Skip to main content

Showing 1–13 of 13 results for author: Abuhamad, M

  1. arXiv:2405.01963  [pdf, other

    cs.CR cs.AI cs.CV cs.LG

    From Attack to Defense: Insights into Deep Learning Security Measures in Black-Box Settings

    Authors: Firuz Juraev, Mohammed Abuhamad, Eric Chan-Tin, George K. Thiruvathukal, Tamer Abuhmed

    Abstract: Deep Learning (DL) is rapidly maturing to the point that it can be used in safety- and security-crucial applications. However, adversarial samples, which are undetectable to the human eye, pose a serious threat that can cause the model to misbehave and compromise the performance of such applications. Addressing the robustness of DL models has become crucial to understanding and defending against a… ▽ More

    Submitted 3 May, 2024; originally announced May 2024.

  2. arXiv:2405.01934  [pdf, other

    cs.CV cs.AI cs.CR cs.LG

    Impact of Architectural Modifications on Deep Learning Adversarial Robustness

    Authors: Firuz Juraev, Mohammed Abuhamad, Simon S. Woo, George K Thiruvathukal, Tamer Abuhmed

    Abstract: Rapid advancements of deep learning are accelerating adoption in a wide variety of applications, including safety-critical applications such as self-driving vehicles, drones, robots, and surveillance systems. These advancements include applying variations of sophisticated techniques that improve the performance of models. However, such models are not immune to adversarial manipulations, which can… ▽ More

    Submitted 3 May, 2024; originally announced May 2024.

  3. arXiv:2307.11906  [pdf, other

    cs.CV cs.CR cs.LG

    Unveiling Vulnerabilities in Interpretable Deep Learning Systems with Query-Efficient Black-box Attacks

    Authors: Eldor Abdukhamidov, Mohammed Abuhamad, Simon S. Woo, Eric Chan-Tin, Tamer Abuhmed

    Abstract: Deep learning has been rapidly employed in many applications revolutionizing many industries, but it is known to be vulnerable to adversarial attacks. Such attacks pose a serious threat to deep learning-based systems compromising their integrity, reliability, and trust. Interpretable Deep Learning Systems (IDLSes) are designed to make the system more transparent and explainable, but they are also… ▽ More

    Submitted 21 July, 2023; originally announced July 2023.

    Comments: arXiv admin note: text overlap with arXiv:2307.06496

  4. arXiv:2307.06496  [pdf, other

    cs.CV cs.AI cs.CR cs.LG

    Microbial Genetic Algorithm-based Black-box Attack against Interpretable Deep Learning Systems

    Authors: Eldor Abdukhamidov, Mohammed Abuhamad, Simon S. Woo, Eric Chan-Tin, Tamer Abuhmed

    Abstract: Deep learning models are susceptible to adversarial samples in white and black-box environments. Although previous studies have shown high attack success rates, coupling DNN models with interpretation models could offer a sense of security when a human expert is involved, who can identify whether a given sample is benign or malicious. However, in white-box environments, interpretable deep learning… ▽ More

    Submitted 12 July, 2023; originally announced July 2023.

  5. arXiv:2307.06484  [pdf, other

    cs.CV

    Single-Class Target-Specific Attack against Interpretable Deep Learning Systems

    Authors: Eldor Abdukhamidov, Mohammed Abuhamad, George K. Thiruvathukal, Hyoungshick Kim, Tamer Abuhmed

    Abstract: In this paper, we present a novel Single-class target-specific Adversarial attack called SingleADV. The goal of SingleADV is to generate a universal perturbation that deceives the target model into confusing a specific category of objects with a target category while ensuring highly relevant and accurate interpretations. The universal perturbation is stochastically and iteratively optimized by min… ▽ More

    Submitted 12 July, 2023; originally announced July 2023.

    Comments: 13 pages

  6. arXiv:2304.13255  [pdf, other

    cs.CR cs.CY cs.LG cs.SE

    SHIELD: Thwarting Code Authorship Attribution

    Authors: Mohammed Abuhamad, Changhun Jung, David Mohaisen, DaeHun Nyang

    Abstract: Authorship attribution has become increasingly accurate, posing a serious privacy risk for programmers who wish to remain anonymous. In this paper, we introduce SHIELD to examine the robustness of different code authorship attribution approaches against adversarial code examples. We define four attacks on attribution techniques, which include targeted and non-targeted attacks, and realize them usi… ▽ More

    Submitted 25 April, 2023; originally announced April 2023.

    Comments: 12 pages, 13 figures

  7. arXiv:2211.15926  [pdf, other

    cs.CR cs.CV cs.LG

    Interpretations Cannot Be Trusted: Stealthy and Effective Adversarial Perturbations against Interpretable Deep Learning

    Authors: Eldor Abdukhamidov, Mohammed Abuhamad, Simon S. Woo, Eric Chan-Tin, Tamer Abuhmed

    Abstract: Deep learning methods have gained increased attention in various applications due to their outstanding performance. For exploring how this high performance relates to the proper use of data artifacts and the accurate problem formulation of a given task, interpretation models have become a crucial component in developing deep learning-based systems. Interpretation models enable the understanding of… ▽ More

    Submitted 28 November, 2022; originally announced November 2022.

