no code implementations • 7 Sep 2023 • Jeremiah Birrell, MohammadReza Ebrahimi
We introduce the $ARMOR_D$ methods as novel approaches to enhancing the adversarial robustness of deep learning models.
no code implementations • 24 Nov 2022 • M. Nikhil Krishnan, MohammadReza Ebrahimi, Ashish Khisti
In our second scheme, which constitutes our main contribution, we apply GC to a subset of the tasks and repetition for the remainder of the tasks.
no code implementations • 25 Oct 2022 • James Lee Hu, MohammadReza Ebrahimi, Weifeng Li, Xin Li, Hsinchun Chen
This provides an opportunity for the defenders (i. e., malware detectors) to detect the adversarial variants by utilizing more than one view of a malware file (e. g., source code view in addition to the binary view).
1 code implementation • 5 May 2022 • MohammadReza Ebrahimi, Yidong Chai, Hao Helen Zhang, Hsinchun Chen
This incentivizes developing domain adaptation methods that leverage the knowledge in known domains (source) and adapt to new domains (target) with a different probability distribution.
no code implementations • 8 Jan 2022 • Ning Zhang, MohammadReza Ebrahimi, Weifeng Li, Hsinchun Chen
In this study, we propose a novel framework for automated breaking of dark web CAPTCHA to facilitate dark web data collection.
no code implementations • 3 Dec 2021 • James Lee Hu, MohammadReza Ebrahimi, Hsinchun Chen
Given that most malware detectors enforce a query limit, this could result in generating non-realistic adversarial examples that are likely to be detected in practice due to lack of stealth.
no code implementations • 11 Nov 2021 • Yizhi Liu, Fang Yu Lin, MohammadReza Ebrahimi, Weifeng Li, Hsinchun Chen
While Information Extraction (IE) techniques can be used to extract the PII automatically, Deep Learning (DL)-based IE models alleviate the need for feature engineering and further improve the efficiency.
1 code implementation • 14 Dec 2020 • MohammadReza Ebrahimi, Ning Zhang, James Hu, Muhammad Taqi Raza, Hsinchun Chen
Recently, deep learning-based static anti-malware detectors have achieved success in identifying unseen attacks without requiring feature engineering and dynamic analysis.
no code implementations • 10 Jun 2020 • MohammadReza Ebrahimi, Navona Calarco, Kieran Campbell, Colin Hawco, Aristotle Voineskos, Ashish Khisti
Some recent work has implemented probabilistic models to extract a shared representation in task fMRI.