Alert button
Picture for Mohammed Abuhamad

Mohammed Abuhamad

Alert button

From Attack to Defense: Insights into Deep Learning Security Measures in Black-Box Settings

Add code
Bookmark button
Alert button
May 03, 2024
Firuz Juraev, Mohammed Abuhamad, Eric Chan-Tin, George K. Thiruvathukal, Tamer Abuhmed

Viaarxiv icon

Impact of Architectural Modifications on Deep Learning Adversarial Robustness

Add code
Bookmark button
Alert button
May 03, 2024
Firuz Juraev, Mohammed Abuhamad, Simon S. Woo, George K Thiruvathukal, Tamer Abuhmed

Viaarxiv icon

Unveiling Vulnerabilities in Interpretable Deep Learning Systems with Query-Efficient Black-box Attacks

Add code
Bookmark button
Alert button
Jul 21, 2023
Eldor Abdukhamidov, Mohammed Abuhamad, Simon S. Woo, Eric Chan-Tin, Tamer Abuhmed

Figure 1 for Unveiling Vulnerabilities in Interpretable Deep Learning Systems with Query-Efficient Black-box Attacks
Figure 2 for Unveiling Vulnerabilities in Interpretable Deep Learning Systems with Query-Efficient Black-box Attacks
Figure 3 for Unveiling Vulnerabilities in Interpretable Deep Learning Systems with Query-Efficient Black-box Attacks
Viaarxiv icon

Microbial Genetic Algorithm-based Black-box Attack against Interpretable Deep Learning Systems

Add code
Bookmark button
Alert button
Jul 13, 2023
Eldor Abdukhamidov, Mohammed Abuhamad, Simon S. Woo, Eric Chan-Tin, Tamer Abuhmed

Figure 1 for Microbial Genetic Algorithm-based Black-box Attack against Interpretable Deep Learning Systems
Figure 2 for Microbial Genetic Algorithm-based Black-box Attack against Interpretable Deep Learning Systems
Figure 3 for Microbial Genetic Algorithm-based Black-box Attack against Interpretable Deep Learning Systems
Figure 4 for Microbial Genetic Algorithm-based Black-box Attack against Interpretable Deep Learning Systems
Viaarxiv icon

Single-Class Target-Specific Attack against Interpretable Deep Learning Systems

Add code
Bookmark button
Alert button
Jul 12, 2023
Eldor Abdukhamidov, Mohammed Abuhamad, George K. Thiruvathukal, Hyoungshick Kim, Tamer Abuhmed

Figure 1 for Single-Class Target-Specific Attack against Interpretable Deep Learning Systems
Figure 2 for Single-Class Target-Specific Attack against Interpretable Deep Learning Systems
Figure 3 for Single-Class Target-Specific Attack against Interpretable Deep Learning Systems
Figure 4 for Single-Class Target-Specific Attack against Interpretable Deep Learning Systems
Viaarxiv icon

SHIELD: Thwarting Code Authorship Attribution

Add code
Bookmark button
Alert button
Apr 26, 2023
Mohammed Abuhamad, Changhun Jung, David Mohaisen, DaeHun Nyang

Figure 1 for SHIELD: Thwarting Code Authorship Attribution
Figure 2 for SHIELD: Thwarting Code Authorship Attribution
Figure 3 for SHIELD: Thwarting Code Authorship Attribution
Figure 4 for SHIELD: Thwarting Code Authorship Attribution
Viaarxiv icon

Interpretations Cannot Be Trusted: Stealthy and Effective Adversarial Perturbations against Interpretable Deep Learning

Add code
Bookmark button
Alert button
Nov 29, 2022
Eldor Abdukhamidov, Mohammed Abuhamad, Simon S. Woo, Eric Chan-Tin, Tamer Abuhmed

Figure 1 for Interpretations Cannot Be Trusted: Stealthy and Effective Adversarial Perturbations against Interpretable Deep Learning
Figure 2 for Interpretations Cannot Be Trusted: Stealthy and Effective Adversarial Perturbations against Interpretable Deep Learning
Figure 3 for Interpretations Cannot Be Trusted: Stealthy and Effective Adversarial Perturbations against Interpretable Deep Learning
Figure 4 for Interpretations Cannot Be Trusted: Stealthy and Effective Adversarial Perturbations against Interpretable Deep Learning
Viaarxiv icon

Hate, Obscenity, and Insults: Measuring the Exposure of Children to Inappropriate Comments in YouTube

Add code
Bookmark button
Alert button
Mar 03, 2021
Sultan Alshamrani, Ahmed Abusnaina, Mohammed Abuhamad, Daehun Nyang, David Mohaisen

Figure 1 for Hate, Obscenity, and Insults: Measuring the Exposure of Children to Inappropriate Comments in YouTube
Figure 2 for Hate, Obscenity, and Insults: Measuring the Exposure of Children to Inappropriate Comments in YouTube
Figure 3 for Hate, Obscenity, and Insults: Measuring the Exposure of Children to Inappropriate Comments in YouTube
Figure 4 for Hate, Obscenity, and Insults: Measuring the Exposure of Children to Inappropriate Comments in YouTube
Viaarxiv icon

Sensor-based Continuous Authentication of Smartphones' Users Using Behavioral Biometrics: A Survey

Add code
Bookmark button
Alert button
Jan 23, 2020
Mohammed Abuhamad, Ahmed Abusnaina, DaeHun Nyang, David Mohaisen

Figure 1 for Sensor-based Continuous Authentication of Smartphones' Users Using Behavioral Biometrics: A Survey
Figure 2 for Sensor-based Continuous Authentication of Smartphones' Users Using Behavioral Biometrics: A Survey
Figure 3 for Sensor-based Continuous Authentication of Smartphones' Users Using Behavioral Biometrics: A Survey
Figure 4 for Sensor-based Continuous Authentication of Smartphones' Users Using Behavioral Biometrics: A Survey
Viaarxiv icon

W-Net: A CNN-based Architecture for White Blood Cells Image Classification

Add code
Bookmark button
Alert button
Oct 02, 2019
Changhun Jung, Mohammed Abuhamad, Jumabek Alikhanov, Aziz Mohaisen, Kyungja Han, DaeHun Nyang

Figure 1 for W-Net: A CNN-based Architecture for White Blood Cells Image Classification
Figure 2 for W-Net: A CNN-based Architecture for White Blood Cells Image Classification
Figure 3 for W-Net: A CNN-based Architecture for White Blood Cells Image Classification
Figure 4 for W-Net: A CNN-based Architecture for White Blood Cells Image Classification
Viaarxiv icon