Picture for Sharif Abuadbba

Sharif Abuadbba

Robust Anomaly Detection in O-RAN: Leveraging LLMs against Data Manipulation Attacks

Add code
Aug 11, 2025
Viaarxiv icon

Self-Adaptive and Robust Federated Spectrum Sensing without Benign Majority for Cellular Networks

Add code
Jul 16, 2025
Viaarxiv icon

RLSA-PFL: Robust Lightweight Secure Aggregation with Model Inconsistency Detection in Privacy-Preserving Federated Learning

Add code
Feb 13, 2025
Viaarxiv icon

Quantum Down Sampling Filter for Variational Auto-encoder

Add code
Jan 09, 2025
Viaarxiv icon

Security and Privacy of 6G Federated Learning-enabled Dynamic Spectrum Sharing

Add code
Jun 18, 2024
Figure 1 for Security and Privacy of 6G Federated Learning-enabled Dynamic Spectrum Sharing
Figure 2 for Security and Privacy of 6G Federated Learning-enabled Dynamic Spectrum Sharing
Figure 3 for Security and Privacy of 6G Federated Learning-enabled Dynamic Spectrum Sharing
Figure 4 for Security and Privacy of 6G Federated Learning-enabled Dynamic Spectrum Sharing
Viaarxiv icon

Contextual Chart Generation for Cyber Deception

Add code
Apr 07, 2024
Viaarxiv icon

Interpretability and Transparency-Driven Detection and Transformation of Textual Adversarial Examples (IT-DT)

Add code
Jul 03, 2023
Figure 1 for Interpretability and Transparency-Driven Detection and Transformation of Textual Adversarial Examples (IT-DT)
Figure 2 for Interpretability and Transparency-Driven Detection and Transformation of Textual Adversarial Examples (IT-DT)
Figure 3 for Interpretability and Transparency-Driven Detection and Transformation of Textual Adversarial Examples (IT-DT)
Figure 4 for Interpretability and Transparency-Driven Detection and Transformation of Textual Adversarial Examples (IT-DT)
Viaarxiv icon

Integrity Fingerprinting of DNN with Double Black-box Design and Verification

Add code
Mar 23, 2022
Figure 1 for Integrity Fingerprinting of DNN with Double Black-box Design and Verification
Figure 2 for Integrity Fingerprinting of DNN with Double Black-box Design and Verification
Figure 3 for Integrity Fingerprinting of DNN with Double Black-box Design and Verification
Figure 4 for Integrity Fingerprinting of DNN with Double Black-box Design and Verification
Viaarxiv icon

Characterizing Malicious URL Campaigns

Add code
Aug 29, 2021
Figure 1 for Characterizing Malicious URL Campaigns
Figure 2 for Characterizing Malicious URL Campaigns
Figure 3 for Characterizing Malicious URL Campaigns
Figure 4 for Characterizing Malicious URL Campaigns
Viaarxiv icon

Evaluation and Optimization of Distributed Machine Learning Techniques for Internet of Things

Add code
Mar 03, 2021
Figure 1 for Evaluation and Optimization of Distributed Machine Learning Techniques for Internet of Things
Figure 2 for Evaluation and Optimization of Distributed Machine Learning Techniques for Internet of Things
Figure 3 for Evaluation and Optimization of Distributed Machine Learning Techniques for Internet of Things
Figure 4 for Evaluation and Optimization of Distributed Machine Learning Techniques for Internet of Things
Viaarxiv icon