Skip to main content

Showing 1–5 of 5 results for author: Pooranian, Z

.
  1. arXiv:2204.07772  [pdf, other

    cs.CR cs.LG

    SETTI: A Self-supervised Adversarial Malware Detection Architecture in an IoT Environment

    Authors: Marjan Golmaryami, Rahim Taheri, Zahra Pooranian, Mohammad Shojafar, Pei Xiao

    Abstract: In recent years, malware detection has become an active research topic in the area of Internet of Things (IoT) security. The principle is to exploit knowledge from large quantities of continuously generated malware. Existing algorithms practice available malware features for IoT devices and lack real-time prediction behaviors. More research is thus required on malware detection to cope with real-t… ▽ More

    Submitted 16 April, 2022; originally announced April 2022.

    Comments: 20 pages, 6 figures, 2 Tables, Submitted to ACM Transactions on Multimedia Computing, Communications, and Applications

  2. arXiv:2006.03986  [pdf, other

    cs.CR cs.SI

    Online Advertising Security: Issues, Taxonomy, and Future Directions

    Authors: Zahra Pooranian, Mauro Conti, Hamed Haddadi, Rahim Tafazolli

    Abstract: Online advertising has become the backbone of the Internet economy by revolutionizing business marketing. It provides a simple and efficient way for advertisers to display their advertisements to specific individual users, and over the last couple of years has contributed to an explosion in the income stream for several web-based businesses. For example, Google's income from advertising grew 51.6%… ▽ More

    Submitted 5 October, 2021; v1 submitted 6 June, 2020; originally announced June 2020.

    Comments: 31 pages, 13 figures, 4 tables, IEEE Communications Surveys & Tutorials

  3. arXiv:1908.05759  [pdf, other

    cs.CR cs.LG cs.NE stat.ML

    Similarity-based Android Malware Detection Using Hamming Distance of Static Binary Features

    Authors: Rahim Taheri, Meysam Ghahramani, Reza Javidan, Mohammad Shojafar, Zahra Pooranian, Mauro Conti

    Abstract: In this paper, we develop four malware detection methods using Hamming distance to find similarity between samples which are first nearest neighbors (FNN), all nearest neighbors (ANN), weighted all nearest neighbors (WANN), and k-medoid based nearest neighbors (KMNN). In our proposed methods, we can trigger the alarm if we detect an Android app is malicious. Hence, our solutions help us to avoid t… ▽ More

    Submitted 27 November, 2019; v1 submitted 12 August, 2019; originally announced August 2019.

    Comments: 20 pages, 8 figures, 11 tables, FGCS Elsevier journal

  4. arXiv:1908.04473  [pdf, other

    cs.LG cs.AI stat.ML

    On Defending Against Label Flip** Attacks on Malware Detection Systems

    Authors: Rahim Taheri, Reza Javidan, Mohammad Shojafar, Zahra Pooranian, Ali Miri, Mauro Conti

    Abstract: Label manipulation attacks are a subclass of data poisoning attacks in adversarial machine learning used against different applications, such as malware detection. These types of attacks represent a serious threat to detection systems in environments having high noise rate or uncertainty, such as complex networks and Internet of Thing (IoT). Recent work in the literature has suggested using the… ▽ More

    Submitted 16 June, 2020; v1 submitted 12 August, 2019; originally announced August 2019.

    Comments: 21 pages, 6 figures, 4 tables, NCAA Springer Journal

  5. arXiv:1710.01801  [pdf, ps, other

    cs.DC cs.NI

    FOCAN: A Fog-supported Smart City Network Architecture for Management of Applications in the Internet of Everything Environments

    Authors: Paola G. Vinueza Naranjo, Zahra Pooranian, Mohammad Shojafar, Mauro Conti, Rajkumar Buyya

    Abstract: Smart city vision brings emerging heterogeneous communication technologies such as Fog Computing (FC) together to substantially reduce the latency and energy consumption of Internet of Everything (IoE) devices running various applications. The key feature that distinguishes the FC paradigm for smart cities is that it spreads communication and computing resources over the wired/wireless access netw… ▽ More

    Submitted 4 October, 2017; originally announced October 2017.

    Comments: Sapienza University of Rome, 3 Oct. 2017, in review, 16 pages, 6 figures