no code implementations • 5 Mar 2024 • Ehsan Nowroozi, Nada Jadalla, Samaneh Ghelichkhani, Alireza Jolfaei
We propose an innovative alarm system that detects the presence of poisoned labels and a defense mechanism designed to uncover the original class labels with the aim of mitigating backdoor attacks on ensemble tree classifiers.
1 code implementation • 5 Mar 2024 • Ehsan Nowroozi, Imran Haider, Rahim Taheri, Mauro Conti
In LF, we randomly flipped the labels of benign data and trained the model on the manipulated data.
no code implementations • 26 Oct 2023 • Ehsan Nowroozi, Samaneh Ghelichkhani, Imran Haider, Ali Dehghantanha
Convolutional neural networks (CNNs) models play a vital role in achieving state-of-the-art performances in various technological fields.
no code implementations • 6 Apr 2023 • Ehsan Nowroozi, Yoosef Habibi, Mauro Conti
To highlight the problems involved with the evaluation of the dataset's IRIS images, we conducted a large number of analyses employing Siamese Neural Networks to assess the similarities between genuine and synthetic human IRISes, such as ResNet50, Xception, VGG16, and MobileNet-v2.
no code implementations • 6 Mar 2023 • Ehsan Nowroozi, Seyedsadra Seyedshoari, Yassine Mekdad, Erkay Savas, Mauro Conti
Digital wallet as a software program or a digital device allows users to conduct various transactions.
no code implementations • 25 Sep 2022 • Ehsan Nowroozi, Mohammadreza Mohammadi, Erkay Savas, Mauro Conti, Yassine Mekdad
In this study, we present a novel architecture based on an ensemble classifier that combines the enhanced security of 1-Class classification (known as 1C) with the high performance of conventional 2-Class classification (known as 2C) in the absence of attacks. Our architecture is referred to as the 1. 5-Class (SPRITZ-1. 5C) classifier and constructed using a final dense classifier, one 2C classifier (i. e., CNNs), and two parallel 1C classifiers (i. e., auto-encoders).
1 code implementation • 11 Sep 2022 • Ehsan Nowroozi, Mohammadreza Mohammadi, Pargol Golmohammadi, Yassine Mekdad, Mauro Conti, Selcuk Uluagac
Our novel approach consists of changing the training strategy in the target network classifier and selecting random feature samples.
1 code implementation • 27 Apr 2022 • Ehsan Nowroozi, abhishek, Mohammadreza Mohammadi, Mauro Conti
In this study, we extract a novel set of lexical and web-scrapped features and employ machine learning technique to set up system for fraudulent advertisement URLs detection.
no code implementations • 25 Apr 2022 • Ehsan Nowroozi, Yassine Mekdad, Mauro Conti, Simone Milani, Selcuk Uluagac, Berrin Yanikoglu
Additionally, it enables users to employ a virtual background to conceal their own environment due to privacy concerns or to reduce distractions, particularly in professional settings.
no code implementations • 3 Mar 2022 • Ehsan Nowroozi, Mauro Conti, Yassine Mekdad
On the other hand, the recent development of GAN models may create high-quality face images without evidence of spatial artifacts.
no code implementations • 9 Oct 2021 • Ehsan Nowroozi, Yassine Mekdad, Mohammad Hajian Berenjestanaki, Mauro Conti, Abdeslam El Fergougui
In this paper, we provide the first comprehensive study which assesses the robustness of CNN-based models for computer networks against adversarial transferability.
no code implementations • 29 Jun 2021 • Mauro Conti, Simone Milani, Ehsan Nowroozi, Gabriele Orazi
On the other hand, users maybe want to fool people in the meeting by considering the virtual background to conceal where they are.
no code implementations • 1 Feb 2021 • Anselmo Ferreira, Ehsan Nowroozi, Mauro Barni
Motivated by this issue, we present a new dataset composed of a large number of synthetic and natural printed face images.
1 code implementation • 19 Oct 2020 • Ehsan Nowroozi, Ali Dehghantanha, Reza M. Parizi, Kim-Kwang Raymond Choo
Image forensic plays a crucial role in both criminal investigations (e. g., dissemination of fake images to spread racial hate or false narratives about specific ethnicity groups) and civil litigation (e. g., defamation).
no code implementations • 25 Jul 2020 • Mauro Barni, Kassem Kallas, Ehsan Nowroozi, Benedetta Tondi
Last-generation GAN models allow to generate synthetic images which are visually indistinguishable from natural ones, raising the need to develop tools to distinguish fake and natural images thus contributing to preserve the trustworthiness of digital images.
1 code implementation • 25 Oct 2019 • Mauro Barni, Ehsan Nowroozi, Benedetta Tondi, Bo-Wen Zhang
We investigate if the random feature selection approach proposed in [1] to improve the robustness of forensic detectors to targeted attacks, can be extended to detectors based on deep learning features.
1 code implementation • 5 Nov 2018 • Mauro Barni, Kassem Kallas, Ehsan Nowroozi, Benedetta Tondi
In this paper, we investigate if attack transferability also holds in image forensics applications.
Cryptography and Security
no code implementations • 29 May 2018 • Mauro Barni, Andrea Costanzo, Ehsan Nowroozi, Benedetta Tondi
Detection of contrast adjustments in the presence of JPEG postprocessing is known to be a challenging task.