< Home

Preprints:

  1. Membership Inference Attacks on DNNs using Adversarial Perturbations
    Hassan Ali, Adnan Qayyum, Ala Al-Fuqaha, and Junaid Qadir
    arXiv preprint arXiv:2307.05193 (2023).
    Links: [Paper] [Code]

  2. Robust Surgical Tools Detection in Endoscopic Videos with Noisy Data
    Adnan Qayyum, Hassan Ali, Massimo Caputo, Hunaid Vohra, Taofeek Akinosho, Sofiat Abioye, Ilhem Berrou, Pawel Capik, Junaid Qadir, Muhammad Bilal
    arXiv preprint arXiv:2307.01232 (2023).
    Links: [Paper]

  3. HaS-Nets: A Heal and Select Mechanism to Defend DNNs Against Backdoor Attacks for Data Collection Scenarios
    Hassan Ali, Surya Nepal, Salil S. Kanhere, and Sanjay Jha
    arXiv preprint arXiv:2012.07474 (2020).
    Links: [Paper]

Publications:

  1. Robust Encrypted Inference in Deep Learning: A Pathway to Secure Misinformation Detection
    Hassan Ali*, Rana Tallal Javed*, Adnan Qayyum, Amer AlGhadhban, Meshari Alazmi, Ahmad Alzamil, Khaled Al-utaibi, and Junaid Qadir (*equal contribution)
    IEEE Transactions on Dependable and Secure Computing (2024).
    Links: [Paper] [Code]

  2. R2S100K: Road-Region Segmentation Dataset For Semi-Supervised Autonomous Driving in the Wild
    Muhammad Atif Butt, Hassan Ali, Adnan Qayyum, Waqas Sultani, Ala Al-Fuqaha, and Junaid Qadir
    International Journal of Computer Vision (2024).
    Links: [Paper] [Code]

  3. Adversarial Machine Learning for Social Good: Reframing the Adversary as an Ally
    Shawqi Al-Maliki, Adnan Qayyum, Hassan Ali, Mohamed Abdallah, Junaid Qadir, Dinh Thai Hoang, Dusit Niyato, Ala Al-Fuqaha
    IEEE Transactions on Artificial Intelligence (2024).
    Links: [Paper]

  4. Secure and Trustworthy Artificial Intelligence-Extended Reality (AI-XR) for Metaverses
    Adnan Qayyum, Muhammad Atif Butt, Hassan Ali, Muhammad Usman, Osama Halabi, Ala Al-Fuqaha, Qammer H. Abbasi, Muhammad Ali Imran, and Junaid Qadir
    ACM Computing Surveys (2024).
    Links: [Paper]

  5. Consistent Valid Physically-Realizable Adversarial Attack against Crowd-flow Prediction Models
    Hassan Ali, Muhammad Atif Butt, Fethi Filali, Ala Al-Fuqaha, and Junaid Qadir
    IEEE Transactions on Intelligent Transportation Systems (2023).
    Links: [Paper] [Code]

  6. Con-detect: Detecting adversarially perturbed natural language inputs to deep classifiers through holistic analysis
    Hassan Ali*, Muhammad Suleman Khan*, Amer AlGhadhban, Meshari Alazmi, Ahmad Alzamil, Khaled AlUtaibi, and Junaid Qadir (*equal contribution)
    Computers & Security 132 (2023): 103367.
    Links: [Paper] [Code]

  7. Towards secure private and trustworthy human-centric embedded machine learning: An emotion-aware facial recognition case study
    Muhammad Atif Butt, Adnan Qayyum, Hassan Ali, Ala Al-Fuqaha, and Junaid Qadir
    Computers & Security 125 (2023): 103058.
    Links: [Paper] [Code]

  8. Tamp-X: Attacking explainable natural language classifiers through tampered activations
    Hassan Ali*, Muhammad Suleman Khan*, Ala Al-Fuqaha, and Junaid Qadir (*equal contribution)
    Computers & Security 120 (2022): 102791.
    Links: [Paper] [Code]

  9. All your fake detector are belong to us: evaluating adversarial robustness of fake-news detectors under black-box settings
    Hassan Ali, Muhammad Suleman Khan, Amer AlGhadhban, Meshari Alazmi, Ahmad Alzamil, Khaled Al-Utaibi, and Junaid Qadir
    IEEE Access 9 (2021): 81678-81692.
    Links: [Paper]

  10. Fadec: A fast decision-based attack for adversarial machine learning
    Faiq Khalid*, Hassan Ali*, Muhammad Abdullah Hanif, Semeen Rehman, Rehan Ahmed, and Muhammad Shafique (*equal contribution)
    In 2020 International Joint Conference on Neural Networks (IJCNN), pp. 1-8. IEEE, 2020.
    Links: [Paper] [Code]

  11. Sscnets: Robustifying dnns using secure selective convolutional filters
    Hassan Ali*, Faiq Khalid*, Hammad Ali Tariq, Muhammad Abdullah Hanif, Rehan Ahmed, and Semeen Rehman (*equal contribution)
    IEEE Design & Test 37, no. 2 (2019): 58-65.
    Links: [Paper] [Code]

  12. Qusecnets: Quantization-based defense mechanism for securing deep neural network against adversarial attacks
    Faiq Khalid*, Hassan Ali*, Hammad Tariq, Muhammad Abdullah Hanif, Semeen Rehman, Rehan Ahmed, and Muhammad Shafique (*equal contribution)
    In 2019 IEEE 25th International Symposium on On-Line Testing and Robust System Design (IOLTS), pp. 182-187. IEEE, 2019.
    Links: [Paper] [Code]

  13. SPIE-AAPM-NCI BreastPathQ Challenge: an image analysis challenge for quantitative tumor cellularity assessment in breast cancer histology images following neoadjuvant treatment
    Nicholas Petrick, Shazia Akbar, Kenny H. Cha, Sharon Nofech-Mozes, Berkman Sahiner, Marios A. Gavrielides, Jayashree Kalpathy-Cramer, Karen Drukker, Anne L. Martel, and for the BreastPathQ Challenge Group
    Journal of Medical Imaging 8, no. 3 (2021): 034501-034501.
    Links: [Paper]