Search Results for author: David Mohaisen

Found 16 papers, 0 papers with code

Untargeted Code Authorship Evasion with Seq2Seq Transformation

no code implementations26 Nov 2023 Soohyeon Choi, RhongHo Jang, DaeHun Nyang, David Mohaisen

Code authorship attribution is the problem of identifying authors of programming language codes through the stylistic features in their codes, a topic that recently witnessed significant interest with outstanding performance.

Authorship Attribution Code Translation +1

Burning the Adversarial Bridges: Robust Windows Malware Detection Against Binary-level Mutations

no code implementations5 Oct 2023 Ahmed Abusnaina, Yizhen Wang, Sunpreet Arora, Ke Wang, Mihai Christodorescu, David Mohaisen

Highlighting volatile information channels within the software, we introduce three software pre-processing steps to eliminate the attack surface, namely, padding removal, software stripping, and inter-section information resetting.

Malware Detection

SHIELD: Thwarting Code Authorship Attribution

no code implementations26 Apr 2023 Mohammed Abuhamad, Changhun Jung, David Mohaisen, DaeHun Nyang

For the targeted attacks, we show the possibility of impersonating a programmer using targeted-adversarial perturbations with a success rate ranging from 66\% to 88\% for different authorship attribution techniques under several adversarial scenarios.

Authorship Attribution

Analyzing In-browser Cryptojacking

no code implementations26 Apr 2023 Muhammad Saad, David Mohaisen

Cryptojacking is the permissionless use of a target device to covertly mine cryptocurrencies.

Learning Location from Shared Elevation Profiles in Fitness Apps: A Privacy Perspective

no code implementations27 Oct 2022 Ulku Meteriz-Yildiran, Necip Fazil Yildiran, Joongheon Kim, David Mohaisen

To preserve the privacy of users while allowing sharing, several of those platforms may allow users to disclose partial information, such as the elevation profile for an activity, which supposedly would not leak the location of the users.

Image Classification

Enriching Vulnerability Reports Through Automated and Augmented Description Summarization

no code implementations3 Oct 2022 Hattan Althebeiti, David Mohaisen

Security incidents and data breaches are increasing rapidly, and only a fraction of them is being reported.

Language Modelling

Self-Configurable Stabilized Real-Time Detection Learning for Autonomous Driving Applications

no code implementations29 Sep 2022 Won Joon Yun, Soohyun Park, Joongheon Kim, David Mohaisen

In addition, we demonstrate the self-configurable stabilized detection with YOLOv3-tiny and FlowNet2-S, which are the real-time object detection network and an optical flow estimation network, respectively.

Autonomous Driving Object +3

Robust Natural Language Processing: Recent Advances, Challenges, and Future Directions

no code implementations3 Jan 2022 marwan omar, Soohyeon Choi, DaeHun Nyang, David Mohaisen

Recent natural language processing (NLP) techniques have accomplished high performance on benchmark datasets, primarily due to the significant improvement in the performance of deep learning.

Sentiment Analysis speech-recognition +1

Automated Feature-Topic Pairing: Aligning Semantic and Embedding Spaces in Spatial Representation Learning

no code implementations22 Sep 2021 Dongjie Wang, Kunpeng Liu, David Mohaisen, Pengyang Wang, Chang-Tien Lu, Yanjie Fu

Texts of spatial entities, on the other hand, provide semantic understanding of latent feature labels, but is insensible to deep SRL models.

Representation Learning

Adversarial Example Detection Using Latent Neighborhood Graph

no code implementations ICCV 2021 Ahmed Abusnaina, Yuhang Wu, Sunpreet Arora, Yizhen Wang, Fei Wang, Hao Yang, David Mohaisen

We present the first graph-based adversarial detection method that constructs a Latent Neighborhood Graph (LNG) around an input example to determine if the input example is adversarial.

Adversarial Attack Graph Attention

On the Performance of Generative Adversarial Network (GAN) Variants: A Clinical Data Study

no code implementations21 Sep 2020 Jaesung Yoo, Jeman Park, An Wang, David Mohaisen, Joongheon Kim

Generative Adversarial Network (GAN) is a useful type of Neural Networks in various types of applications including generative models and feature extraction.

Generative Adversarial Network

Generating Adversarial Examples with an Optimized Quality

no code implementations30 Jun 2020 Aminollah Khormali, DaeHun Nyang, David Mohaisen

However, deep learning models are vulnerable to Adversarial Examples (AEs), carefully crafted samples to deceive those models.

Adversarial Attack Computer Security

Sensor-based Continuous Authentication of Smartphones' Users Using Behavioral Biometrics: A Contemporary Survey

no code implementations23 Jan 2020 Mohammed Abuhamad, Ahmed Abusnaina, DaeHun Nyang, David Mohaisen

This task is made possible with today's smartphones' embedded sensors that enable continuous and implicit user authentication by capturing behavioral biometrics and traits.

Computer Systems Have 99 Problems, Let's Not Make Machine Learning Another One

no code implementations28 Nov 2019 David Mohaisen, Songqing Chen

Machine learning techniques are finding many applications in computer systems, including many tasks that require decision making: network optimization, quality of service assurance, and security.

BIG-bench Machine Learning Decision Making

Cannot find the paper you are looking for? You can Submit a new open access paper.