Search Results for author: Bassem Ouni

Found 8 papers, 0 papers with code

SSAP: A Shape-Sensitive Adversarial Patch for Comprehensive Disruption of Monocular Depth Estimation in Autonomous Navigation Applications

no code implementations18 Mar 2024 Amira Guesmi, Muhammad Abdullah Hanif, Ihsen Alouani, Bassem Ouni, Muhammad Shafique

In this paper, we introduce SSAP (Shape-Sensitive Adversarial Patch), a novel approach designed to comprehensively disrupt monocular depth estimation (MDE) in autonomous navigation applications.

Autonomous Driving Autonomous Navigation +2

Enhancing IoT Security via Automatic Network Traffic Analysis: The Transition from Machine Learning to Deep Learning

no code implementations20 Nov 2023 Mounia Hamidouche, Eugeny Popko, Bassem Ouni

This work provides a comparative analysis illustrating how Deep Learning (DL) surpasses Machine Learning (ML) in addressing tasks within Internet of Things (IoT), such as attack classification and device-type identification.

Physical Adversarial Attacks For Camera-based Smart Systems: Current Trends, Categorization, Applications, Research Challenges, and Future Outlook

no code implementations11 Aug 2023 Amira Guesmi, Muhammad Abdullah Hanif, Bassem Ouni, Muhammed Shafique

Through this comprehensive survey, we aim to provide a valuable resource for researchers, practitioners, and policymakers to gain a holistic understanding of physical adversarial attacks in computer vision and facilitate the development of robust and secure DNN-based systems.

Adversarial Attack Depth Estimation +2

An Incremental Gray-box Physical Adversarial Attack on Neural Network Training

no code implementations20 Feb 2023 Rabiah Al-qudah, Moayad Aloqaily, Bassem Ouni, Mohsen Guizani, Thierry Lestable

Finally, the attack effectiveness property was concluded from the fact that it was able to flip the sign of the loss gradient in the conducted experiments to become positive, which indicated noisy and unstable training.

Adversarial Attack

Harris Hawks Feature Selection in Distributed Machine Learning for Secure IoT Environments

no code implementations20 Feb 2023 Neveen Hijazi, Moayad Aloqaily, Bassem Ouni, Fakhri Karray, Merouane Debbah

Although IoT applications are helpful in smart building applications, they present a real risk as the large number of interconnected devices in those buildings, using heterogeneous networks, increases the number of potential IoT attacks.

feature selection

Cannot find the paper you are looking for? You can Submit a new open access paper.