Search Results for author: Yassine Mekdad

Found 6 papers, 1 papers with code

Cryptocurrency wallets: assessment and security

no code implementations6 Mar 2023 Ehsan Nowroozi, Seyedsadra Seyedshoari, Yassine Mekdad, Erkay Savas, Mauro Conti

Digital wallet as a software program or a digital device allows users to conduct various transactions.

Employing Deep Ensemble Learning for Improving the Security of Computer Networks against Adversarial Attacks

no code implementations25 Sep 2022 Ehsan Nowroozi, Mohammadreza Mohammadi, Erkay Savas, Mauro Conti, Yassine Mekdad

In this study, we present a novel architecture based on an ensemble classifier that combines the enhanced security of 1-Class classification (known as 1C) with the high performance of conventional 2-Class classification (known as 2C) in the absence of attacks. Our architecture is referred to as the 1. 5-Class (SPRITZ-1. 5C) classifier and constructed using a final dense classifier, one 2C classifier (i. e., CNNs), and two parallel 1C classifiers (i. e., auto-encoders).

Ensemble Learning

Real or Virtual: A Video Conferencing Background Manipulation-Detection System

no code implementations25 Apr 2022 Ehsan Nowroozi, Yassine Mekdad, Mauro Conti, Simone Milani, Selcuk Uluagac, Berrin Yanikoglu

Additionally, it enables users to employ a virtual background to conceal their own environment due to privacy concerns or to reduce distractions, particularly in professional settings.

Detecting High-Quality GAN-Generated Face Images using Neural Networks

no code implementations3 Mar 2022 Ehsan Nowroozi, Mauro Conti, Yassine Mekdad

On the other hand, the recent development of GAN models may create high-quality face images without evidence of spatial artifacts.

Image Generation Vocal Bursts Intensity Prediction

Demystifying the Transferability of Adversarial Attacks in Computer Networks

no code implementations9 Oct 2021 Ehsan Nowroozi, Yassine Mekdad, Mohammad Hajian Berenjestanaki, Mauro Conti, Abdeslam El Fergougui

In this paper, we provide the first comprehensive study which assesses the robustness of CNN-based models for computer networks against adversarial transferability.

Breast Cancer Detection

Cannot find the paper you are looking for? You can Submit a new open access paper.