Picture for Rahim Taheri

Rahim Taheri

Federated Learning Under Attack: Exposing Vulnerabilities through Data Poisoning Attacks in Computer Networks

Add code
Mar 05, 2024
Viaarxiv icon

UNBUS: Uncertainty-aware Deep Botnet Detection System in Presence of Perturbed Samples

Add code
Apr 28, 2022
Figure 1 for UNBUS: Uncertainty-aware Deep Botnet Detection System in Presence of Perturbed Samples
Figure 2 for UNBUS: Uncertainty-aware Deep Botnet Detection System in Presence of Perturbed Samples
Figure 3 for UNBUS: Uncertainty-aware Deep Botnet Detection System in Presence of Perturbed Samples
Figure 4 for UNBUS: Uncertainty-aware Deep Botnet Detection System in Presence of Perturbed Samples
Viaarxiv icon

SETTI: A Self-supervised Adversarial Malware Detection Architecture in an IoT Environment

Add code
Apr 16, 2022
Figure 1 for SETTI: A Self-supervised Adversarial Malware Detection Architecture in an IoT Environment
Figure 2 for SETTI: A Self-supervised Adversarial Malware Detection Architecture in an IoT Environment
Figure 3 for SETTI: A Self-supervised Adversarial Malware Detection Architecture in an IoT Environment
Figure 4 for SETTI: A Self-supervised Adversarial Malware Detection Architecture in an IoT Environment
Viaarxiv icon

Deep Image: A precious image based deep learning method for online malware detection in IoT Environment

Add code
Apr 04, 2022
Figure 1 for Deep Image: A precious image based deep learning method for online malware detection in IoT Environment
Figure 2 for Deep Image: A precious image based deep learning method for online malware detection in IoT Environment
Figure 3 for Deep Image: A precious image based deep learning method for online malware detection in IoT Environment
Figure 4 for Deep Image: A precious image based deep learning method for online malware detection in IoT Environment
Viaarxiv icon

Similarity-based Android Malware Detection Using Hamming Distance of Static Binary Features

Add code
Aug 13, 2019
Figure 1 for Similarity-based Android Malware Detection Using Hamming Distance of Static Binary Features
Figure 2 for Similarity-based Android Malware Detection Using Hamming Distance of Static Binary Features
Figure 3 for Similarity-based Android Malware Detection Using Hamming Distance of Static Binary Features
Figure 4 for Similarity-based Android Malware Detection Using Hamming Distance of Static Binary Features
Viaarxiv icon

On Defending Against Label Flipping Attacks on Malware Detection Systems

Add code
Aug 13, 2019
Figure 1 for On Defending Against Label Flipping Attacks on Malware Detection Systems
Figure 2 for On Defending Against Label Flipping Attacks on Malware Detection Systems
Figure 3 for On Defending Against Label Flipping Attacks on Malware Detection Systems
Figure 4 for On Defending Against Label Flipping Attacks on Malware Detection Systems
Viaarxiv icon

Can Machine Learning Model with Static Features be Fooled: an Adversarial Machine Learning Approach

Add code
Apr 20, 2019
Figure 1 for Can Machine Learning Model with Static Features be Fooled: an Adversarial Machine Learning Approach
Figure 2 for Can Machine Learning Model with Static Features be Fooled: an Adversarial Machine Learning Approach
Figure 3 for Can Machine Learning Model with Static Features be Fooled: an Adversarial Machine Learning Approach
Figure 4 for Can Machine Learning Model with Static Features be Fooled: an Adversarial Machine Learning Approach
Viaarxiv icon