Skip to main content

Showing 1–19 of 19 results for author: Nowroozi, E

.
  1. arXiv:2403.02995  [pdf, other

    cs.CR cs.AI cs.CY cs.LG cs.NI

    Mitigating Label Flip** Attacks in Malicious URL Detectors Using Ensemble Trees

    Authors: Ehsan Nowroozi, Nada Jadalla, Samaneh Ghelichkhani, Alireza Jolfaei

    Abstract: Malicious URLs provide adversarial opportunities across various industries, including transportation, healthcare, energy, and banking which could be detrimental to business operations. Consequently, the detection of these URLs is of crucial importance; however, current Machine Learning (ML) models are susceptible to backdoor attacks. These attacks involve manipulating a small percentage of trainin… ▽ More

    Submitted 5 March, 2024; originally announced March 2024.

  2. arXiv:2403.02983  [pdf, other

    cs.CR cs.AI cs.CY cs.LG cs.NI

    Federated Learning Under Attack: Exposing Vulnerabilities through Data Poisoning Attacks in Computer Networks

    Authors: Ehsan Nowroozi, Imran Haider, Rahim Taheri, Mauro Conti

    Abstract: Federated Learning (FL) is a machine learning (ML) approach that enables multiple decentralized devices or edge servers to collaboratively train a shared model without exchanging raw data. During the training and sharing of model updates between clients and servers, data and models are susceptible to different data-poisoning attacks. In this study, our motivation is to explore the severity of da… ▽ More

    Submitted 5 March, 2024; originally announced March 2024.

  3. arXiv:2311.03373  [pdf, other

    cs.CR cs.AI cs.LG

    Unscrambling the Rectification of Adversarial Attacks Transferability across Computer Networks

    Authors: Ehsan Nowroozi, Samaneh Ghelichkhani, Imran Haider, Ali Dehghantanha

    Abstract: Convolutional neural networks (CNNs) models play a vital role in achieving state-of-the-art performances in various technological fields. CNNs are not limited to Natural Language Processing (NLP) or Computer Vision (CV) but also have substantial applications in other technological domains, particularly in cybersecurity. The reliability of CNN's models can be compromised because of their susceptibi… ▽ More

    Submitted 26 October, 2023; originally announced November 2023.

  4. arXiv:2304.02982  [pdf, other

    cs.CV cs.AI cs.CR cs.CY cs.LG

    Spritz-PS: Validation of Synthetic Face Images Using a Large Dataset of Printed Documents

    Authors: Ehsan Nowroozi, Yoosef Habibi, Mauro Conti

    Abstract: The capability of doing effective forensic analysis on printed and scanned (PS) images is essential in many applications. PS documents may be used to conceal the artifacts of images which is due to the synthetic nature of images since these artifacts are typically present in manipulated images and the main artifacts in the synthetic images can be removed after the PS. Due to the appeal of Generati… ▽ More

    Submitted 6 April, 2023; originally announced April 2023.

  5. arXiv:2303.12940  [pdf, other

    cs.CR cs.CV cs.DC cs.IT

    Cryptocurrency wallets: assessment and security

    Authors: Ehsan Nowroozi, Seyedsadra Seyedshoari, Yassine Mekdad, Erkay Savas, Mauro Conti

    Abstract: Digital wallet as a software program or a digital device allows users to conduct various transactions. Hot and cold digital wallets are considered as two types of this wallet. Digital wallets need an online connection fall into the first group, whereas digital wallets can operate without internet connection belong to the second group. Prior to buying a digital wallet, it is important to define for… ▽ More

    Submitted 6 March, 2023; originally announced March 2023.

  6. arXiv:2209.12195  [pdf, other

    cs.CR cs.AI cs.LG cs.NI

    Employing Deep Ensemble Learning for Improving the Security of Computer Networks against Adversarial Attacks

    Authors: Ehsan Nowroozi, Mohammadreza Mohammadi, Erkay Savas, Mauro Conti, Yassine Mekdad

    Abstract: In the past few years, Convolutional Neural Networks (CNN) have demonstrated promising performance in various real-world cybersecurity applications, such as network and multimedia security. However, the underlying fragility of CNN structures poses major security problems, making them inappropriate for use in security-oriented applications including such computer networks. Protecting these architec… ▽ More

    Submitted 17 April, 2023; v1 submitted 25 September, 2022; originally announced September 2022.

  7. arXiv:2209.04930  [pdf, other

    cs.CR cs.CY cs.LG cs.NI

    Resisting Deep Learning Models Against Adversarial Attack Transferability via Feature Randomization

    Authors: Ehsan Nowroozi, Mohammadreza Mohammadi, Pargol Golmohammadi, Yassine Mekdad, Mauro Conti, Selcuk Uluagac

    Abstract: In the past decades, the rise of artificial intelligence has given us the capabilities to solve the most challenging problems in our day-to-day lives, such as cancer prediction and autonomous navigation. However, these applications might not be reliable if not secured against adversarial attacks. In addition, recent works demonstrated that some adversarial examples are transferable across differen… ▽ More

    Submitted 11 September, 2022; originally announced September 2022.

