Picture for Mahmoud Nazzal

Mahmoud Nazzal

Demo: SGCode: A Flexible Prompt-Optimizing System for Secure Generation of Code

Add code
Sep 11, 2024
Figure 1 for Demo: SGCode: A Flexible Prompt-Optimizing System for Secure Generation of Code
Figure 2 for Demo: SGCode: A Flexible Prompt-Optimizing System for Secure Generation of Code
Figure 3 for Demo: SGCode: A Flexible Prompt-Optimizing System for Secure Generation of Code
Viaarxiv icon

Genetic Algorithm-Based Dynamic Backdoor Attack on Federated Learning-Based Network Traffic Classification

Add code
Sep 27, 2023
Figure 1 for Genetic Algorithm-Based Dynamic Backdoor Attack on Federated Learning-Based Network Traffic Classification
Figure 2 for Genetic Algorithm-Based Dynamic Backdoor Attack on Federated Learning-Based Network Traffic Classification
Figure 3 for Genetic Algorithm-Based Dynamic Backdoor Attack on Federated Learning-Based Network Traffic Classification
Figure 4 for Genetic Algorithm-Based Dynamic Backdoor Attack on Federated Learning-Based Network Traffic Classification
Viaarxiv icon

Multi-Instance Adversarial Attack on GNN-Based Malicious Domain Detection

Add code
Aug 22, 2023
Figure 1 for Multi-Instance Adversarial Attack on GNN-Based Malicious Domain Detection
Figure 2 for Multi-Instance Adversarial Attack on GNN-Based Malicious Domain Detection
Figure 3 for Multi-Instance Adversarial Attack on GNN-Based Malicious Domain Detection
Figure 4 for Multi-Instance Adversarial Attack on GNN-Based Malicious Domain Detection
Viaarxiv icon

Semi-decentralized Inference in Heterogeneous Graph Neural Networks for Traffic Demand Forecasting: An Edge-Computing Approach

Add code
Feb 28, 2023
Viaarxiv icon

Adversarial Attacks and Defenses for Social Network Text Processing Applications: Techniques, Challenges and Future Research Directions

Add code
Oct 26, 2021
Figure 1 for Adversarial Attacks and Defenses for Social Network Text Processing Applications: Techniques, Challenges and Future Research Directions
Figure 2 for Adversarial Attacks and Defenses for Social Network Text Processing Applications: Techniques, Challenges and Future Research Directions
Figure 3 for Adversarial Attacks and Defenses for Social Network Text Processing Applications: Techniques, Challenges and Future Research Directions
Figure 4 for Adversarial Attacks and Defenses for Social Network Text Processing Applications: Techniques, Challenges and Future Research Directions
Viaarxiv icon