no code implementations • 4 Jan 2024 • Behnam Omidi, Khaled N. Khasawneh, Ihsen Alouani
We introduce a HT obfuscation (HTO) approach to allow HTs to bypass this detection method.
no code implementations • 5 Jan 2022 • Amira Guesmi, Khaled N. Khasawneh, Nael Abu-Ghazaleh, Ihsen Alouani
Thus, we propose ROOM, a novel Real-time Online-Offline attack construction Model where an offline component serves to warm up the online algorithm, making it possible to generate highly successful attacks under time constraints.
no code implementations • 11 Mar 2021 • Md Shohidul Islam, Ihsen Alouani, Khaled N. Khasawneh
Machine learning-based hardware malware detectors (HMDs) offer a potential game changing advantage in defending systems against malware.
no code implementations • 16 Jan 2020 • Farnaz Behnia, Ali Mirzaeian, Mohammad Sabokrou, Sai Manoj, Tinoosh Mohsenin, Khaled N. Khasawneh, Liang Zhao, Houman Homayoun, Avesta Sasan
In this paper, we propose Code-Bridged Classifier (CBC), a framework for making a Convolutional Neural Network (CNNs) robust against adversarial attacks without increasing or even by decreasing the overall models' computational complexity.