Transformer-based language models for software vulnerability detection
The large transformer-based language models demonstrate excellent performance in natural
language processing. By considering the transferability of the knowledge gained by these …
language processing. By considering the transferability of the knowledge gained by these …
Void: A fast and light voice liveness detection system
Due to the open nature of voice assistants' input channels, adversaries could easily record
people's use of voice commands, and replay them to spoof voice assistants. To mitigate such …
people's use of voice commands, and replay them to spoof voice assistants. To mitigate such …
Statistical application fingerprinting for DDoS attack mitigation
Because of the dynamic nature of network traffic patterns, such as new traffic application
arrivals or flash events, it is becoming increasingly difficult for conventional anomaly detection …
arrivals or flash events, it is becoming increasingly difficult for conventional anomaly detection …
Backdoor attack on machine learning based android malware detectors
… Muhammad Ejaz Ahmed received the MS degree in information technology from the
National University of Sciences and Technology (NUST), Islamabad, Pakistan, in 2011, and the …
National University of Sciences and Technology (NUST), Islamabad, Pakistan, in 2011, and the …
Mitigating DNS query-based DDoS attacks with machine learning on software-defined networking
Securing Internet of Things is a challenge because of its multiple points of vulnerability. In
particular, Distributed Denial of Service (DDoS) attacks on IoT devices pose a major security …
particular, Distributed Denial of Service (DDoS) attacks on IoT devices pose a major security …
Peeler: Profiling kernel-level events to detect ransomware
Because the recent ransomware families are becoming progressively more advanced, it is
challenging to detect ransomware using static features only. However, their behaviors are still …
challenging to detect ransomware using static features only. However, their behaviors are still …
Meningioma presenting with spontaneous subdural hematoma: a report of two cases and literature review
…, M Abbas, B Fallatah, A Alkhaibary, ME Ahmed… - World Neurosurgery, 2019 - Elsevier
Background Although meningiomas are considered benign, encapsulated brain tumors,
their distinct intracranial location can lead to devastating complications. Although a highly …
their distinct intracranial location can lead to devastating complications. Although a highly …
Vuldebert: A vulnerability detection system using bert
Deep learning technologies recently received much attention to detect vulnerable code patterns
accurately. This paper proposes a new deep learning-based vulnerability detection tool …
accurately. This paper proposes a new deep learning-based vulnerability detection tool …
Computed tomographic angiography and cerebral blood volume can predict final infarct volume and outcome after recanalization
Background and Purpose— Recanalization rates are higher in acute anterior stroke treated
with stent-retrievers when compared with older techniques. However, some still have …
with stent-retrievers when compared with older techniques. However, some still have …
Preventing DNS amplification attacks using the history of DNS queries with SDN
Abstract Domain Name System (DNS) amplification attack is a sophisticated Distributed
Denial of Service (DDoS) attack by sending a huge volume of DNS name lookup requests to …
Denial of Service (DDoS) attack by sending a huge volume of DNS name lookup requests to …