Ahmed Salem

This page is a disambiguation page, it actually contains mutiple papers from persons of the same or a similar name.

Bibliography

2023
A real-time Arabic avatar for deaf-mute community using attention mechanism.
Neural Comput. Appl., October, 2023

Maatphor: Automated Variant Analysis for Prompt Injection Attacks.
CoRR, 2023

Rethinking Privacy in Machine Learning Pipelines from an Information Flow Control Perspective.
CoRR, 2023

Comprehensive Assessment of Toxicity in ChatGPT.
CoRR, 2023

Last One Standing: A Comparative Analysis of Security and Privacy of Soft Prompt Tuning, LoRA, and In-Context Learning.
CoRR, 2023

Deconstructing Classifiers: Towards A Data Reconstruction Attack Against Text Classification Models.
CoRR, 2023

Overmodulation of Six-Phase Cascaded-CSI Using Optimal Harmonics Injection.
IEEE Access, 2023

SoK: Let the Privacy Games Begin! A Unified Treatment of Data Inference Privacy in Machine Learning.
Proceedings of the 44th IEEE Symposium on Security and Privacy, 2023

Analyzing Leakage of Personally Identifiable Information in Language Models.
Proceedings of the 44th IEEE Symposium on Security and Privacy, 2023

Bayesian Estimation of Differential Privacy.
Proceedings of the International Conference on Machine Learning, 2023

Using AI for Detection, Prediction and Classification of Retinal Detachment.
Proceedings of the Healthcare Transformation with Informatics and Artificial Intelligence, 2023

2022
New Powertrain Configurations Based on Six-Phase Current-Source Inverters for Heavy-Duty Electric Vehicles.
IEEE Access, 2022

Mathematical Models for Task Assignment with Service Level Agreement in Fog Computing.
Proceedings of the International Conference on Smart Applications, 2022

Explainable Artificial Intelligence Powered Model for Explainable Detection of Stroke Disease.
Proceedings of the 8th International Conference on Advanced Intelligent Systems and Informatics, 2022

2015
Face Recognition by Using SURF Features with Block-Based Bag of Feature Models.
Proceedings of the 3rd International Conference on Human-Agent Interaction, 2015

2012
A grid implementation of the SLUTH algorithm for visualising the depth and structural index of magnetic sources.
Comput. Geosci., 2012

Magnetic gradient and neutron backscattering fusion for landmine detection.
Proceedings of the 15th International Conference on Information Fusion, 2012

2010
Intercepting Filter Approach to Injection Flaws.
J. Inf. Process. Syst., 2010

2009
Securing Mobile Agent by Reference State and Master/Slave Pattern under .Net Framework.
Egypt. Comput. Sci. J., 2009

2006
A practical extension to the VORD model.
ACM SIGSOFT Softw. Eng. Notes, 2006

2005
Metrics for Multithreaded Java Program Verification.
Proceedings of the International Conference on Software Engineering Research and Practice, 2005


  Loading...