Picture for Mohammad Shojafar

Mohammad Shojafar

Multi-Agent Context Learning Strategy for Interference-Aware Beam Allocation in mmWave Vehicular Communications

Add code
Jan 04, 2024
Viaarxiv icon

SETTI: A Self-supervised Adversarial Malware Detection Architecture in an IoT Environment

Add code
Apr 16, 2022
Figure 1 for SETTI: A Self-supervised Adversarial Malware Detection Architecture in an IoT Environment
Figure 2 for SETTI: A Self-supervised Adversarial Malware Detection Architecture in an IoT Environment
Figure 3 for SETTI: A Self-supervised Adversarial Malware Detection Architecture in an IoT Environment
Figure 4 for SETTI: A Self-supervised Adversarial Malware Detection Architecture in an IoT Environment
Viaarxiv icon

Deep Image: A precious image based deep learning method for online malware detection in IoT Environment

Add code
Apr 04, 2022
Figure 1 for Deep Image: A precious image based deep learning method for online malware detection in IoT Environment
Figure 2 for Deep Image: A precious image based deep learning method for online malware detection in IoT Environment
Figure 3 for Deep Image: A precious image based deep learning method for online malware detection in IoT Environment
Figure 4 for Deep Image: A precious image based deep learning method for online malware detection in IoT Environment
Viaarxiv icon

Similarity-based Android Malware Detection Using Hamming Distance of Static Binary Features

Add code
Aug 13, 2019
Figure 1 for Similarity-based Android Malware Detection Using Hamming Distance of Static Binary Features
Figure 2 for Similarity-based Android Malware Detection Using Hamming Distance of Static Binary Features
Figure 3 for Similarity-based Android Malware Detection Using Hamming Distance of Static Binary Features
Figure 4 for Similarity-based Android Malware Detection Using Hamming Distance of Static Binary Features
Viaarxiv icon

On Defending Against Label Flipping Attacks on Malware Detection Systems

Add code
Aug 13, 2019
Figure 1 for On Defending Against Label Flipping Attacks on Malware Detection Systems
Figure 2 for On Defending Against Label Flipping Attacks on Malware Detection Systems
Figure 3 for On Defending Against Label Flipping Attacks on Malware Detection Systems
Figure 4 for On Defending Against Label Flipping Attacks on Malware Detection Systems
Viaarxiv icon

Can Machine Learning Model with Static Features be Fooled: an Adversarial Machine Learning Approach

Add code
Apr 20, 2019
Figure 1 for Can Machine Learning Model with Static Features be Fooled: an Adversarial Machine Learning Approach
Figure 2 for Can Machine Learning Model with Static Features be Fooled: an Adversarial Machine Learning Approach
Figure 3 for Can Machine Learning Model with Static Features be Fooled: an Adversarial Machine Learning Approach
Figure 4 for Can Machine Learning Model with Static Features be Fooled: an Adversarial Machine Learning Approach
Viaarxiv icon

FeatureAnalytics: An approach to derive relevant attributes for analyzing Android Malware

Add code
Sep 17, 2018
Figure 1 for FeatureAnalytics: An approach to derive relevant attributes for analyzing Android Malware
Figure 2 for FeatureAnalytics: An approach to derive relevant attributes for analyzing Android Malware
Figure 3 for FeatureAnalytics: An approach to derive relevant attributes for analyzing Android Malware
Figure 4 for FeatureAnalytics: An approach to derive relevant attributes for analyzing Android Malware
Viaarxiv icon

Hybrid Genetic Algorithm for Cloud Computing Applications

Add code
Apr 22, 2014
Figure 1 for Hybrid Genetic Algorithm for Cloud Computing Applications
Figure 2 for Hybrid Genetic Algorithm for Cloud Computing Applications
Figure 3 for Hybrid Genetic Algorithm for Cloud Computing Applications
Figure 4 for Hybrid Genetic Algorithm for Cloud Computing Applications
Viaarxiv icon