Search Results for author: Ashraf Matrawy

Found 11 papers, 1 papers with code

Adversarial Evasion Attacks Practicality in Networks: Testing the Impact of Dynamic Learning

no code implementations8 Jun 2023 Mohamed el Shehaby, Ashraf Matrawy

Machine Learning (ML) has become ubiquitous, and its deployment in Network Intrusion Detection Systems (NIDS) is inevitable due to its automated nature and high accuracy compared to traditional models in processing and classifying large volumes of data.

Adversarial Attack Network Intrusion Detection

A GAN-based Approach for Mitigating Inference Attacks in Smart Home Environment

no code implementations13 Nov 2020 Olakunle Ibitoye, Ashraf Matrawy, M. Omair Shafiq

Beyond the notable risk of eavesdropping, intruders can adopt machine learning techniques to infer sensitive information from audio recordings on these devices, resulting in a new dimension of privacy concerns and attack variables to smart home users.

BIG-bench Machine Learning Generative Adversarial Network

Evaluation of Adversarial Training on Different Types of Neural Networks in Deep Learning-based IDSs

no code implementations8 Jul 2020 Rana Abou Khamis, Ashraf Matrawy

Network security applications, including intrusion detection systems of deep neural networks, are increasing rapidly to make detection task of anomaly activities more accurate and robust.

Adversarial Attack Intrusion Detection

Analyzing Adversarial Attacks Against Deep Learning for Intrusion Detection in IoT Networks

no code implementations13 May 2019 Olakunle Ibitoye, Omair Shafiq, Ashraf Matrawy

In this paper, we consider a variant of the FNN known as the Self-normalizing Neural Network (SNN) and compare its performance with the FNN for classifying intrusion attacks in an IoT network.

Adversarial Robustness Intrusion Detection

Optimal Slice Allocation in 5G Core Networks

1 code implementation13 Feb 2018 Danish Sattar, Ashraf Matrawy

5G network slicing is essential to providing flexible, scalable and on-demand solutions for the vast array of applications in 5G networks.

Networking and Internet Architecture

A Clustering-based Consistency Adaptation Strategy for Distributed SDN Controllers

no code implementations25 May 2017 Mohamed Aslan, Ashraf Matrawy

The consistency and the availability of the distributed state information are governed by an underlying consistency model.

Clustering

Cannot find the paper you are looking for? You can Submit a new open access paper.