Search Results for author: Tamer Abuhmed

Found 5 papers, 1 papers with code

Unveiling Vulnerabilities in Interpretable Deep Learning Systems with Query-Efficient Black-box Attacks

no code implementations21 Jul 2023 Eldor Abdukhamidov, Mohammed Abuhamad, Simon S. Woo, Eric Chan-Tin, Tamer Abuhmed

Deep learning has been rapidly employed in many applications revolutionizing many industries, but it is known to be vulnerable to adversarial attacks.

Microbial Genetic Algorithm-based Black-box Attack against Interpretable Deep Learning Systems

no code implementations13 Jul 2023 Eldor Abdukhamidov, Mohammed Abuhamad, Simon S. Woo, Eric Chan-Tin, Tamer Abuhmed

Our results show that the proposed approach is query-efficient with a high attack success rate that can reach between 95% and 100% and transferability with an average success rate of 69% in the ImageNet and CIFAR datasets.

Single-Class Target-Specific Attack against Interpretable Deep Learning Systems

1 code implementation12 Jul 2023 Eldor Abdukhamidov, Mohammed Abuhamad, George K. Thiruvathukal, Hyoungshick Kim, Tamer Abuhmed

The universal perturbation is stochastically and iteratively optimized by minimizing the adversarial loss that is designed to consider both the classifier and interpreter costs in targeted and non-targeted categories.

Adversarial Attack

Interpretations Cannot Be Trusted: Stealthy and Effective Adversarial Perturbations against Interpretable Deep Learning

no code implementations29 Nov 2022 Eldor Abdukhamidov, Mohammed Abuhamad, Simon S. Woo, Eric Chan-Tin, Tamer Abuhmed

We assess the effectiveness of proposed attacks against two deep learning model architectures coupled with four interpretation models that represent different categories of interpretation models.

A survey on deep packet inspection for intrusion detection systems

no code implementations1 Mar 2008 Tamer Abuhmed, Abedelaziz Mohaisen, DaeHun Nyang

Deep packet inspection is widely recognized as a powerful way which is used for intrusion detection systems for inspecting, deterring and deflecting malicious at- tacks over the network.

Intrusion Detection

Cannot find the paper you are looking for? You can Submit a new open access paper.