Mohammadreza Ebrahimi

Orcid: 0000-0003-1367-3338

According to our database1, Mohammadreza Ebrahimi authored at least 31 papers between 2017 and 2023.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Heterogeneous Domain Adaptation With Adversarial Neural Representation Learning: Experiments on E-Commerce and Cybersecurity.
IEEE Trans. Pattern Anal. Mach. Intell., 2023

Adversarially Robust Deep Learning with Optimal-Transport-Regularized Divergences.
CoRR, 2023

Efficient Secure Aggregation for Privacy-Preserving Federated Machine Learning.
CoRR, 2023

Sequential Gradient Coding For Straggler Mitigation.
Proceedings of the Eleventh International Conference on Learning Representations, 2023

Evading Deep Learning-Based Malware Detectors via Obfuscation: A Deep Reinforcement Learning Approach.
Proceedings of the IEEE International Conference on Data Mining, 2023

Evading Deep Learning-Based Malware Detectors via Obfuscation: A Deep Reinforcement Learning Approach.
Proceedings of the IEEE International Conference on Data Mining, 2023

Time-Resolved FMRI Shared Response Model Using Gaussian Process Factor Analysis.
Proceedings of the IEEE International Conference on Acoustics, 2023

2022
Cross-Lingual Cybersecurity Analytics in the International Dark Web with Adversarial Deep Representation Learning.
MIS Q., May, 2022

Counteracting Dark Web Text-Based CAPTCHA with Generative Adversarial Learning for Proactive Cyber Threat Intelligence.
ACM Trans. Manag. Inf. Syst., 2022

Key Factors Affecting User Adoption of Open-Access Data Repositories in Intelligence and Security Informatics: An Affordance Perspective.
ACM Trans. Manag. Inf. Syst., 2022

Gait-dependent Traversability Estimation on the k-rock2 Robot.
Proceedings of the 26th International Conference on Pattern Recognition, 2022

Multi-view Representation Learning from Malware to Defend Against Adversarial Variants.
Proceedings of the IEEE International Conference on Data Mining Workshops, 2022

An Adversarial Reinforcement Learning Framework for Robust Machine Learning-based Malware Detection.
Proceedings of the IEEE International Conference on Data Mining Workshops, 2022

EW-Tune: A Framework for Privately Fine-Tuning Large Language Models with Differential Privacy.
Proceedings of the IEEE International Conference on Data Mining Workshops, 2022

2021
Binary Black-Box Attacks Against Static Malware Detectors with Reinforcement Learning in Discrete Action Spaces.
Proceedings of the IEEE Security and Privacy Workshops, 2021

Automated PII Extraction from Social Media for Raising Privacy Awareness: A Deep Transfer Learning Approach.
Proceedings of the IEEE International Conference on Intelligence and Security Informatics, 2021

Single-Shot Black-Box Adversarial Attacks Against Malware Detectors: A Causal Language Model Approach.
Proceedings of the IEEE International Conference on Intelligence and Security Informatics, 2021

2020
Two-Layer Coded Channel Access With Collision Resolution: Design and Analysis.
IEEE Trans. Wirel. Commun., 2020

Semi-Supervised Cyber Threat Identification in Dark Net Markets: A Transductive and Deep Learning Approach.
J. Manag. Inf. Syst., 2020

Binary Black-box Evasion Attacks Against Deep Learning-based Static Malware Detectors with Adversarial Byte-Level Language Model.
CoRR, 2020

Time-Resolved fMRI Shared Response Model using Gaussian Process Factor Analysis.
CoRR, 2020

Detecting Cyber Threats in Non-English Hacker Forums: An Adversarial Cross-Lingual Knowledge Transfer Approach.
Proceedings of the 2020 IEEE Security and Privacy Workshops, 2020

A Generative Adversarial Learning Framework for Breaking Text-Based CAPTCHA in the Dark Web.
Proceedings of the IEEE International Conference on Intelligence and Security Informatics, 2020

Identifying, Collecting, and Monitoring Personally Identifiable Information: From the Dark Web to the Surface Web.
Proceedings of the IEEE International Conference on Intelligence and Security Informatics, 2020

Linking Personally Identifiable Information from the Dark Web to the Surface Web: A Deep Entity Resolution Approach.
Proceedings of the 20th International Conference on Data Mining Workshops, 2020

2019
Involuntary Embarrassing Exposures in Online Social Networks: A Replication Study.
AIS Trans. Replication Res., 2019

Identifying High-Impact Opioid Products and Key Sellers in Dark Net Marketplaces: An Interpretable Text Analytics Approach.
Proceedings of the 2019 IEEE International Conference on Intelligence and Security Informatics, 2019

Dark-Net Ecosystem Cyber-Threat Intelligence (CTI) Tool.
Proceedings of the 2019 IEEE International Conference on Intelligence and Security Informatics, 2019

2018
Detecting Cyber Threats in Non-English Dark Net Markets: A Cross-Lingual Transfer Learning Approach.
Proceedings of the 2018 IEEE International Conference on Intelligence and Security Informatics, 2018

Identifying, Collecting, and Presenting Hacker Community Data: Forums, IRC, Carding Shops, and DNMs.
Proceedings of the 2018 IEEE International Conference on Intelligence and Security Informatics, 2018

2017
Coded random access design for constrained outage.
Proceedings of the 2017 IEEE International Symposium on Information Theory, 2017


  Loading...