Search Results for author: Mohammad Shojafar

Found 7 papers, 0 papers with code

SETTI: A Self-supervised Adversarial Malware Detection Architecture in an IoT Environment

no code implementations16 Apr 2022 Marjan Golmaryami, Rahim Taheri, Zahra Pooranian, Mohammad Shojafar, Pei Xiao

In the SETTI architecture, we design three self-supervised attack techniques, namely Self-MDS, GSelf-MDS and ASelf-MDS.

Malware Detection

On Defending Against Label Flipping Attacks on Malware Detection Systems

no code implementations13 Aug 2019 Rahim Taheri, Reza Javidan, Mohammad Shojafar, Zahra Pooranian, Ali Miri, Mauro Conti

Our evaluation shows that using random forest feature selection and varying ratios of features can result in an improvement of up to 19\% accuracy when compared with the state-of-the-art method in the literature.

Android Malware Detection BIG-bench Machine Learning +2

Can Machine Learning Model with Static Features be Fooled: an Adversarial Machine Learning Approach

no code implementations20 Apr 2019 Rahim Taheri, Reza Javidan, Mohammad Shojafar, Vinod P, Mauro Conti

We also test our methods using various classifier algorithms and compare them with the state-of-the-art data poisoning method using the Jacobian matrix.

BIG-bench Machine Learning Data Poisoning +1

Hybrid Genetic Algorithm for Cloud Computing Applications

no code implementations22 Apr 2014 Saeed Javanmardi, Mohammad Shojafar, Danilo Amendola, Nicola Cordeschi, Hongbo Liu, Ajith Abraham

In this paper with the aid of genetic algorithm and fuzzy theory, we present a hybrid job scheduling approach, which considers the load balancing of the system and reduces total execution time and execution cost.

Cannot find the paper you are looking for? You can Submit a new open access paper.