Stebėti
Yassine Mekdad
Yassine Mekdad
Patvirtintas el. paštas fiu.edu - Pagrindinis puslapis
Pavadinimas
Cituota
Cituota
Metai
A survey on security and privacy issues of UAVs
Y Mekdad, A Aris, L Babun, A El Fergougui, M Conti, R Lazzeretti, ...
Computer Networks 224, 109626, 2023
1682023
Demystifying the transferability of adversarial attacks in computer networks
E Nowroozi, Y Mekdad, MH Berenjestanaki, M Conti, A El Fergougui
IEEE Transactions on Network and Service Management 19 (3), 3387-3400, 2022
382022
A threat model method for ICS malware: the TRISIS case
Y Mekdad, G Bernieri, M Conti, AE Fergougui
Proceedings of the 18th ACM International Conference on Computing Frontiers …, 2021
232021
Resisting deep learning models against adversarial attack transferability via feature randomization
E Nowroozi, M Mohammadi, P Golmohammadi, Y Mekdad, M Conti, ...
IEEE Transactions on Services Computing 17 (1), 18-29, 2023
172023
Detecting high-quality GAN-generated face images using neural networks
E Nowroozi, Y Mekdad
Big Data Analytics and Intelligent Systems for Cyber Threat Intelligence …, 2023
162023
Employing deep ensemble learning for improving the security of computer networks against adversarial attacks
E Nowroozi, M Mohammadi, E Savaş, Y Mekdad, M Conti
IEEE Transactions on Network and Service Management 20 (2), 2096-2105, 2023
15*2023
The rise of ICS malware: A comparative analysis
Y Mekdad, G Bernieri, M Conti, A El Fergougui
European Symposium on Research in Computer Security, 496-511, 2021
112021
A comprehensive security and performance assessment of UAV authentication schemes
Y Mekdad, A Aris, A Acar, M Conti, R Lazzeretti, AE Fergougui, S Uluagac
Security and Privacy 7 (1), e338, 2024
72024
Cryptocurrency wallets: Assessment and security
E Nowroozi, S Seyedshoari, Y Mekdad, E Savaş, M Conti
Blockchain for Cybersecurity in Cyber-Physical Systems, 1-19, 2022
62022
Exploring Jamming and Hijacking Attacks for Micro Aerial Drones
Y Mekdad, A Acar, A Aris, A El Fergougui, M Conti, R Lazzeretti, ...
ICC 2024-IEEE International Conference on Communications, 1939-1944, 2024
52024
On the robustness of image-based malware detection against adversarial attacks
Y Mekdad, F Naseem, A Aris, H Oz, A Acar, L Babun, S Uluagac, ...
Network Security Empowered by Artificial Intelligence, 355-375, 2024
32024
Enhancing cybersecurity education with artificial intelligence content
F Brito, Y Mekdad, M Ross, MA Finlayson, S Uluagac
Proceedings of the 56th ACM Technical Symposium on Computer Science …, 2025
2025
Real or virtual: a video conferencing background manipulation-detection system
E Nowroozi, Y Mekdad, M Conti, S Milani, S Uluagac
Multimedia Tools and Applications, 1-33, 2024
2024
Sistema negali atlikti operacijos. Bandykite vėliau dar kartą.
Straipsniai 1–13