Skip to main content

Research Repository

Advanced Search

Essam Ghadafi's Outputs (27)

Defending against adversarial machine learning attacks using hierarchical learning: A case study on network traffic attack classification (2022)
Journal Article

Machine learning is key for automated detection of malicious network activity to ensure that computer networks and organizations are protected against cyber security attacks. Recently, there has been growing interest in the domain of adversarial mach... Read More about Defending against adversarial machine learning attacks using hierarchical learning: A case study on network traffic attack classification.

Functionality-preserving adversarial machine learning for robust classification in cybersecurity and intrusion detection domains: A survey (2022)
Journal Article

Machine learning has become widely adopted as a strategy for dealing with a variety of cybersecurity issues, ranging from insider threat detection to intrusion and malware detection. However, by their very nature, machine learning systems can introdu... Read More about Functionality-preserving adversarial machine learning for robust classification in cybersecurity and intrusion detection domains: A survey.

Efficient Distributed tag-based encryption and its application to group signatures with efficient distributed traceability
Presentation / Conference Contribution

© Springer International Publishing Switzerland 2015. In this work, we first formalize the notion of dynamic group signatures with distributed traceability, where the capability to trace signatures is distributed among n managers without requiring an... Read More about Efficient Distributed tag-based encryption and its application to group signatures with efficient distributed traceability.

Groth-Sahai proofs revisited
Presentation / Conference Contribution

Since their introduction in 2008, the non-interactive zero-knowledge (NIZK) and non-interactive witness indistinguishable (NIWI) proofs designed by Groth and Sahai have been used in numerous applications. In this paper, we offer two contributions to... Read More about Groth-Sahai proofs revisited.

Stronger security notions for decentralized traceable attribute-based signatures and more efficient constructions
Presentation / Conference Contribution

© Springer International Publishing Switzerland 2015. We revisit the notion of Decentralized Traceable Attribute- Based Signatures (DTABS) introduced by El Kaafarani et al. (CT-RSA 2014) and improve the state-of-the-art in three dimensions: Firstly,... Read More about Stronger security notions for decentralized traceable attribute-based signatures and more efficient constructions.