Picture for Mohammed Abuhamad

Mohammed Abuhamad

Impact of Architectural Modifications on Deep Learning Adversarial Robustness

Add code
May 03, 2024
Figure 1 for Impact of Architectural Modifications on Deep Learning Adversarial Robustness
Figure 2 for Impact of Architectural Modifications on Deep Learning Adversarial Robustness
Figure 3 for Impact of Architectural Modifications on Deep Learning Adversarial Robustness
Figure 4 for Impact of Architectural Modifications on Deep Learning Adversarial Robustness
Viaarxiv icon

From Attack to Defense: Insights into Deep Learning Security Measures in Black-Box Settings

Add code
May 03, 2024
Viaarxiv icon

Unveiling Vulnerabilities in Interpretable Deep Learning Systems with Query-Efficient Black-box Attacks

Add code
Jul 21, 2023
Viaarxiv icon

Microbial Genetic Algorithm-based Black-box Attack against Interpretable Deep Learning Systems

Add code
Jul 13, 2023
Viaarxiv icon

Single-Class Target-Specific Attack against Interpretable Deep Learning Systems

Add code
Jul 12, 2023
Viaarxiv icon

SHIELD: Thwarting Code Authorship Attribution

Add code
Apr 26, 2023
Viaarxiv icon

Interpretations Cannot Be Trusted: Stealthy and Effective Adversarial Perturbations against Interpretable Deep Learning

Add code
Nov 29, 2022
Viaarxiv icon

Hate, Obscenity, and Insults: Measuring the Exposure of Children to Inappropriate Comments in YouTube

Add code
Mar 03, 2021
Figure 1 for Hate, Obscenity, and Insults: Measuring the Exposure of Children to Inappropriate Comments in YouTube
Figure 2 for Hate, Obscenity, and Insults: Measuring the Exposure of Children to Inappropriate Comments in YouTube
Figure 3 for Hate, Obscenity, and Insults: Measuring the Exposure of Children to Inappropriate Comments in YouTube
Figure 4 for Hate, Obscenity, and Insults: Measuring the Exposure of Children to Inappropriate Comments in YouTube
Viaarxiv icon

Sensor-based Continuous Authentication of Smartphones' Users Using Behavioral Biometrics: A Survey

Add code
Jan 23, 2020
Figure 1 for Sensor-based Continuous Authentication of Smartphones' Users Using Behavioral Biometrics: A Survey
Figure 2 for Sensor-based Continuous Authentication of Smartphones' Users Using Behavioral Biometrics: A Survey
Figure 3 for Sensor-based Continuous Authentication of Smartphones' Users Using Behavioral Biometrics: A Survey
Figure 4 for Sensor-based Continuous Authentication of Smartphones' Users Using Behavioral Biometrics: A Survey
Viaarxiv icon

W-Net: A CNN-based Architecture for White Blood Cells Image Classification

Add code
Oct 02, 2019
Figure 1 for W-Net: A CNN-based Architecture for White Blood Cells Image Classification
Figure 2 for W-Net: A CNN-based Architecture for White Blood Cells Image Classification
Figure 3 for W-Net: A CNN-based Architecture for White Blood Cells Image Classification
Figure 4 for W-Net: A CNN-based Architecture for White Blood Cells Image Classification
Viaarxiv icon