Search Results for author: MohammadReza Ebrahimi

Found 9 papers, 2 papers with code

Adversarially Robust Deep Learning with Optimal-Transport-Regularized Divergences

no code implementations7 Sep 2023 Jeremiah Birrell, MohammadReza Ebrahimi

We introduce the $ARMOR_D$ methods as novel approaches to enhancing the adversarial robustness of deep learning models.

Adversarial Robustness Malware Detection

Sequential Gradient Coding For Straggler Mitigation

no code implementations24 Nov 2022 M. Nikhil Krishnan, MohammadReza Ebrahimi, Ashish Khisti

In our second scheme, which constitutes our main contribution, we apply GC to a subset of the tasks and repetition for the remainder of the tasks.

Distributed Computing

Multi-view Representation Learning from Malware to Defend Against Adversarial Variants

no code implementations25 Oct 2022 James Lee Hu, MohammadReza Ebrahimi, Weifeng Li, Xin Li, Hsinchun Chen

This provides an opportunity for the defenders (i. e., malware detectors) to detect the adversarial variants by utilizing more than one view of a malware file (e. g., source code view in addition to the binary view).

Adversarial Robustness MULTI-VIEW LEARNING +1

Heterogeneous Domain Adaptation with Adversarial Neural Representation Learning: Experiments on E-Commerce and Cybersecurity

1 code implementation5 May 2022 MohammadReza Ebrahimi, Yidong Chai, Hao Helen Zhang, Hsinchun Chen

This incentivizes developing domain adaptation methods that leverage the knowledge in known domains (source) and adapt to new domains (target) with a different probability distribution.

Domain Adaptation Representation Learning

Single-Shot Black-Box Adversarial Attacks Against Malware Detectors: A Causal Language Model Approach

no code implementations3 Dec 2021 James Lee Hu, MohammadReza Ebrahimi, Hsinchun Chen

Given that most malware detectors enforce a query limit, this could result in generating non-realistic adversarial examples that are likely to be detected in practice due to lack of stealth.

Language Modelling

Automated PII Extraction from Social Media for Raising Privacy Awareness: A Deep Transfer Learning Approach

no code implementations11 Nov 2021 Yizhi Liu, Fang Yu Lin, MohammadReza Ebrahimi, Weifeng Li, Hsinchun Chen

While Information Extraction (IE) techniques can be used to extract the PII automatically, Deep Learning (DL)-based IE models alleviate the need for feature engineering and further improve the efficiency.

Embeddings Evaluation Feature Engineering +1

Binary Black-box Evasion Attacks Against Deep Learning-based Static Malware Detectors with Adversarial Byte-Level Language Model

1 code implementation14 Dec 2020 MohammadReza Ebrahimi, Ning Zhang, James Hu, Muhammad Taqi Raza, Hsinchun Chen

Recently, deep learning-based static anti-malware detectors have achieved success in identifying unseen attacks without requiring feature engineering and dynamic analysis.

Feature Engineering Language Modelling +1

Cannot find the paper you are looking for? You can Submit a new open access paper.