 for Enabling Content-Centric Device-to-Device Communication in the Millimeter-Wave Band
Figure 3 for Enabling Content-Centric Device-to-Device Communication in the Millimeter-Wave Band
Figure 4 for Enabling Content-Centric Device-to-Device Communication in the Millimeter-Wave Band
Viaarxiv icon

Mimic Learning to Generate a Shareable Network Intrusion Detection Model

Add code
May 02, 2019
Figure 1 for Mimic Learning to Generate a Shareable Network Intrusion Detection Model
Figure 2 for Mimic Learning to Generate a Shareable Network Intrusion Detection Model
Figure 3 for Mimic Learning to Generate a Shareable Network Intrusion Detection Model
Figure 4 for Mimic Learning to Generate a Shareable Network Intrusion Detection Model
Viaarxiv icon

Deep Recurrent Electricity Theft Detection in AMI Networks with Random Tuning of Hyper-parameters

Add code
Sep 06, 2018
Figure 1 for Deep Recurrent Electricity Theft Detection in AMI Networks with Random Tuning of Hyper-parameters
Figure 2 for Deep Recurrent Electricity Theft Detection in AMI Networks with Random Tuning of Hyper-parameters
Figure 3 for Deep Recurrent Electricity Theft Detection in AMI Networks with Random Tuning of Hyper-parameters
Figure 4 for Deep Recurrent Electricity Theft Detection in AMI Networks with Random Tuning of Hyper-parameters
Viaarxiv icon

Random Projection and Its Applications

Add code
Oct 09, 2017
Figure 1 for Random Projection and Its Applications
Figure 2 for Random Projection and Its Applications
Figure 3 for Random Projection and Its Applications
Viaarxiv icon

LABR: A Large Scale Arabic Sentiment Analysis Benchmark

Add code
May 03, 2015
Figure 1 for LABR: A Large Scale Arabic Sentiment Analysis Benchmark
Figure 2 for LABR: A Large Scale Arabic Sentiment Analysis Benchmark
Figure 3 for LABR: A Large Scale Arabic Sentiment Analysis Benchmark
Figure 4 for LABR: A Large Scale Arabic Sentiment Analysis Benchmark
Viaarxiv icon