no code implementations • 11 Aug 2022 • Ibrahim Yilmaz, Mahmoud Abouyoussef
Second, we construct a fully automated fingerprint feature extraction model using a one-shot learning approach to differentiate each fingerprint from the others in the fingerprint identification process.
no code implementations • 15 Jan 2021 • Ibrahim Yilmaz, Kavish Kapoor, Ambareen Siraj, Mahmoud Abouyoussef
Utilities around the world are reported to invest a total of around 30 billion over the next few years for installation of more than 300 million smart meters, replacing traditional analog meters [1].
no code implementations • 2 Jan 2021 • Ibrahim Yilmaz, Ambareen Siraj, Denis Ulybyshev
Additionally, we propose a new method using adversarial machine learning to generate never-before-seen malware-related domain families that can be used to illustrate the shortcomings of machine learning algorithms in this regard.
no code implementations • 23 Oct 2020 • Ibrahim Yilmaz, Ambareen Siraj
Detecting the occupancy of a home is straightforward with time of use information as there is a strong correlation between occupancy and electricity usage.
no code implementations • 27 Jan 2020 • Ibrahim Yilmaz
For instance; a benign sample can be modified as a malicious sample or a malicious one can be altered as benign while this modification can not be recognized by human observer.
no code implementations • 10 Dec 2019 • Ibrahim Yilmaz, Rahat Masum
Machine learning techniques help to understand patterns of a dataset to create a defense mechanism against cyber attacks.