关注
Yassine Mekdad
Yassine Mekdad
在 fiu.edu 的电子邮件经过验证 - 首页
标题
引用次数
引用次数
年份
A survey on security and privacy issues of UAVs
Y Mekdad, A Aris, L Babun, A El Fergougui, M Conti, R Lazzeretti, ...
Computer Networks 224, 109626, 2023
1642023
Demystifying the transferability of adversarial attacks in computer networks
E Nowroozi, Y Mekdad, MH Berenjestanaki, M Conti, A El Fergougui
IEEE Transactions on Network and Service Management 19 (3), 3387-3400, 2022
372022
A threat model method for ICS malware: the TRISIS case
Y Mekdad, G Bernieri, M Conti, AE Fergougui
Proceedings of the 18th ACM International Conference on Computing Frontiers …, 2021
202021
Detecting high-quality GAN-generated face images using neural networks
E Nowroozi, Y Mekdad
Big Data Analytics and Intelligent Systems for Cyber Threat Intelligence …, 2023
162023
Resisting deep learning models against adversarial attack transferability via feature randomization
E Nowroozi, M Mohammadi, P Golmohammadi, Y Mekdad, M Conti, ...
IEEE Transactions on Services Computing 17 (1), 18-29, 2023
152023
Employing deep ensemble learning for improving the security of computer networks against adversarial attacks
E Nowroozi, M Mohammadi, E Savaş, Y Mekdad, M Conti
IEEE Transactions on Network and Service Management 20 (2), 2096-2105, 2023
14*2023
The rise of ICS malware: A comparative analysis
Y Mekdad, G Bernieri, M Conti, A El Fergougui
European Symposium on Research in Computer Security, 496-511, 2021
102021
Cryptocurrency wallets: assessment and security
E Nowroozi, S Seyedshoari, Y Mekdad, E Savaş, M Conti
Blockchain for Cybersecurity in Cyber-Physical Systems, 1-19, 2022
62022
Exploring Jamming and Hijacking Attacks for Micro Aerial Drones
Y Mekdad, A Acar, A Aris, A El Fergougui, M Conti, R Lazzeretti, ...
ICC 2024-IEEE International Conference on Communications, 1939-1944, 2024
52024
A comprehensive security and performance assessment of UAV authentication schemes
Y Mekdad, A Aris, A Acar, M Conti, R Lazzeretti, AE Fergougui, S Uluagac
Security and Privacy 7 (1), e338, 2024
52024
On the robustness of image-based malware detection against adversarial attacks
Y Mekdad, F Naseem, A Aris, H Oz, A Acar, L Babun, S Uluagac, ...
Network Security Empowered by Artificial Intelligence, 355-375, 2024
22024
Real or virtual: a video conferencing background manipulation-detection system
E Nowroozi, Y Mekdad, M Conti, S Milani, S Uluagac
Multimedia Tools and Applications, 1-33, 2024
2024
系统目前无法执行此操作,请稍后再试。
文章 1–12