1 code implementation • 4 Jan 2024 • Abdulkadir Kose, Haeyoung Lee, Chuan Heng Foh, Mohammad Shojafar
The use of mmWave for various applications including vehicular communications has been extensively discussed.
no code implementations • 16 Apr 2022 • Marjan Golmaryami, Rahim Taheri, Zahra Pooranian, Mohammad Shojafar, Pei Xiao
In the SETTI architecture, we design three self-supervised attack techniques, namely Self-MDS, GSelf-MDS and ASelf-MDS.
no code implementations • 4 Apr 2022 • Meysam Ghahramani, Rahim Taheri, Mohammad Shojafar, Reza Javidan, Shaohua Wan
In this way, a criterion is introduced that is used together with accuracy and FPR criteria for malware analysis in IoT environment.
no code implementations • 13 Aug 2019 • Rahim Taheri, Meysam Ghahramani, Reza Javidan, Mohammad Shojafar, Zahra Pooranian, Mauro Conti
We test our experiments in a different type of features: API, intent, and permission features on these three datasets.
no code implementations • 13 Aug 2019 • Rahim Taheri, Reza Javidan, Mohammad Shojafar, Zahra Pooranian, Ali Miri, Mauro Conti
Our evaluation shows that using random forest feature selection and varying ratios of features can result in an improvement of up to 19\% accuracy when compared with the state-of-the-art method in the literature.
no code implementations • 20 Apr 2019 • Rahim Taheri, Reza Javidan, Mohammad Shojafar, Vinod P, Mauro Conti
We also test our methods using various classifier algorithms and compare them with the state-of-the-art data poisoning method using the Jacobian matrix.
no code implementations • 17 Sep 2018 • Deepa K, Radhamani G, Vinod P, Mohammad Shojafar, Neeraj Kumar, Mauro Conti
Ever increasing number of Android malware, has always been a concern for cybersecurity professionals.
no code implementations • 22 Apr 2014 • Saeed Javanmardi, Mohammad Shojafar, Danilo Amendola, Nicola Cordeschi, Hongbo Liu, Ajith Abraham
In this paper with the aid of genetic algorithm and fuzzy theory, we present a hybrid job scheduling approach, which considers the load balancing of the system and reduces total execution time and execution cost.