no code implementations • 15 Mar 2024 • Mohamed elShehaby, Aditya Kotha, Ashraf Matrawy
Adversarial training was found to increase the robustness of ML models against these attacks.
no code implementations • 8 Jun 2023 • Mohamed el Shehaby, Ashraf Matrawy
Machine Learning (ML) has become ubiquitous, and its deployment in Network Intrusion Detection Systems (NIDS) is inevitable due to its automated nature and high accuracy compared to traditional models in processing and classifying large volumes of data.
no code implementations • 30 May 2021 • Ramy Maarouf, Danish Sattar, Ashraf Matrawy
Machine learning and deep learning algorithms can be used to classify encrypted Internet traffic.
no code implementations • 8 Jan 2021 • Olakunle Ibitoye, M. Omair Shafiq, Ashraf Matrawy
The need for robust, secure and private machine learning is an important goal for realizing the full potential of the Internet of Things (IoT).
no code implementations • 13 Nov 2020 • Olakunle Ibitoye, Ashraf Matrawy, M. Omair Shafiq
Beyond the notable risk of eavesdropping, intruders can adopt machine learning techniques to infer sensitive information from audio recordings on these devices, resulting in a new dimension of privacy concerns and attack variables to smart home users.
no code implementations • 8 Jul 2020 • Rana Abou Khamis, Ashraf Matrawy
Network security applications, including intrusion detection systems of deep neural networks, are increasing rapidly to make detection task of anomaly activities more accurate and robust.
no code implementations • 6 Nov 2019 • Olakunle Ibitoye, Rana Abou-Khamis, Mohamed el Shehaby, Ashraf Matrawy, M. Omair Shafiq
We then introduce a classification of machine learning in network security applications.
no code implementations • 30 Oct 2019 • Rana Abou Khamis, Omair Shafiq, Ashraf Matrawy
In this paper, we study the resilience of deep learning-based intrusion detection systems against adversarial attacks.
no code implementations • 13 May 2019 • Olakunle Ibitoye, Omair Shafiq, Ashraf Matrawy
In this paper, we consider a variant of the FNN known as the Self-normalizing Neural Network (SNN) and compare its performance with the FNN for classifying intrusion attacks in an IoT network.
1 code implementation • 13 Feb 2018 • Danish Sattar, Ashraf Matrawy
5G network slicing is essential to providing flexible, scalable and on-demand solutions for the vast array of applications in 5G networks.
Networking and Internet Architecture
no code implementations • 25 May 2017 • Mohamed Aslan, Ashraf Matrawy
The consistency and the availability of the distributed state information are governed by an underlying consistency model.