Search Results for author: Mohammed Abuhamad

Found 8 papers, 2 papers with code

Unveiling Vulnerabilities in Interpretable Deep Learning Systems with Query-Efficient Black-box Attacks

no code implementations21 Jul 2023 Eldor Abdukhamidov, Mohammed Abuhamad, Simon S. Woo, Eric Chan-Tin, Tamer Abuhmed

Deep learning has been rapidly employed in many applications revolutionizing many industries, but it is known to be vulnerable to adversarial attacks.

Microbial Genetic Algorithm-based Black-box Attack against Interpretable Deep Learning Systems

no code implementations13 Jul 2023 Eldor Abdukhamidov, Mohammed Abuhamad, Simon S. Woo, Eric Chan-Tin, Tamer Abuhmed

Our results show that the proposed approach is query-efficient with a high attack success rate that can reach between 95% and 100% and transferability with an average success rate of 69% in the ImageNet and CIFAR datasets.

Single-Class Target-Specific Attack against Interpretable Deep Learning Systems

1 code implementation12 Jul 2023 Eldor Abdukhamidov, Mohammed Abuhamad, George K. Thiruvathukal, Hyoungshick Kim, Tamer Abuhmed

The universal perturbation is stochastically and iteratively optimized by minimizing the adversarial loss that is designed to consider both the classifier and interpreter costs in targeted and non-targeted categories.

Adversarial Attack

SHIELD: Thwarting Code Authorship Attribution

no code implementations26 Apr 2023 Mohammed Abuhamad, Changhun Jung, David Mohaisen, DaeHun Nyang

For the targeted attacks, we show the possibility of impersonating a programmer using targeted-adversarial perturbations with a success rate ranging from 66\% to 88\% for different authorship attribution techniques under several adversarial scenarios.

Authorship Attribution

Interpretations Cannot Be Trusted: Stealthy and Effective Adversarial Perturbations against Interpretable Deep Learning

no code implementations29 Nov 2022 Eldor Abdukhamidov, Mohammed Abuhamad, Simon S. Woo, Eric Chan-Tin, Tamer Abuhmed

We assess the effectiveness of proposed attacks against two deep learning model architectures coupled with four interpretation models that represent different categories of interpretation models.

Sensor-based Continuous Authentication of Smartphones' Users Using Behavioral Biometrics: A Contemporary Survey

no code implementations23 Jan 2020 Mohammed Abuhamad, Ahmed Abusnaina, DaeHun Nyang, David Mohaisen

This task is made possible with today's smartphones' embedded sensors that enable continuous and implicit user authentication by capturing behavioral biometrics and traits.

W-Net: A CNN-based Architecture for White Blood Cells Image Classification

1 code implementation2 Oct 2019 Changhun Jung, Mohammed Abuhamad, Jumabek Alikhanov, Aziz Mohaisen, Kyungja Han, DaeHun Nyang

Computer-aided methods for analyzing white blood cells (WBC) have become widely popular due to the complexity of the manual process.

Classification General Classification +1

Cannot find the paper you are looking for? You can Submit a new open access paper.