no code implementations • 25 Apr 2023 • Aditya Pribadi Kalapaaking, Ibrahim Khalil, Mohammad Saidur Rahman, Mohammed Atiquzzaman, Xun Yi, Mahathir Almashor
In FL, local models can be tampered with by attackers.
no code implementations • 4 Sep 2022 • Arthur Wong, Alsharif Abuadbba, Mahathir Almashor, Salil Kanhere
We then reported our sites to VirusTotal and other platforms, with regular polling of results for 7 days, to ascertain the efficacy of each cloning technique.
no code implementations • 3 Apr 2022 • Alsharif Abuadbba, Shuo Wang, Mahathir Almashor, Muhammed Ejaz Ahmed, Raj Gaire, Seyit Camtepe, Surya Nepal
However, with an average of 10K phishing links reported per hour to platforms such as PhishTank and VirusTotal (VT), the deficiencies of such ML-based solutions are laid bare.
1 code implementation • 18 Feb 2022 • Reena Zelenkova, Jack Swallow, M. A. P. Chamikara, Dongxi Liu, Mohan Baruwal Chhetri, Seyit Camtepe, Marthie Grobler, Mahathir Almashor
Biometric data, such as face images, are often associated with sensitive information (e. g medical, financial, personal government records).
1 code implementation • 29 Aug 2021 • Mahathir Almashor, Ejaz Ahmed, Benjamin Pick, Sharif Abuadbba, Raj Gaire, Seyit Camtepe, Surya Nepal
Seemingly dissimilar URLs are being used in an organized way to perform phishing attacks and distribute malware.
no code implementations • 27 Jul 2020 • Chandra Thapa, Jun Wen Tang, Alsharif Abuadbba, Yansong Gao, Seyit Camtepe, Surya Nepal, Mahathir Almashor, Yifeng Zheng
For a fixed total email dataset, the global RNN based model suffers by a 1. 8% accuracy drop when increasing organizational counts from 2 to 10.