PinnedSeyyed Ali AyatiDiving Deep into the Solana Validator — Part 1Reading the source code of Solana validator (Part 1).Jul 22, 2022Jul 22, 2022
Seyyed Ali AyatiDos and Don’ts of Machine Learning in Computer Security | Section 3 and 4A Class Summary of CSCE 689 ML-Based Cybersecurity Course Taught by Dr. Marcus Botacin at Texas A&M UniversityFeb 14Feb 14
Seyyed Ali AyatiDos and Don’ts of Machine Learning in Computer Security | Section 2Watch Out for These Machine Learning Pitfalls in Cybersecurity! | A Class Summary of CSCE 689 ML-Based Cybersecurity Course Taught by Dr…Feb 13Feb 13
Seyyed Ali AyatiMachine Learning (In) Security: A Stream of Problems | Sections 6, 7, and 8A Summary of what I have learned…Feb 8Feb 8
Seyyed Ali AyatiMachine Learning (In) Security: A Stream of Problems | Sections 3, 4, and 5A Summary of what I have learned…Feb 6Feb 6
Seyyed Ali AyatiinSystem WeaknessUsing Sequence Modeling to Detect Android Malware in Highly Imbalanced DatasetsA Summary of What I Have Learned!Jan 25Jan 25
Seyyed Ali AyatiinBlock MagnatesExploring Flash Loan Vulnerabilities: Crafting Unique Exploits from ScratchA Hands-On Guide to Understanding Flash Loan Exploits Through Independent ImplementationAug 31, 2023Aug 31, 2023
Seyyed Ali AyatiUnderstanding Flash Loan Attacks Through a Practical ExampleA Comprehensive Case Study of a Flash Loan AttackAug 29, 20231Aug 29, 20231
Seyyed Ali AyatiLearn C++ with LeetCode: Longest Common PrefixI have decided to learn the C++ programming language not by watching courses or online schools, but by using LeetCode exercises. At first…Jul 15, 2023Jul 15, 2023