Ehsan Nowroozi
YOU?
Author Swipe
View article: A Survey on Privacy and Security in Distributed Cloud Computing: Exploring Federated Learning and Beyond
A Survey on Privacy and Security in Distributed Cloud Computing: Exploring Federated Learning and Beyond Open
The increasing need to process large, high-dimensional datasets and the substantial computational power required have made the use of distributed cloud servers essential. These servers provide cost-effective solutions that make storage and…
View article: Real or virtual: a video conferencing background manipulation-detection system
Real or virtual: a video conferencing background manipulation-detection system Open
In the past few years, the popularity and wide use of video conferencing software enjoyed exponential growth in market size. This technology enables participants in different geographic regions to have a virtual face-to-face meeting. Addit…
View article: Verifying the Robustness of Machine Learning based Intrusion Detection Against Adversarial Perturbation
Verifying the Robustness of Machine Learning based Intrusion Detection Against Adversarial Perturbation Open
Neural networks (NNs) have been extensively adapted to various security tasks, such as spam detection, phishing, and intrusion detection. Particularly in IDS, NNs face significant vulnerabilities to adversarial attacks, where the adversary…
View article: Anomaly detection based on LSTM and autoencoders using federated learning in smart electric grid
Anomaly detection based on LSTM and autoencoders using federated learning in smart electric grid Open
In smart electric grid systems, various sensors and Internet of Things (IoT) devices are used to collect electrical data at substations. In a traditional system, a multitude of energy-related data from substations needs to be migrated to c…
View article: Mitigating Label Flipping Attacks in Malicious URL Detectors Using Ensemble Trees
Mitigating Label Flipping Attacks in Malicious URL Detectors Using Ensemble Trees Open
Malicious URLs provide adversarial opportunities across various industries, including transportation, healthcare, energy, and banking which could be detrimental to business operations. Consequently, the detection of these URLs is of crucia…
View article: Federated Learning Under Attack: Exposing Vulnerabilities through Data Poisoning Attacks in Computer Networks
Federated Learning Under Attack: Exposing Vulnerabilities through Data Poisoning Attacks in Computer Networks Open
Federated Learning (FL) is a machine learning (ML) approach that enables multiple decentralized devices or edge servers to collaboratively train a shared model without exchanging raw data. During the training and sharing of model updates b…
View article: Unscrambling the Rectification of Adversarial Attacks Transferability across Computer Networks
Unscrambling the Rectification of Adversarial Attacks Transferability across Computer Networks Open
Convolutional neural networks (CNNs) models play a vital role in achieving state-of-the-art performances in various technological fields. CNNs are not limited to Natural Language Processing (NLP) or Computer Vision (CV) but also have subst…
View article: Federated Learning Under Attack: Exposing Vulnerabilities through Data Poisoning Attacks in Computer Networks
Federated Learning Under Attack: Exposing Vulnerabilities through Data Poisoning Attacks in Computer Networks Open
Federated Learning (FL) is a machine learning (ML) approach that enables multiple decentralized devices or edge servers to collaboratively train a shared model without exchanging raw data. During the training and sharing of model updates b…
View article: Mitigating Label Flipping Attacks in Malicious URL Detectors Using Ensemble Trees
Mitigating Label Flipping Attacks in Malicious URL Detectors Using Ensemble Trees Open
Malicious URLs provide adversarial opportunities across various industries, including transportation, healthcare, energy, and banking which could be detrimental to business operations. Consequently, the detection of these URLs is of crucia…
View article: Unscrambling the Rectification of Adversarial Attacks Transferability across Computer Networks
Unscrambling the Rectification of Adversarial Attacks Transferability across Computer Networks Open
Convolutional neural networks (CNNs) models play a vital role in achieving state-of-the-art performances in various technological fields. CNNs are not limited to Natural Language Processing (NLP) or Computer Vision (CV) but also have subst…
View article: Balancing Privacy and Accuracy in Federated Learning for Speech Emotion Recognition
Balancing Privacy and Accuracy in Federated Learning for Speech Emotion Recognition Open
Context: Speech Emotion Recognition (SER) is a valuable technology that identifies human emotions from spoken language, enabling the development of context-aware and personalized intelligent systems. To protect user privacy, Federated Lear…
View article: Employing Deep Ensemble Learning for Improving the Security of Computer Networks Against Adversarial Attacks
Employing Deep Ensemble Learning for Improving the Security of Computer Networks Against Adversarial Attacks Open
In the past few years, Convolutional Neural Networks (CNN) have demonstrated promising performance in various real-world cybersecurity applications, such as network and multimedia security. However, the underlying fragility of CNN structur…
View article: Spritz-PS: Validation of Synthetic Face Images Using a Large Dataset of Printed Documents
Spritz-PS: Validation of Synthetic Face Images Using a Large Dataset of Printed Documents Open
The capability of doing effective forensic analysis on printed and scanned (PS) images is essential in many applications. PS documents may be used to conceal the artifacts of images which is due to the synthetic nature of images since thes…
View article: Cryptocurrency wallets: assessment and security
Cryptocurrency wallets: assessment and security Open
Digital wallet as a software program or a digital device allows users to conduct various transactions. Hot and cold digital wallets are considered as two types of this wallet. Digital wallets need an online connection fall into the first g…
