no code implementations • 9 Jan 2020 • Joohyung Jeon, Junhui Kim, Joongheon Kim, Kwangsoo Kim, Aziz Mohaisen, Jong-Kook Kim
This paper proposes a distributed deep learning framework for privacy-preserving medical data training.
1 code implementation • 2 Oct 2019 • Changhun Jung, Mohammed Abuhamad, Jumabek Alikhanov, Aziz Mohaisen, Kyungja Han, DaeHun Nyang
Computer-aided methods for analyzing white blood cells (WBC) have become widely popular due to the complexity of the manual process.
no code implementations • 20 Sep 2019 • Aminollah Khormali, Ahmed Abusnaina, Songqing Chen, DaeHun Nyang, Aziz Mohaisen
Therefore, we proposed an approach to generate adversarial examples, COPYCAT, which is specifically designed for malware detection systems considering two main goals; achieving a high misclassification rate and maintaining the executability and functionality of the original input.
1 code implementation • 6 Apr 2019 • Muhammad Saad, Jeffrey Spaulding, Laurent Njilla, Charles Kamhoua, Sachin Shetty, DaeHun Nyang, Aziz Mohaisen
In this paper, we systematically explore the attack surface of the Blockchain technology, with an emphasis on public Blockchains.
Cryptography and Security
no code implementations • 2 Mar 2019 • Hyunjae Kang, Jae-wook Jang, Aziz Mohaisen, Huy Kang Kim
Guided by this insight, we propose a method to improve on the performance of Android malware detection by incorporating the creator's information as a feature and classify malicious applications into similar groups.
Cryptography and Security
no code implementations • 12 Feb 2019 • Ahmed Abusnaina, Aminollah Khormali, Hisham Alasmary, Jeman Park, Afsah Anwar, Ulku Meteriz, Aziz Mohaisen
The main goal of this study is to investigate the robustness of graph-based Deep Learning (DL) models used for Internet of Things (IoT) malware classification against Adversarial Learning (AL).
no code implementations • 4 Jun 2016 • Jae-wook Jang, Jaesung Yun, Aziz Mohaisen, JiYoung Woo, Huy Kang Kim
Mass-market mobile security threats have increased recently due to the growth of mobile technologies and the popularity of mobile devices.
Cryptography and Security