Ehsan Nowroozi

Orcid: 0000-0002-5714-8378

According to our database1, Ehsan Nowroozi authored at least 29 papers between 2017 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Resisting Deep Learning Models Against Adversarial Attack Transferability via Feature Randomization.
IEEE Trans. Serv. Comput., 2024

Mitigating Label Flipping Attacks in Malicious URL Detectors Using Ensemble Trees.
CoRR, 2024

Federated Learning Under Attack: Exposing Vulnerabilities through Data Poisoning Attacks in Computer Networks.
CoRR, 2024

2023
Employing Deep Ensemble Learning for Improving the Security of Computer Networks Against Adversarial Attacks.
IEEE Trans. Netw. Serv. Manag., June, 2023

An Adversarial Attack Analysis on Malicious Advertisement URL Detection Framework.
IEEE Trans. Netw. Serv. Manag., June, 2023

Unscrambling the Rectification of Adversarial Attacks Transferability across Computer Networks.
CoRR, 2023

Spritz-PS: Validation of Synthetic Face Images Using a Large Dataset of Printed Documents.
CoRR, 2023

Cryptocurrency wallets: assessment and security.
CoRR, 2023

Balancing Privacy and Accuracy in Federated Learning for Speech Emotion Recognition.
Proceedings of the 18th Conference on Computer Science and Intelligence Systems, 2023

2022
SPRITZ-PS: Validation of Synthetic Face Images Using a Large Dataset of Printed Documents.
Dataset, September, 2022

Pristine and Malicious URLs.
Dataset, April, 2022

Defeating Adversarial Attacks Againt Adversarial attacks in Network Security.
Dataset, March, 2022

Demystifying the Transferability of Adversarial Attacks in Computer Networks.
IEEE Trans. Netw. Serv. Manag., 2022

SPRITZ-1.5C: Employing Deep Ensemble Learning for Improving the Security of Computer Networks against Adversarial Attacks.
CoRR, 2022

Real or Virtual: A Video Conferencing Background Manipulation-Detection System.
CoRR, 2022

Detecting High-Quality GAN-Generated Face Images using Neural Networks.
CoRR, 2022

2021
Dataset for Real and Virtual Backgrounds of Video Calls.
Dataset, October, 2021

VIPPrint: Validating Synthetic Image Detection and Source Linking Methods on a Large Scale Dataset of Printed Documents.
J. Imaging, 2021

Do Not Deceive Your Employer with a Virtual Background: A Video Conferencing Manipulation-Detection System.
CoRR, 2021

VIPPrint: A Large Scale Dataset of Printed and Scanned Images for Synthetic Face Images Detection and Source Linking.
CoRR, 2021

A survey of machine learning techniques in adversarial image forensics.
Comput. Secur., 2021

2020
Improving the security of image manipulation detection through one-and-a-half-class multiple classification.
Multim. Tools Appl., 2020

CNN Detection of GAN-Generated Face Images based on Cross-Band Co-occurrences Analysis.
Proceedings of the 12th IEEE International Workshop on Information Forensics and Security, 2020

Effectiveness of Random Deep Feature Selection for Securing Image Manipulation Detectors Against Adversarial Examples.
Proceedings of the 2020 IEEE International Conference on Acoustics, 2020

2019
On the Transferability of Adversarial Examples against CNN-based Image Forensics.
Proceedings of the IEEE International Conference on Acoustics, 2019

2018
CNN-Based Detection of Generic Constrast Adjustment with JPEG Post-processing.
CoRR, 2018

Detection of adaptive histogram equalization robust against JPEG compression.
Proceedings of the 2018 International Workshop on Biometrics and Forensics, 2018

Cnn-Based Detection of Generic Contrast Adjustment with Jpeg Post-Processing.
Proceedings of the 2018 IEEE International Conference on Image Processing, 2018

2017
Higher-order, adversary-aware, double JPEG-detection via selected training on attacked samples.
Proceedings of the 25th European Signal Processing Conference, 2017


  Loading...