  8. arXiv:2103.14221  [pdf, other

    cs.CR

    ShellCore: Automating Malicious IoT Software Detection by Using Shell Commands Representation

    Authors: Hisham Alasmary, Afsah Anwar, Ahmed Abusnaina, Abdulrahman Alabduljabbar, Mohammad Abuhamad, An Wang, DaeHun Nyang, Amro Awad, David Mohaisen

    Abstract: The Linux shell is a command-line interpreter that provides users with a command interface to the operating system, allowing them to perform a variety of functions. Although very useful in building capabilities at the edge, the Linux shell can be exploited, giving adversaries a prime opportunity to use them for malicious activities. With access to IoT devices, malware authors can abuse the Linux s… ▽ More

    Submitted 25 March, 2021; originally announced March 2021.

  9. arXiv:2103.13032  [pdf, other

    cs.SI

    An Exploration of Geo-temporal Characteristics of Users' Reactions on Social Media During the Pandemic

    Authors: Eldor Abdukhamidov, Firuz Juraev, Mohammed Abuhamad, Tamer AbuHmed

    Abstract: During the outbreak of the COVID-19 pandemic, social networks become the preeminent medium for communication, social discussion, and entertainment. Social network users are regularly expressing their opinions about the impacts of the coronavirus pandemic. Therefore, social networks serve as a reliable source for studying the topics, emotions, and attitudes of users that are discussed during the pa… ▽ More

    Submitted 24 March, 2021; originally announced March 2021.

  10. arXiv:2103.09050  [pdf, other

    cs.CY cs.LG

    Hate, Obscenity, and Insults: Measuring the Exposure of Children to Inappropriate Comments in YouTube

    Authors: Sultan Alshamrani, Ahmed Abusnaina, Mohammed Abuhamad, Daehun Nyang, David Mohaisen

    Abstract: Social media has become an essential part of the daily routines of children and adolescents. Moreover, enormous efforts have been made to ensure the psychological and emotional well-being of young users as well as their safety when interacting with various social media platforms. In this paper, we investigate the exposure of those users to inappropriate comments posted on YouTube videos targeting… ▽ More

    Submitted 3 March, 2021; originally announced March 2021.

  11. arXiv:2005.07145  [pdf, other

    cs.CR

    A Deep Learning-based Fine-grained Hierarchical Learning Approach for Robust Malware Classification

    Authors: Ahmed Abusnaina, Mohammed Abuhamad, Hisham Alasmary, Afsah Anwar, Rhongho Jang, Saeed Salem, DaeHun Nyang, David Mohaisen

    Abstract: The wide acceptance of Internet of Things (IoT) for both household and industrial applications is accompanied by several security concerns. A major security concern is their probable abuse by adversaries towards their malicious intent. Understanding and analyzing IoT malicious behaviors is crucial, especially with their rapid growth and adoption in wide-range of applications. However, recent studi… ▽ More

    Submitted 15 May, 2020; v1 submitted 14 May, 2020; originally announced May 2020.

    Comments: 15 pages

  12. arXiv:2001.08578  [pdf, other

    cs.CR cs.HC cs.LG

    Sensor-based Continuous Authentication of Smartphones' Users Using Behavioral Biometrics: A Contemporary Survey

    Authors: Mohammed Abuhamad, Ahmed Abusnaina, DaeHun Nyang, David Mohaisen

    Abstract: Mobile devices and technologies have become increasingly popular, offering comparable storage and computational capabilities to desktop computers allowing users to store and interact with sensitive and private information. The security and protection of such personal information are becoming more and more important since mobile devices are vulnerable to unauthorized access or theft. User authentic… ▽ More

    Submitted 10 May, 2020; v1 submitted 23 January, 2020; originally announced January 2020.

    Comments: 19 pages

  13. arXiv:1910.01091  [pdf, other

    eess.IV cs.CV q-bio.QM

    W-Net: A CNN-based Architecture for White Blood Cells Image Classification

    Authors: Changhun Jung, Mohammed Abuhamad, Jumabek Alikhanov, Aziz Mohaisen, Kyungja Han, DaeHun Nyang

    Abstract: Computer-aided methods for analyzing white blood cells (WBC) have become widely popular due to the complexity of the manual process. Recent works have shown highly accurate segmentation and detection of white blood cells from microscopic blood images. However, the classification of the observed cells is still a challenge and highly demanded as the distribution of the five types reflects on the con… ▽ More

    Submitted 2 October, 2019; originally announced October 2019.