no code implementations • 21 Jul 2023 • Eldor Abdukhamidov, Mohammed Abuhamad, Simon S. Woo, Eric Chan-Tin, Tamer Abuhmed
Deep learning has been rapidly employed in many applications revolutionizing many industries, but it is known to be vulnerable to adversarial attacks.
no code implementations • 13 Jul 2023 • Eldor Abdukhamidov, Mohammed Abuhamad, Simon S. Woo, Eric Chan-Tin, Tamer Abuhmed
Our results show that the proposed approach is query-efficient with a high attack success rate that can reach between 95% and 100% and transferability with an average success rate of 69% in the ImageNet and CIFAR datasets.
1 code implementation • 12 Jul 2023 • Eldor Abdukhamidov, Mohammed Abuhamad, George K. Thiruvathukal, Hyoungshick Kim, Tamer Abuhmed
The universal perturbation is stochastically and iteratively optimized by minimizing the adversarial loss that is designed to consider both the classifier and interpreter costs in targeted and non-targeted categories.
no code implementations • 26 Apr 2023 • Mohammed Abuhamad, Changhun Jung, David Mohaisen, DaeHun Nyang
For the targeted attacks, we show the possibility of impersonating a programmer using targeted-adversarial perturbations with a success rate ranging from 66\% to 88\% for different authorship attribution techniques under several adversarial scenarios.
no code implementations • 29 Nov 2022 • Eldor Abdukhamidov, Mohammed Abuhamad, Simon S. Woo, Eric Chan-Tin, Tamer Abuhmed
We assess the effectiveness of proposed attacks against two deep learning model architectures coupled with four interpretation models that represent different categories of interpretation models.
no code implementations • 3 Mar 2021 • Sultan Alshamrani, Ahmed Abusnaina, Mohammed Abuhamad, DaeHun Nyang, David Mohaisen
Social media has become an essential part of the daily routines of children and adolescents.
no code implementations • 23 Jan 2020 • Mohammed Abuhamad, Ahmed Abusnaina, DaeHun Nyang, David Mohaisen
This task is made possible with today's smartphones' embedded sensors that enable continuous and implicit user authentication by capturing behavioral biometrics and traits.
1 code implementation • 2 Oct 2019 • Changhun Jung, Mohammed Abuhamad, Jumabek Alikhanov, Aziz Mohaisen, Kyungja Han, DaeHun Nyang
Computer-aided methods for analyzing white blood cells (WBC) have become widely popular due to the complexity of the manual process.