PinnedPublished inTowards Data Science6G and Artificial Intelligence With Security Problems6G solutions with Adversarial Machine Learning Attacks: Millimeter Wave Beam Prediction Use-CaseMar 11, 2021Mar 11, 2021
Understanding Adversarial Attacks in Artificial Intelligence: Insights from “Trustworthy AI: From…In the rapidly evolving landscape of Artificial Intelligence (AI), ensuring the security and robustness of AI systems is of paramount…Aug 7Aug 7
Understanding Reliability in AI: A Dive into Uncertainty QuantificationFor more in-depth discussions and practical examples, check out our book, “Trustworthy AI: From Theory to Practice”.Aug 7Aug 7
AI Based 6G Applications’ Security Mitigations: Defensive Distillation and Adversarial RetrainingFeb 20, 2022Feb 20, 2022
Published inTowards Data ScienceDeep LSTM based Malware AnalysisDeep learning based Sequential model for malware analysis using Windows Exe API CallsJul 24, 2020Jul 24, 2020
Published inTowards Data ScienceAdversarial Machine Learning Mitigation: *Adversarial Learning*There are several attacks against deep learning models in the literature, including fast-gradient sign method (FGSM), basic iterative…Jul 17, 20201Jul 17, 20201
Windows Malware Dataset with PE API CallsOur public malware dataset generated by Cuckoo Sandbox based on Windows OS API calls analysis for cybersecurity researchers for malware…Jun 14, 2020Jun 14, 2020