A survey on security and privacy issues of UAVs
Mekdad, Yassine, Aris, Ahmet, Babun, Leonardo, Fergougui, Abdeslam El, Conti, Mauro, Lazzeretti, Riccardo, Uluagac, A. Selcuk
Published in Computer networks (Amsterdam, Netherlands : 1999) (01.04.2023)
Published in Computer networks (Amsterdam, Netherlands : 1999) (01.04.2023)
Get full text
Journal Article
Real or virtual: a video conferencing background manipulation-detection system
Nowroozi, Ehsan, Mekdad, Yassine, Conti, Mauro, Milani, Simone, Uluagac, Selcuk
Published in Multimedia tools and applications (25.09.2024)
Published in Multimedia tools and applications (25.09.2024)
Get full text
Journal Article
Resisting Deep Learning Models Against Adversarial Attack Transferability via Feature Randomization
Nowroozi, Ehsan, Mohammadi, Mohammadreza, Golmohammadi, Pargol, Mekdad, Yassine, Conti, Mauro, Uluagac, Selcuk
Published in IEEE transactions on services computing (01.01.2024)
Published in IEEE transactions on services computing (01.01.2024)
Get full text
Journal Article
Employing Deep Ensemble Learning for Improving the Security of Computer Networks against Adversarial Attacks
Nowroozi, Ehsan, Mohammadi, Mohammadreza, Savas, Erkay, Mekdad, Yassine, Conti, Mauro
Published in IEEE eTransactions on network and service management (01.06.2023)
Published in IEEE eTransactions on network and service management (01.06.2023)
Get full text
Journal Article
Exploring Jamming and Hijacking Attacks for Micro Aerial Drones
Mekdad, Yassine, Acar, Abbas, Aris, Ahmet, El Fergougui, Abdeslam, Conti, Mauro, Lazzeretti, Riccardo, Uluagac, Selcuk
Published in ICC 2024 - IEEE International Conference on Communications (09.06.2024)
Published in ICC 2024 - IEEE International Conference on Communications (09.06.2024)
Get full text
Conference Proceeding
Cryptocurrency wallets: assessment and security
Nowroozi, Ehsan, Seyedshoari, Seyedsadra, Mekdad, Yassine, Savas, Erkay, Conti, Mauro
Year of Publication 06.03.2023
Year of Publication 06.03.2023
Get full text
Journal Article
Employing Deep Ensemble Learning for Improving the Security of Computer Networks against Adversarial Attacks
Nowroozi, Ehsan, Mohammadi, Mohammadreza, Savas, Erkay, Conti, Mauro, Mekdad, Yassine
Year of Publication 25.09.2022
Year of Publication 25.09.2022
Get full text
Journal Article
Exploring Jamming and Hijacking Attacks for Micro Aerial Drones
Mekdad, Yassine, Acar, Abbas, Aris, Ahmet, Fergougui, Abdeslam El, Conti, Mauro, Lazzeretti, Riccardo, Uluagac, Selcuk
Year of Publication 06.03.2024
Year of Publication 06.03.2024
Get full text
Journal Article
Resisting Deep Learning Models Against Adversarial Attack Transferability via Feature Randomization
Nowroozi, Ehsan, Mohammadi, Mohammadreza, Golmohammadi, Pargol, Mekdad, Yassine, Conti, Mauro, Uluagac, Selcuk
Year of Publication 11.09.2022
Year of Publication 11.09.2022
Get full text
Journal Article
Real or Virtual: A Video Conferencing Background Manipulation-Detection System
Nowroozi, Ehsan, Mekdad, Yassine, Conti, Mauro, Milani, Simone, Uluagac, Selcuk, Yanikoglu, Berrin
Year of Publication 25.04.2022
Year of Publication 25.04.2022
Get full text
Journal Article
Demystifying the Transferability of Adversarial Attacks in Computer Networks
Nowroozi, Ehsan, Mekdad, Yassine, Berenjestanaki, Mohammad Hajian, Conti, Mauro, Fergougui, Abdeslam EL
Year of Publication 09.10.2021
Year of Publication 09.10.2021
Get full text
Journal Article
Cryptocurrency wallets: assessment and security
Nowroozi, Ehsan, Seyedshoari, Seyedsadra, Mekdad, Yassine, Erkay Savas, Conti, Mauro
Published in arXiv.org (06.03.2023)
Get full text
Published in arXiv.org (06.03.2023)
Paper
A Survey on Security and Privacy Issues of UAVs
Mekdad, Yassine, Aris, Ahmet, Babun, Leonardo, Fergougui, Abdeslam EL, Conti, Mauro, Lazzeretti, Riccardo, Uluagac, A. Selcuk
Year of Publication 29.09.2021
Year of Publication 29.09.2021
Get full text
Journal Article