Faranak Abri

Orcid: 0000-0003-3028-094X

According to our database1, Faranak Abri authored at least 25 papers between 2019 and 2023.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Exploiting Large Language Models (LLMs) through Deception Techniques and Persuasion Principles.
Proceedings of the IEEE International Conference on Big Data, 2023

The Performance of Machine and Deep Learning Algorithms in Detecting Fake Reviews.
Proceedings of the IEEE International Conference on Big Data, 2023

Detecting Phishing URLs using the BERT Transformer Model.
Proceedings of the IEEE International Conference on Big Data, 2023

2022
Content analysis and modeling interactions in social engineering attacks.
PhD thesis, 2022

MalView: Interactive Visual Analytics for Comprehending Malware Behavior.
IEEE Access, 2022

Markov Decision Process for Modeling Social Engineering Attacks and Finding Optimal Attack Strategies.
IEEE Access, 2022

A user-centric threat model and repository for cyber attacks.
Proceedings of the SAC '22: The 37th ACM/SIGAPP Symposium on Applied Computing, Virtual Event, April 25, 2022

Classifying Perceived Emotions based on Polarity of Arousal and Valence from Sound Events.
Proceedings of the IEEE International Conference on Big Data, 2022

Using Transformers for Identification of Persuasion Principles in Phishing Emails.
Proceedings of the IEEE International Conference on Big Data, 2022

2021
A Comparative Study of Detecting Anomalies in Time Series Data Using LSTM and TCN Models.
CoRR, 2021

Toward Explainable Users: Using NLP to Enable AI to Understand Users' Perceptions of Cyber Attacks.
Proceedings of the IEEE 45th Annual Computers, Software, and Applications Conference, 2021

A Comparison of TCN and LSTM Models in Detecting Anomalies in Time Series Data.
Proceedings of the 2021 IEEE International Conference on Big Data (Big Data), 2021

2020
Phishing Detection through Email Embeddings.
CoRR, 2020

Fake Reviews Detection through Analysis of Linguistic Features.
CoRR, 2020

Cloud as an Attack Platform.
CoRR, 2020

Fake Reviews Detection through Ensemble Learning.
CoRR, 2020

Launching Stealth Attacks using Cloud.
CoRR, 2020

Linguistic Features for Detecting Fake Reviews.
Proceedings of the 19th IEEE International Conference on Machine Learning and Applications, 2020

Ensemble Learning for Detecting Fake Reviews.
Proceedings of the 44th IEEE Annual Computers, Software, and Applications Conference, 2020

Cloud: A Platform to Launch Stealth Attacks.
Proceedings of the 44th IEEE Annual Computers, Software, and Applications Conference, 2020

Abuse of the Cloud as an Attack Platform.
Proceedings of the 44th IEEE Annual Computers, Software, and Applications Conference, 2020

Email Embeddings for Phishing Detection.
Proceedings of the 2020 IEEE International Conference on Big Data (IEEE BigData 2020), 2020

Predicting Emotions Perceived from Sounds.
Proceedings of the 2020 IEEE International Conference on Big Data (IEEE BigData 2020), 2020

2019
The Performance of Machine and Deep Learning Classifiers in Detecting Zero-Day Vulnerabilities.
CoRR, 2019

Can Machine/Deep Learning Classifiers Detect Zero-Day Malware with High Accuracy?
Proceedings of the 2019 IEEE International Conference on Big Data (IEEE BigData), 2019


  Loading...