View article: Employing Deep Ensemble Learning for Improving the Security of Computer Networks against Adversarial Attacks
Employing Deep Ensemble Learning for Improving the Security of Computer Networks against Adversarial Attacks Open
In the past few years, Convolutional Neural Networks (CNN) have demonstrated promising performance in various real-world cybersecurity applications, such as network and multimedia security. However, the underlying fragility of CNN structur…
View article: Resisting Deep Learning Models Against Adversarial Attack Transferability via Feature Randomization
Resisting Deep Learning Models Against Adversarial Attack Transferability via Feature Randomization Open
In the past decades, the rise of artificial intelligence has given us the capabilities to solve the most challenging problems in our day-to-day lives, such as cancer prediction and autonomous navigation. However, these applications might n…
View article: An Adversarial Attack Analysis on Malicious Advertisement URL Detection Framework
An Adversarial Attack Analysis on Malicious Advertisement URL Detection Framework Open
Malicious advertisement URLs pose a security risk since they are the source of cyber-attacks, and the need to address this issue is growing in both industry and academia. Generally, the attacker delivers an attack vector to the user by mea…
View article: Real or Virtual: A Video Conferencing Background Manipulation-Detection System
Real or Virtual: A Video Conferencing Background Manipulation-Detection System Open
Recently, the popularity and wide use of the last-generation video conferencing technologies created an exponential growth in its market size. Such technology allows participants in different geographic regions to have a virtual face-to-fa…
View article: Defeating Adversarial Attacks Againt Adversarial attacks in Network Security
Defeating Adversarial Attacks Againt Adversarial attacks in Network Security Open
We investigate if the feature randomization approach to improve the robustness of forensic detectors to targeted attacks in network security, can be extended to detectors based on deep learning features. In particular, we study the transfe…
View article: Defeating Adversarial Attacks Againt Adversarial attacks in Network Security
Defeating Adversarial Attacks Againt Adversarial attacks in Network Security Open
We investigate if the feature randomization approach to improve the robustness of forensic detectors to targeted attacks in network security, can be extended to detectors based on deep learning features. In particular, we study the transfe…
View article: Detecting High-Quality GAN-Generated Face Images using Neural Networks
Detecting High-Quality GAN-Generated Face Images using Neural Networks Open
In the past decades, the excessive use of the last-generation GAN (Generative Adversarial Networks) models in computer vision has enabled the creation of artificial face images that are visually indistinguishable from genuine ones. These i…
View article: Dataset for Real and Virtual Backgrounds of Video Calls
Dataset for Real and Virtual Backgrounds of Video Calls Open
Video conferencing applications play an important role in our day-to-day life. They enable people to meet, work, and collaborate remotely, especially in circumstances where physical meetings are not possible (e.g., pandemic scenarios, long…
View article: Dataset for Real and Virtual Backgrounds of Video Calls
Dataset for Real and Virtual Backgrounds of Video Calls Open
Video conferencing applications play an important role in our day-to-day life. They enable people to meet, work, and collaborate remotely, especially in circumstances where physical meetings are not possible (e.g., pandemic scenarios, long…
View article: Demystifying the Transferability of Adversarial Attacks in Computer Networks
Demystifying the Transferability of Adversarial Attacks in Computer Networks Open
Convolutional Neural Networks (CNNs) models are one of the most frequently used deep learning networks, and extensively used in both academia and industry. Recent studies demonstrated that adversarial attacks against such models can mainta…
View article: Do Not Deceive Your Employer with a Virtual Background: A Video Conferencing Manipulation-Detection System
Do Not Deceive Your Employer with a Virtual Background: A Video Conferencing Manipulation-Detection System Open
The last-generation video conferencing software allows users to utilize a virtual background to conceal their personal environment due to privacy concerns, especially in official meetings with other employers. On the other hand, users mayb…
View article: VIPPrint: Validating Synthetic Image Detection and Source Linking Methods on a Large Scale Dataset of Printed Documents
VIPPrint: Validating Synthetic Image Detection and Source Linking Methods on a Large Scale Dataset of Printed Documents Open
The possibility of carrying out a meaningful forensic analysis on printed and scanned images plays a major role in many applications. First of all, printed documents are often associated with criminal activities, such as terrorist plans, c…
View article: VIPPrint: A Large Scale Dataset of Printed and Scanned Images for Synthetic Face Images Detection and Source Linking
VIPPrint: A Large Scale Dataset of Printed and Scanned Images for Synthetic Face Images Detection and Source Linking Open
The possibility of carrying out a meaningful forensics analysis on printed and scanned images plays a major role in many applications. First of all, printed documents are often associated with criminal activities, such as terrorist plans, …
View article: VIPPrint: A Large Scale Dataset for Colored Printed Documents Authentication and Source Linking
VIPPrint: A Large Scale Dataset for Colored Printed Documents Authentication and Source Linking Open
The possibility of carrying out a meaningful forensics analysis on printed and scanned images plays a major role in many applications. First of all, printed documents are often associated with criminal activities, such as terrorist plans, …