
Topic
- Computing and Processing
- Components, Circuits, Devices and Systems
- Communication, Networking and Broadcast Technologies
- Power, Energy and Industry Applications
- Signal Processing and Analysis
- Robotics and Control Systems
- General Topics for Engineers
- Fields, Waves and Electromagnetics
- Engineered Materials, Dielectrics and Plasmas
- Bioengineering
- Transportation
- Photonics and Electrooptics
- Engineering Profession
- Aerospace
- Geoscience
- Nuclear Engineering
- Career Development
- Emerging Technologies
- Telecommunications
- English for Technical Professionals
Tamer Abuhmed
Also published under:Tamer AbuHmed
Affiliation
College of Computing and Informatics, Sungkyunkwan University, Republic of Korea
Topic
Deep Learning Models,Adversarial Attacks,Deep Learning,Attack Success Rate,Adversarial Examples,Adversarial Perturbations,Defense Techniques,ImageNet Dataset,Internet Of Things,Machine Learning,Machine Learning Models,Structural Similarity Index Measure,Support Vector Machine,Target Model,Threat Model,Adversarial Training,Alzheimer’s Disease,Alzheimer’s Disease Neuroimaging Initiative,Amount Of Noise,Attack Success,Benign Samples,Black-box Attacks,CIFAR-100 Dataset,Class Activation Maps,Cognitive Scores,Deep Models,Deep Neural Network,Explainable Artificial Intelligence,Internet Of Things Devices,Interpretation Of Maps,Lightweight Model,Long Short-term Memory,Medical Data,Mini-Mental State Examination,Model Interpretation,Model Performance,Noise Rate,Onset Time,Precision And Recall,Synthetic Minority Oversampling Technique,Test Performance,Time Series,Top-5 Accuracy,Accuracy Of Model,Action Recognition,AdaBoost,Adversarial Setting,Adversary Model,Adverse Events,Affect Model Performance,
Biography
Tamer Abuhmed received the Ph.D. degree in information and telecommunication engineering from Inha University in 2012. He is currently an Assistant Professor with the Department of Computer Engineering, Inha University, South Korea. His research interests include applied cryptography and information security, network security, Internet security, and machine learning and its application to security and privacy problems.