no code implementations • 1 May 2024 • Osama Wehbi, Sarhad Arisdakessian, Mohsen Guizani, Omar Abdel Wahab, Azzam Mourad, Hadi Otrok, Hoda Al khzaimi, Bassem Ouni
Federated learning is a promising collaborative and privacy-preserving machine learning approach in data-rich smart cities.
no code implementations • 18 Mar 2024 • Amira Guesmi, Muhammad Abdullah Hanif, Ihsen Alouani, Bassem Ouni, Muhammad Shafique
In this paper, we introduce SSAP (Shape-Sensitive Adversarial Patch), a novel approach designed to comprehensively disrupt monocular depth estimation (MDE) in autonomous navigation applications.
no code implementations • 20 Nov 2023 • Nandish Chattopadhyay, Amira Guesmi, Muhammad Abdullah Hanif, Bassem Ouni, Muhammad Shafique
ODDR operates through a robust three-stage pipeline: Fragmentation, Segregation, and Neutralization.
no code implementations • 20 Nov 2023 • Mounia Hamidouche, Eugeny Popko, Bassem Ouni
This work provides a comparative analysis illustrating how Deep Learning (DL) surpasses Machine Learning (ML) in addressing tasks within Internet of Things (IoT), such as attack classification and device-type identification.
no code implementations • 11 Aug 2023 • Amira Guesmi, Muhammad Abdullah Hanif, Bassem Ouni, Muhammed Shafique
Through this comprehensive survey, we aim to provide a valuable resource for researchers, practitioners, and policymakers to gain a holistic understanding of physical adversarial attacks in computer vision and facilitate the development of robust and secure DNN-based systems.
no code implementations • 6 Aug 2023 • Amira Guesmi, Muhammad Abdullah Hanif, Bassem Ouni, Muhammad Shafique
In this paper, we investigate the vulnerability of MDE to adversarial patches.
no code implementations • 20 Feb 2023 • Rabiah Al-qudah, Moayad Aloqaily, Bassem Ouni, Mohsen Guizani, Thierry Lestable
Finally, the attack effectiveness property was concluded from the fact that it was able to flip the sign of the loss gradient in the conducted experiments to become positive, which indicated noisy and unstable training.
no code implementations • 20 Feb 2023 • Neveen Hijazi, Moayad Aloqaily, Bassem Ouni, Fakhri Karray, Merouane Debbah
Although IoT applications are helpful in smart building applications, they present a real risk as the large number of interconnected devices in those buildings, using heterogeneous networks, increases the number of potential IoT attacks.