Search Results for author: Ehsan Nowroozi

Found 18 papers, 6 papers with code

Mitigating Label Flipping Attacks in Malicious URL Detectors Using Ensemble Trees

no code implementations5 Mar 2024 Ehsan Nowroozi, Nada Jadalla, Samaneh Ghelichkhani, Alireza Jolfaei

We propose an innovative alarm system that detects the presence of poisoned labels and a defense mechanism designed to uncover the original class labels with the aim of mitigating backdoor attacks on ensemble tree classifiers.

Unscrambling the Rectification of Adversarial Attacks Transferability across Computer Networks

no code implementations26 Oct 2023 Ehsan Nowroozi, Samaneh Ghelichkhani, Imran Haider, Ali Dehghantanha

Convolutional neural networks (CNNs) models play a vital role in achieving state-of-the-art performances in various technological fields.

Spritz-PS: Validation of Synthetic Face Images Using a Large Dataset of Printed Documents

no code implementations6 Apr 2023 Ehsan Nowroozi, Yoosef Habibi, Mauro Conti

To highlight the problems involved with the evaluation of the dataset's IRIS images, we conducted a large number of analyses employing Siamese Neural Networks to assess the similarities between genuine and synthetic human IRISes, such as ResNet50, Xception, VGG16, and MobileNet-v2.

Cryptocurrency wallets: assessment and security

no code implementations6 Mar 2023 Ehsan Nowroozi, Seyedsadra Seyedshoari, Yassine Mekdad, Erkay Savas, Mauro Conti

Digital wallet as a software program or a digital device allows users to conduct various transactions.

Employing Deep Ensemble Learning for Improving the Security of Computer Networks against Adversarial Attacks

no code implementations25 Sep 2022 Ehsan Nowroozi, Mohammadreza Mohammadi, Erkay Savas, Mauro Conti, Yassine Mekdad

In this study, we present a novel architecture based on an ensemble classifier that combines the enhanced security of 1-Class classification (known as 1C) with the high performance of conventional 2-Class classification (known as 2C) in the absence of attacks. Our architecture is referred to as the 1. 5-Class (SPRITZ-1. 5C) classifier and constructed using a final dense classifier, one 2C classifier (i. e., CNNs), and two parallel 1C classifiers (i. e., auto-encoders).

Ensemble Learning

An Adversarial Attack Analysis on Malicious Advertisement URL Detection Framework

1 code implementation27 Apr 2022 Ehsan Nowroozi, abhishek, Mohammadreza Mohammadi, Mauro Conti

In this study, we extract a novel set of lexical and web-scrapped features and employ machine learning technique to set up system for fraudulent advertisement URLs detection.

Adversarial Attack

Real or Virtual: A Video Conferencing Background Manipulation-Detection System

no code implementations25 Apr 2022 Ehsan Nowroozi, Yassine Mekdad, Mauro Conti, Simone Milani, Selcuk Uluagac, Berrin Yanikoglu

Additionally, it enables users to employ a virtual background to conceal their own environment due to privacy concerns or to reduce distractions, particularly in professional settings.

Detecting High-Quality GAN-Generated Face Images using Neural Networks

no code implementations3 Mar 2022 Ehsan Nowroozi, Mauro Conti, Yassine Mekdad

On the other hand, the recent development of GAN models may create high-quality face images without evidence of spatial artifacts.

Image Generation Vocal Bursts Intensity Prediction

Demystifying the Transferability of Adversarial Attacks in Computer Networks

no code implementations9 Oct 2021 Ehsan Nowroozi, Yassine Mekdad, Mohammad Hajian Berenjestanaki, Mauro Conti, Abdeslam El Fergougui

In this paper, we provide the first comprehensive study which assesses the robustness of CNN-based models for computer networks against adversarial transferability.

Breast Cancer Detection

Do Not Deceive Your Employer with a Virtual Background: A Video Conferencing Manipulation-Detection System

no code implementations29 Jun 2021 Mauro Conti, Simone Milani, Ehsan Nowroozi, Gabriele Orazi

On the other hand, users maybe want to fool people in the meeting by considering the virtual background to conceal where they are.

A Survey of Machine Learning Techniques in Adversarial Image Forensics

1 code implementation19 Oct 2020 Ehsan Nowroozi, Ali Dehghantanha, Reza M. Parizi, Kim-Kwang Raymond Choo

Image forensic plays a crucial role in both criminal investigations (e. g., dissemination of fake images to spread racial hate or false narratives about specific ethnicity groups) and civil litigation (e. g., defamation).

BIG-bench Machine Learning Image Forensics

CNN Detection of GAN-Generated Face Images based on Cross-Band Co-occurrences Analysis

no code implementations25 Jul 2020 Mauro Barni, Kassem Kallas, Ehsan Nowroozi, Benedetta Tondi

Last-generation GAN models allow to generate synthetic images which are visually indistinguishable from natural ones, raising the need to develop tools to distinguish fake and natural images thus contributing to preserve the trustworthiness of digital images.

Effectiveness of random deep feature selection for securing image manipulation detectors against adversarial examples

1 code implementation25 Oct 2019 Mauro Barni, Ehsan Nowroozi, Benedetta Tondi, Bo-Wen Zhang

We investigate if the random feature selection approach proposed in [1] to improve the robustness of forensic detectors to targeted attacks, can be extended to detectors based on deep learning features.

feature selection Image Manipulation +1

On the Transferability of Adversarial Examples Against CNN-Based Image Forensics

1 code implementation5 Nov 2018 Mauro Barni, Kassem Kallas, Ehsan Nowroozi, Benedetta Tondi

In this paper, we investigate if attack transferability also holds in image forensics applications.

Cryptography and Security

CNN-Based Detection of Generic Constrast Adjustment with JPEG Post-processing

no code implementations29 May 2018 Mauro Barni, Andrea Costanzo, Ehsan Nowroozi, Benedetta Tondi

Detection of contrast adjustments in the presence of JPEG postprocessing is known to be a challenging task.

Cannot find the paper you are looking for? You can Submit a new open access paper.