1 code implementation • 15 Oct 2023 • Andrew Naguib, Waleed A. Yousef, Issa Traoré, Mohammad Mamun
Recently, machine learning of the branch and bound algorithm has shown promise in approximating competent solutions to NP-hard problems.
1 code implementation • 31 Aug 2021 • Mohammad Mamun, Kevin Shi
To the best of knowledge this is the very first attempt of using recently introduced OpTC dataset for cyber threat detection.
1 code implementation • 5 Feb 2021 • William Briguglio, Parisa Moghaddam, Waleed A. Yousef, Issa Traore, Mohammad Mamun
Precision medicine is an emerging approach for disease treatment and prevention that delivers personalized care to individual patients by considering their genetic makeups, medical histories, environments, and lifestyles.
no code implementations • 8 Jan 2021 • Pulei Xiong, Scott Buffett, Shahrear Iqbal, Philippe Lamontagne, Mohammad Mamun, Heather Molyneaux
In this article, we present our recent systematic and comprehensive survey on the state-of-the-art ML robustness and trustworthiness from a security engineering perspective, focusing on the problems in system threat analysis, design and evaluation faced in developing practical machine learning applications, in terms of robustness and user trust.