  8. arXiv:2204.13172  [pdf, other

    cs.LG cs.AI cs.CR cs.NI

    An Adversarial Attack Analysis on Malicious Advertisement URL Detection Framework

    Authors: Ehsan Nowroozi, Abhishek, Mohammadreza Mohammadi, Mauro Conti

    Abstract: Malicious advertisement URLs pose a security risk since they are the source of cyber-attacks, and the need to address this issue is growing in both industry and academia. Generally, the attacker delivers an attack vector to the user by means of an email, an advertisement link or any other means of communication and directs them to a malicious website to steal sensitive information and to defraud t… ▽ More

    Submitted 27 April, 2022; originally announced April 2022.

    Comments: 13

  9. arXiv:2204.11853  [pdf, other

    cs.CV cs.AI cs.CR cs.LG cs.MM

    Real or Virtual: A Video Conferencing Background Manipulation-Detection System

    Authors: Ehsan Nowroozi, Yassine Mekdad, Mauro Conti, Simone Milani, Selcuk Uluagac, Berrin Yanikoglu

    Abstract: Recently, the popularity and wide use of the last-generation video conferencing technologies created an exponential growth in its market size. Such technology allows participants in different geographic regions to have a virtual face-to-face meeting. Additionally, it enables users to employ a virtual background to conceal their own environment due to privacy concerns or to reduce distractions, par… ▽ More

    Submitted 25 April, 2022; originally announced April 2022.

    Comments: 34 pages. arXiv admin note: text overlap with arXiv:2106.15130

  10. arXiv:2203.01716  [pdf, other

    cs.CR cs.CV cs.LG eess.IV

    Detecting High-Quality GAN-Generated Face Images using Neural Networks

    Authors: Ehsan Nowroozi, Mauro Conti, Yassine Mekdad

    Abstract: In the past decades, the excessive use of the last-generation GAN (Generative Adversarial Networks) models in computer vision has enabled the creation of artificial face images that are visually indistinguishable from genuine ones. These images are particularly used in adversarial settings to create fake social media accounts and other fake online profiles. Such malicious activities can negatively… ▽ More

    Submitted 3 March, 2022; originally announced March 2022.

    Comments: 16 Pages, 6 figures

  11. arXiv:2110.04488  [pdf, other

    cs.CR cs.AI cs.CV cs.LG cs.NI

    Demystifying the Transferability of Adversarial Attacks in Computer Networks

    Authors: Ehsan Nowroozi, Yassine Mekdad, Mohammad Hajian Berenjestanaki, Mauro Conti, Abdeslam EL Fergougui

    Abstract: Convolutional Neural Networks (CNNs) models are one of the most frequently used deep learning networks, and extensively used in both academia and industry. Recent studies demonstrated that adversarial attacks against such models can maintain their effectiveness even when used on models other than the one targeted by the attacker. This major property is known as transferability, and makes CNNs ill-… ▽ More

    Submitted 31 March, 2022; v1 submitted 9 October, 2021; originally announced October 2021.

    Comments: 14 pages

  12. arXiv:2106.15130  [pdf, other

    cs.CR cs.AI cs.CV cs.LG cs.MM

    Do Not Deceive Your Employer with a Virtual Background: A Video Conferencing Manipulation-Detection System

    Authors: Mauro Conti, Simone Milani, Ehsan Nowroozi, Gabriele Orazi

    Abstract: The last-generation video conferencing software allows users to utilize a virtual background to conceal their personal environment due to privacy concerns, especially in official meetings with other employers. On the other hand, users maybe want to fool people in the meeting by considering the virtual background to conceal where they are. In this case, develo** tools to understand the virtual ba… ▽ More

    Submitted 29 June, 2021; originally announced June 2021.

    Comments: 6 pages

  13. arXiv:2102.06792  [pdf, other

    cs.CV cs.CR cs.LG

    VIPPrint: A Large Scale Dataset of Printed and Scanned Images for Synthetic Face Images Detection and Source Linking

    Authors: Anselmo Ferreira, Ehsan Nowroozi, Mauro Barni

    Abstract: The possibility of carrying out a meaningful forensics analysis on printed and scanned images plays a major role in many applications. First of all, printed documents are often associated with criminal activities, such as terrorist plans, child pornography pictures, and even fake packages. Additionally, printing and scanning can be used to hide the traces of image manipulation or the synthetic nat… ▽ More

    Submitted 1 February, 2021; originally announced February 2021.

