default search action
Ehsan Nowroozi
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j9]Rakesh Shrestha, Mohammadreza Mohammadi, Sima Sinaei, Alberto Salcines, David Pampliega, Raul Clemente, Ana Lourdes Sanz, Ehsan Nowroozi, Anders Lindgren:
Anomaly detection based on LSTM and autoencoders using federated learning in smart electric grid. J. Parallel Distributed Comput. 193: 104951 (2024) - [j8]Ehsan Nowroozi, Yoosef Habibi, Mauro Conti:
SPRITZ-PS: validation of synthetic face images using a large dataset of printed documents. Multim. Tools Appl. 83(26): 67795-67823 (2024) - [j7]Ehsan Nowroozi, Mohammadreza Mohammadi, Pargol Golmohammadi, Yassine Mekdad, Mauro Conti, A. Selcuk Uluagac:
Resisting Deep Learning Models Against Adversarial Attack Transferability via Feature Randomization. IEEE Trans. Serv. Comput. 17(1): 18-29 (2024) - [c8]Ehsan Nowroozi, Rahim Taheri, Mehrdad Hajizadeh, Thomas Bauschert:
Verifying the Robustness of Machine Learning based Intrusion Detection Against Adversarial Perturbation. CSR 2024: 9-15 - [i19]Ehsan Nowroozi, Imran Haider, Rahim Taheri, Mauro Conti:
Federated Learning Under Attack: Exposing Vulnerabilities through Data Poisoning Attacks in Computer Networks. CoRR abs/2403.02983 (2024) - [i18]Ehsan Nowroozi, Nada Jadalla, Samaneh Ghelichkhani, Alireza Jolfaei:
Mitigating Label Flipping Attacks in Malicious URL Detectors Using Ensemble Trees. CoRR abs/2403.02995 (2024) - 2023
- [j6]Ehsan Nowroozi, Abhishek, Mohammadreza Mohammadi, Mauro Conti:
An Adversarial Attack Analysis on Malicious Advertisement URL Detection Framework. IEEE Trans. Netw. Serv. Manag. 20(2): 1332-1344 (2023) - [j5]Ehsan Nowroozi, Mohammadreza Mohammadi, Erkay Savas, Yassine Mekdad, Mauro Conti:
Employing Deep Ensemble Learning for Improving the Security of Computer Networks Against Adversarial Attacks. IEEE Trans. Netw. Serv. Manag. 20(2): 2096-2105 (2023) - [c7]Samaneh Mohammadi, Mohammadreza Mohammadi, Sima Sinaei, Ali Balador, Ehsan Nowroozi, Francesco Flammini, Mauro Conti:
Balancing Privacy and Accuracy in Federated Learning for Speech Emotion Recognition. FedCSIS 2023: 191-199 - [i17]Ehsan Nowroozi, Seyedsadra Seyedshoari, Yassine Mekdad, Erkay Savas, Mauro Conti:
Cryptocurrency wallets: assessment and security. CoRR abs/2303.12940 (2023) - [i16]Ehsan Nowroozi, Yoosef Habibi, Mauro Conti:
Spritz-PS: Validation of Synthetic Face Images Using a Large Dataset of Printed Documents. CoRR abs/2304.02982 (2023) - [i15]Ehsan Nowroozi, Samaneh Ghelichkhani, Imran Haider, Ali Dehghantanha:
Unscrambling the Rectification of Adversarial Attacks Transferability across Computer Networks. CoRR abs/2311.03373 (2023) - 2022
- [j4]Ehsan Nowroozi, Yassine Mekdad, Mohammad Hajian Berenjestanaki, Mauro Conti, Abdeslam El Fergougui:
Demystifying the Transferability of Adversarial Attacks in Computer Networks. IEEE Trans. Netw. Serv. Manag. 19(3): 3387-3400 (2022) - [d4]Ehsan Nowroozi, Abhishek, Mohammadreza Mohammadi, Mauro Conti:
Pristine and Malicious URLs. IEEE DataPort, 2022 - [d3]Ehsan Nowroozi, Mohammadreza Mohammadi, Mauro Conti, Pargol Golmohammadi, Yassine Mekdad, Arif Selcuk Uluagac:
Defeating Adversarial Attacks Againt Adversarial attacks in Network Security. Zenodo, 2022 - [d2]Ehsan Nowroozi, Seyedsadra Seyedshoari, Mauro Conti:
SPRITZ-PS: Validation of Synthetic Face Images Using a Large Dataset of Printed Documents. IEEE DataPort, 2022 - [i14]Ehsan Nowroozi, Mauro Conti, Yassine Mekdad:
Detecting High-Quality GAN-Generated Face Images using Neural Networks. CoRR abs/2203.01716 (2022) - [i13]Ehsan Nowroozi, Yassine Mekdad, Mauro Conti, Simone Milani, A. Selcuk Uluagac, Berrin Yanikoglu:
Real or Virtual: A Video Conferencing Background Manipulation-Detection System. CoRR abs/2204.11853 (2022) - [i12]Ehsan Nowroozi, Abhishek, Mohammadreza Mohammadi, Mauro Conti:
An Adversarial Attack Analysis on Malicious Advertisement URL Detection Framework. CoRR abs/2204.13172 (2022) - [i11]Ehsan Nowroozi, Mohammadreza Mohammadi, Pargol Golmohammadi, Yassine Mekdad, Mauro Conti, A. Selcuk Uluagac:
