Search Results for author: Ibrahim Yilmaz

Found 6 papers, 0 papers with code

FIGO: Enhanced Fingerprint Identification Approach Using GAN and One Shot Learning Techniques

no code implementations11 Aug 2022 Ibrahim Yilmaz, Mahmoud Abouyoussef

Second, we construct a fully automated fingerprint feature extraction model using a one-shot learning approach to differentiate each fingerprint from the others in the fingerprint identification process.

Generative Adversarial Network One-Shot Learning

Privacy Protection of Grid Users Data with Blockchain and Adversarial Machine Learning

no code implementations15 Jan 2021 Ibrahim Yilmaz, Kavish Kapoor, Ambareen Siraj, Mahmoud Abouyoussef

Utilities around the world are reported to invest a total of around 30 billion over the next few years for installation of more than 300 million smart meters, replacing traditional analog meters [1].

BIG-bench Machine Learning

Improving DGA-Based Malicious Domain Classifiers for Malware Defense with Adversarial Machine Learning

no code implementations2 Jan 2021 Ibrahim Yilmaz, Ambareen Siraj, Denis Ulybyshev

Additionally, we propose a new method using adversarial machine learning to generate never-before-seen malware-related domain families that can be used to illustrate the shortcomings of machine learning algorithms in this regard.

BIG-bench Machine Learning Feature Engineering

Avoiding Occupancy Detection from Smart Meter using Adversarial Machine Learning

no code implementations23 Oct 2020 Ibrahim Yilmaz, Ambareen Siraj

Detecting the occupancy of a home is straightforward with time of use information as there is a strong correlation between occupancy and electricity usage.

BIG-bench Machine Learning Privacy Preserving

Practical Fast Gradient Sign Attack against Mammographic Image Classifier

no code implementations27 Jan 2020 Ibrahim Yilmaz

For instance; a benign sample can be modified as a malicious sample or a malicious one can be altered as benign while this modification can not be recognized by human observer.

Adversarial Attack Malware Detection +1

Expansion of Cyber Attack Data From Unbalanced Datasets Using Generative Techniques

no code implementations10 Dec 2019 Ibrahim Yilmaz, Rahat Masum

Machine learning techniques help to understand patterns of a dataset to create a defense mechanism against cyber attacks.

Cannot find the paper you are looking for? You can Submit a new open access paper.