Skip to main content

Showing 1–3 of 3 results for author: Khan, D A

Searching in archive cs. Search in all archives.
.
  1. arXiv:2201.05399  [pdf, other

    cs.CR cs.SE

    Model-Based Framework for exploiting sensors of IoT devices using a Botnet: A case study with Android

    Authors: Zubair Khaliq, Dawood Ashraf Khan, Asif Iqbal Baba, Shahbaz Ali, Sheikh Umar Farooq

    Abstract: Botnets have become a serious security threat not only to the Internet but also to the devices connected to it. Factors like the exponential growth of IoT, the COVID-19 pandemic that's swee** the planet, and the ever-larger number of cyber-criminals who now have access to or have developed increasingly more sophisticated tools are incentivizing the growth of botnets in this domain. The recent ou… ▽ More

    Submitted 14 January, 2022; originally announced January 2022.

  2. arXiv:2201.05371  [pdf, other

    cs.SE cs.AI cs.LG

    Artificial Intelligence in Software Testing : Impact, Problems, Challenges and Prospect

    Authors: Zubair Khaliq, Sheikh Umar Farooq, Dawood Ashraf Khan

    Abstract: Artificial Intelligence (AI) is making a significant impact in multiple areas like medical, military, industrial, domestic, law, arts as AI is capable to perform several roles such as managing smart factories, driving autonomous vehicles, creating accurate weather forecasts, detecting cancer and personal assistants, etc. Software testing is the process of putting the software to test for some abno… ▽ More

    Submitted 14 January, 2022; originally announced January 2022.

  3. arXiv:1905.10906  [pdf, other

    cs.LG cs.CR stat.ML

    Non-Determinism in Neural Networks for Adversarial Robustness

    Authors: Daanish Ali Khan, Linhong Li, Ninghao Sha, Zhuoran Liu, Abelino Jimenez, Bhiksha Raj, Rita Singh

    Abstract: Recent breakthroughs in the field of deep learning have led to advancements in a broad spectrum of tasks in computer vision, audio processing, natural language processing and other areas. In most instances where these tasks are deployed in real-world scenarios, the models used in them have been shown to be susceptible to adversarial attacks, making it imperative for us to address the challenge of… ▽ More

    Submitted 26 May, 2019; originally announced May 2019.