Search Results for author: DaeHun Nyang

Found 11 papers, 2 papers with code

Untargeted Code Authorship Evasion with Seq2Seq Transformation

no code implementations26 Nov 2023 Soohyeon Choi, RhongHo Jang, DaeHun Nyang, David Mohaisen

Code authorship attribution is the problem of identifying authors of programming language codes through the stylistic features in their codes, a topic that recently witnessed significant interest with outstanding performance.

Authorship Attribution Code Translation +1

SHIELD: Thwarting Code Authorship Attribution

no code implementations26 Apr 2023 Mohammed Abuhamad, Changhun Jung, David Mohaisen, DaeHun Nyang

For the targeted attacks, we show the possibility of impersonating a programmer using targeted-adversarial perturbations with a success rate ranging from 66\% to 88\% for different authorship attribution techniques under several adversarial scenarios.

Authorship Attribution

Robust Natural Language Processing: Recent Advances, Challenges, and Future Directions

no code implementations3 Jan 2022 marwan omar, Soohyeon Choi, DaeHun Nyang, David Mohaisen

Recent natural language processing (NLP) techniques have accomplished high performance on benchmark datasets, primarily due to the significant improvement in the performance of deep learning.

Sentiment Analysis speech-recognition +1

Generating Adversarial Examples with an Optimized Quality

no code implementations30 Jun 2020 Aminollah Khormali, DaeHun Nyang, David Mohaisen

However, deep learning models are vulnerable to Adversarial Examples (AEs), carefully crafted samples to deceive those models.

Adversarial Attack Computer Security

Sensor-based Continuous Authentication of Smartphones' Users Using Behavioral Biometrics: A Contemporary Survey

no code implementations23 Jan 2020 Mohammed Abuhamad, Ahmed Abusnaina, DaeHun Nyang, David Mohaisen

This task is made possible with today's smartphones' embedded sensors that enable continuous and implicit user authentication by capturing behavioral biometrics and traits.

W-Net: A CNN-based Architecture for White Blood Cells Image Classification

1 code implementation2 Oct 2019 Changhun Jung, Mohammed Abuhamad, Jumabek Alikhanov, Aziz Mohaisen, Kyungja Han, DaeHun Nyang

Computer-aided methods for analyzing white blood cells (WBC) have become widely popular due to the complexity of the manual process.

Classification General Classification +1

COPYCAT: Practical Adversarial Attacks on Visualization-Based Malware Detection

no code implementations20 Sep 2019 Aminollah Khormali, Ahmed Abusnaina, Songqing Chen, DaeHun Nyang, Aziz Mohaisen

Therefore, we proposed an approach to generate adversarial examples, COPYCAT, which is specifically designed for malware detection systems considering two main goals; achieving a high misclassification rate and maintaining the executability and functionality of the original input.

Adversarial Attack Malware Detection

Exploring the Attack Surface of Blockchain: A Systematic Overview

1 code implementation6 Apr 2019 Muhammad Saad, Jeffrey Spaulding, Laurent Njilla, Charles Kamhoua, Sachin Shetty, DaeHun Nyang, Aziz Mohaisen

In this paper, we systematically explore the attack surface of the Blockchain technology, with an emphasis on public Blockchains.

Cryptography and Security

A survey on deep packet inspection for intrusion detection systems

no code implementations1 Mar 2008 Tamer Abuhmed, Abedelaziz Mohaisen, DaeHun Nyang

Deep packet inspection is widely recognized as a powerful way which is used for intrusion detection systems for inspecting, deterring and deflecting malicious at- tacks over the network.

Intrusion Detection

Cannot find the paper you are looking for? You can Submit a new open access paper.