  14. arXiv:2010.09680  [pdf, other

    cs.CR cs.AI cs.CV cs.LG

    A Survey of Machine Learning Techniques in Adversarial Image Forensics

    Authors: Ehsan Nowroozi, Ali Dehghantanha, Reza M. Parizi, Kim-Kwang Raymond Choo

    Abstract: Image forensic plays a crucial role in both criminal investigations (e.g., dissemination of fake images to spread racial hate or false narratives about specific ethnicity groups) and civil litigation (e.g., defamation). Increasingly, machine learning approaches are also utilized in image forensics. However, there are also a number of limitations and vulnerabilities associated with machine learning… ▽ More

    Submitted 19 October, 2020; originally announced October 2020.

    Comments: 37 pages, 24 figures, Accepted to the Journal Computer and Security (Elsevier)

    Journal ref: 2020

  15. arXiv:2007.12909  [pdf, other

    cs.CV cs.CR cs.LG eess.IV

    CNN Detection of GAN-Generated Face Images based on Cross-Band Co-occurrences Analysis

    Authors: Mauro Barni, Kassem Kallas, Ehsan Nowroozi, Benedetta Tondi

    Abstract: Last-generation GAN models allow to generate synthetic images which are visually indistinguishable from natural ones, raising the need to develop tools to distinguish fake and natural images thus contributing to preserve the trustworthiness of digital images. While modern GAN models can generate very high-quality images with no visible spatial artifacts, reconstruction of consistent relationships… ▽ More

    Submitted 2 October, 2020; v1 submitted 25 July, 2020; originally announced July 2020.

    Comments: (6 pages, 2 figures, 4 tables), (IEEE International Workshop on Information Forensics and Security - WIFS 2020, New York, USA)

  16. arXiv:1910.12392  [pdf, other

    cs.CR cs.CV cs.LG eess.IV

    Effectiveness of random deep feature selection for securing image manipulation detectors against adversarial examples

    Authors: Mauro Barni, Ehsan Nowroozi, Benedetta Tondi, Bowen Zhang

    Abstract: We investigate if the random feature selection approach proposed in [1] to improve the robustness of forensic detectors to targeted attacks, can be extended to detectors based on deep learning features. In particular, we study the transferability of adversarial examples targeting an original CNN image manipulation detector to other detectors (a fully connected neural network and a linear SVM) that… ▽ More

    Submitted 26 December, 2019; v1 submitted 25 October, 2019; originally announced October 2019.

    Comments: Submitted to the ICASSP conference to be held in 2020, Barcelona, Spain

  17. arXiv:1902.08446  [pdf, other

    cs.CR

    Improving the security of Image Manipulation Detection through One-and-a-half-class Multiple Classification

    Authors: Mauro Barni, Ehsan Nowroozi, Benedetta Tondi

    Abstract: Protecting image manipulation detectors against perfect knowledge attacks requires the adoption of detector architectures which are intrinsically difficult to attack. In this paper, we do so, by exploiting a recently proposed multiple-classifier architecture combining the improved security of 1-Class (1C) classification and the good performance ensured by conventional 2-Class (2C) classification i… ▽ More

    Submitted 11 November, 2019; v1 submitted 22 February, 2019; originally announced February 2019.

    Comments: 27 pages, 9 figures, Submitted to the An International Journal Multimedia Tools and Applications-Springer

    Journal ref: 1, November, 2019

  18. arXiv:1811.01629  [pdf, ps, other

    cs.CR

    On the Transferability of Adversarial Examples Against CNN-Based Image Forensics

    Authors: Mauro Barni, Kassem Kallas, Ehsan Nowroozi, Benedetta Tondi

    Abstract: Recent studies have shown that Convolutional Neural Networks (CNN) are relatively easy to attack through the generation of so-called adversarial examples. Such vulnerability also affects CNN-based image forensic tools. Research in deep learning has shown that adversarial examples exhibit a certain degree of transferability, i.e., they maintain part of their effectiveness even against CNN models ot… ▽ More

    Submitted 5 November, 2018; originally announced November 2018.

  19. arXiv:1805.11318  [pdf, other

    cs.CR cs.CV

    CNN-Based Detection of Generic Constrast Adjustment with JPEG Post-processing

    Authors: Mauro Barni, Andrea Costanzo, Ehsan Nowroozi, Benedetta Tondi

    Abstract: Detection of contrast adjustments in the presence of JPEG postprocessing is known to be a challenging task. JPEG post processing is often applied innocently, as JPEG is the most common image format, or it may correspond to a laundering attack, when it is purposely applied to erase the traces of manipulation. In this paper, we propose a CNN-based detector for generic contrast adjustment, which is r… ▽ More

    Submitted 29 May, 2018; originally announced May 2018.

    Comments: To be presented at the 25th IEEE International Conference on Image Processing (ICIP 2018)