Picture for Mohamed Mahmoud

Mohamed Mahmoud

CORU: Comprehensive Post-OCR Parsing and Receipt Understanding Dataset

Add code
Jun 06, 2024
Viaarxiv icon

A Comprehensive Survey of Masked Faces: Recognition, Detection, and Unmasking

Add code
May 09, 2024
Viaarxiv icon

ArabicaQA: A Comprehensive Dataset for Arabic Question Answering

Add code
Mar 26, 2024
Viaarxiv icon

Advancements and Challenges in Arabic Optical Character Recognition: A Comprehensive Survey

Add code
Dec 19, 2023
Viaarxiv icon

Deep learning for table detection and structure recognition: A survey

Add code
Nov 15, 2022
Figure 1 for Deep learning for table detection and structure recognition: A survey
Figure 2 for Deep learning for table detection and structure recognition: A survey
Figure 3 for Deep learning for table detection and structure recognition: A survey
Figure 4 for Deep learning for table detection and structure recognition: A survey
Viaarxiv icon

Detection of False-Reading Attacks in the AMI Net-Metering System

Add code
Dec 02, 2020
Figure 1 for Detection of False-Reading Attacks in the AMI Net-Metering System
Figure 2 for Detection of False-Reading Attacks in the AMI Net-Metering System
Figure 3 for Detection of False-Reading Attacks in the AMI Net-Metering System
Figure 4 for Detection of False-Reading Attacks in the AMI Net-Metering System
Viaarxiv icon

On Sharing Models Instead of Data using Mimic learning for Smart Health Applications

Add code
Dec 24, 2019
Figure 1 for On Sharing Models Instead of Data using Mimic learning for Smart Health Applications
Figure 2 for On Sharing Models Instead of Data using Mimic learning for Smart Health Applications
Figure 3 for On Sharing Models Instead of Data using Mimic learning for Smart Health Applications
Figure 4 for On Sharing Models Instead of Data using Mimic learning for Smart Health Applications
Viaarxiv icon

Mimic Learning to Generate a Shareable Network Intrusion Detection Model

Add code
May 02, 2019
Figure 1 for Mimic Learning to Generate a Shareable Network Intrusion Detection Model
Figure 2 for Mimic Learning to Generate a Shareable Network Intrusion Detection Model
Figure 3 for Mimic Learning to Generate a Shareable Network Intrusion Detection Model
Figure 4 for Mimic Learning to Generate a Shareable Network Intrusion Detection Model
Viaarxiv icon

Deep Recurrent Electricity Theft Detection in AMI Networks with Random Tuning of Hyper-parameters

Add code
Sep 06, 2018
Figure 1 for Deep Recurrent Electricity Theft Detection in AMI Networks with Random Tuning of Hyper-parameters
Figure 2 for Deep Recurrent Electricity Theft Detection in AMI Networks with Random Tuning of Hyper-parameters
Figure 3 for Deep Recurrent Electricity Theft Detection in AMI Networks with Random Tuning of Hyper-parameters
Figure 4 for Deep Recurrent Electricity Theft Detection in AMI Networks with Random Tuning of Hyper-parameters
Viaarxiv icon

Multiple-Instance, Cascaded Classification for Keyword Spotting in Narrow-Band Audio

Add code
Nov 21, 2017
Figure 1 for Multiple-Instance, Cascaded Classification for Keyword Spotting in Narrow-Band Audio
Figure 2 for Multiple-Instance, Cascaded Classification for Keyword Spotting in Narrow-Band Audio
Viaarxiv icon