no code implementations • 26 Oct 2023 • Ehsan Nowroozi, Samaneh Ghelichkhani, Imran Haider, Ali Dehghantanha
Convolutional neural networks (CNNs) models play a vital role in achieving state-of-the-art performances in various technological fields.
no code implementations • 26 Nov 2022 • Amin Azmoodeh, Ali Dehghantanha
Afterward, we offer a solution that is capable of 1) making our AI systems robust against deepfakes during development and deployment phases; 2) detecting video, image, audio, and textual deepfakes; 3) identifying deepfakes that bypass detection (deepfake hunting); 4) leveraging available intelligence for timely identification of deepfake campaigns launched by state-sponsored hacking teams; 5) conducting in-depth forensic analysis of identified deepfake payloads.
1 code implementation • 19 Oct 2020 • Ehsan Nowroozi, Ali Dehghantanha, Reza M. Parizi, Kim-Kwang Raymond Choo
Image forensic plays a crucial role in both criminal investigations (e. g., dissemination of fake images to spread racial hate or false narratives about specific ethnicity groups) and civil litigation (e. g., defamation).
no code implementations • 2 May 2020 • Abdulrahman Al-Abassi, Hadis Karimipour, Ali Dehghantanha, Reza M. Parizi
The integration of communication networks and the Internet of Things (IoT) in Industrial Control Systems (ICSs) increases their vulnerability towards cyber-attacks, causing devastating outcomes.
no code implementations • 7 Jul 2019 • Jacob Sakhnini, Hadis Karimipour, Ali Dehghantanha
False Data Injection (FDI) attacks are a common form of Cyber-attack targetting smart grids.
1 code implementation • 3 Aug 2018 • Andrii Shalaginov, Sergii Banin, Ali Dehghantanha, Katrin Franke
Malware analysis and detection techniques have been evolving during the last decade as a reflection to development of different malware techniques to evade network-based and host-based security protections.
Cryptography and Security
no code implementations • 27 Jul 2018 • Mauro Conti, Ali Dehghantanha, Katrin Franke, Steve Watson
The Internet of Things (IoT) envisions pervasive, connected, and smart nodes interacting autonomously while offering all sorts of services.
Cryptography and Security
no code implementations • 27 Jul 2018 • James Baldwin, Omar M. K. Alhawi, Simone Shaughnessy, Alex Akinbi, Ali Dehghantanha
The emergence of cloud computing technologies has changed the way we store, retrieve, and archive our data.
Cryptography and Security
no code implementations • 27 Jul 2018 • Yee-Yang Teing, Ali Dehghantanha, Kim-Kwang Raymond Choo
The pervasive nature of cloud-enabled big data storage solutions introduces new challenges in the identification, collection, analysis, preservation and archiving of digital evidences.
Cryptography and Security
no code implementations • 26 Jul 2018 • Ben Blakeley, Chris Cooney, Ali Dehghantanha, Rob Aspin
This paper presents investigation of hubiC as one of popular cloud platforms running on Microsoft Windows 8. 1.
Cryptography and Security
no code implementations • 26 Jul 2018 • Yee-Yang Teing, Ali Dehghantanha, Kim-Kwang Raymond Choo
The issue of increasing volume, variety and velocity of has been an area of concern in cloud forensics.
Cryptography and Security
no code implementations • 15 Sep 2017 • Bernard Chukwuemeka Ogazi-Onyemaechi, Ali Dehghantanha, Kim-Kwang Raymond Choo
Recovering deleted or hidden data is among most important duties of forensics investigators.
Cryptography and Security
no code implementations • 15 Sep 2017 • Tooska Dargahi, Ali Dehghantanha, Mauro Conti
Voice over Internet Protocol (VoIP) applications (apps) provide convenient and low cost means for users to communicate and share information with each other in real-time.
Cryptography and Security
no code implementations • 25 Jun 2017 • M. Amine Chelihi, Akintunde Elutilo, Imran Ahmed, Christos Papadopoulos, Ali Dehghantanha
Many of these investigations include analysing data stored through cloud storage apps which contributes to importance of cloud apps forensics on mobile devices.
Cryptography and Security
no code implementations • 25 Jun 2017 • Lek Christopher, Kim-Kwang Raymond Choo, Ali Dehghantanha
This paper then examines how analysis of honeypot data can be used in employee information security awareness and education training.
Cryptography and Security Computers and Society