Resisting Deep Learning Models Against Adversarial Attack Transferability via Feature Randomization. CoRR abs/2209.04930 (2022) - [i10]Ehsan Nowroozi, Mohammadreza Mohammadi, Erkay Savas, Mauro Conti, Yassine Mekdad:
SPRITZ-1.5C: Employing Deep Ensemble Learning for Improving the Security of Computer Networks against Adversarial Attacks. CoRR abs/2209.12195 (2022) - 2021
- [j3]Ehsan Nowroozi, Ali Dehghantanha, Reza M. Parizi, Kim-Kwang Raymond Choo:
A survey of machine learning techniques in adversarial image forensics. Comput. Secur. 100: 102092 (2021) - [j2]Anselmo Ferreira, Ehsan Nowroozi, Mauro Barni:
VIPPrint: Validating Synthetic Image Detection and Source Linking Methods on a Large Scale Dataset of Printed Documents. J. Imaging 7(3): 50 (2021) - [d1]Ehsan Nowroozi, Mauro Conti, Simone Milani, Yassine Mekdad, Gabriele Orazi:
Dataset for Real and Virtual Backgrounds of Video Calls. Zenodo, 2021 - [i9]Anselmo Ferreira, Ehsan Nowroozi, Mauro Barni:
VIPPrint: A Large Scale Dataset of Printed and Scanned Images for Synthetic Face Images Detection and Source Linking. CoRR abs/2102.06792 (2021) - [i8]Mauro Conti, Simone Milani, Ehsan Nowroozi, Gabriele Orazi:
Do Not Deceive Your Employer with a Virtual Background: A Video Conferencing Manipulation-Detection System. CoRR abs/2106.15130 (2021) - [i7]Ehsan Nowroozi, Mauro Conti, Yassine Mekdad, Mohammad Hajian Berenjestanaki, Abdeslam El Fergougui:
Demystifying the Transferability of Adversarial Attacks in Computer Networks. CoRR abs/2110.04488 (2021) - 2020
- [j1]Mauro Barni, Ehsan Nowroozi, Benedetta Tondi:
Improving the security of image manipulation detection through one-and-a-half-class multiple classification. Multim. Tools Appl. 79(3-4): 2383-2408 (2020) - [c6]Mauro Barni, Ehsan Nowroozi, Benedetta Tondi, Bowen Zhang:
Effectiveness of Random Deep Feature Selection for Securing Image Manipulation Detectors Against Adversarial Examples. ICASSP 2020: 2977-2981 - [c5]Mauro Barni, Kassem Kallas, Ehsan Nowroozi, Benedetta Tondi:
CNN Detection of GAN-Generated Face Images based on Cross-Band Co-occurrences Analysis. WIFS 2020: 1-6 - [i6]Mauro Barni, Kassem Kallas, Ehsan Nowroozi, Benedetta Tondi:
CNN Detection of GAN-Generated Face Images based on Cross-Band Co-occurrences Analysis. CoRR abs/2007.12909 (2020) - [i5]Ehsan Nowroozi, Ali Dehghantanha, Reza M. Parizi, Kim-Kwang Raymond Choo:
A Survey of Machine Learning Techniques in Adversarial Image Forensics. CoRR abs/2010.09680 (2020)
2010 – 2019
- 2019
- [c4]Mauro Barni, Kassem Kallas, Ehsan Nowroozi, Benedetta Tondi:
On the Transferability of Adversarial Examples against CNN-based Image Forensics. ICASSP 2019: 8286-8290 - [i4]Mauro Barni, Ehsan Nowroozi, Benedetta Tondi:
Improving the Security of Image Manipulation Detection through One-and-a-half-class Multiple Classification. CoRR abs/1902.08446 (2019) - [i3]Mauro Barni, Ehsan Nowroozi, Benedetta Tondi, Bowen Zhang:
Effectiveness of random deep feature selection for securing image manipulation detectors against adversarial examples. CoRR abs/1910.12392 (2019) - 2018
- [c3]Mauro Barni, Andrea Costanzo, Ehsan Nowroozi, Benedetta Tondi:
Cnn-Based Detection of Generic Contrast Adjustment with Jpeg Post-Processing. ICIP 2018: 3803-3807 - [c2]Mauro Barni, Ehsan Nowroozi, Benedetta Tondi:
Detection of adaptive histogram equalization robust against JPEG compression. IWBF 2018: 1-8 - [i2]Mauro Barni, Andrea Costanzo, Ehsan Nowroozi, Benedetta Tondi:
CNN-Based Detection of Generic Constrast Adjustment with JPEG Post-processing. CoRR abs/1805.11318 (2018) - [i1]Mauro Barni, Kassem Kallas, Ehsan Nowroozi, Benedetta Tondi:
On the Transferability of Adversarial Examples Against CNN-Based Image Forensics. CoRR abs/1811.01629 (2018) - 2017
- [c1]Mauro Bami, Ehsan Nowroozi, Benedetta Tondi:
Higher-order, adversary-aware, double JPEG-detection via selected training on attacked samples. EUSIPCO 2017: 281-285
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-10 20:44 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint