Towards Adversarial Realism and Robust Learning for IoT Intrusion Detection and Classification Jan 30, 2023 Adversarial Robustness Binary Classification
— Unverified 0Towards a graph-based foundation model for network traffic analysis Sep 12, 2024 Few-Shot Learning Intrusion Detection
— Unverified 0Towards an Efficient Anomaly-Based Intrusion Detection for Software-Defined Networks Mar 18, 2018 Intrusion Detection
— Unverified 0Towards a Privacy-preserving Deep Learning-based Network Intrusion Detection in Data Distribution Services Jun 12, 2021 Deep Learning Intrusion Detection
— Unverified 0Towards Explainable Network Intrusion Detection using Large Language Models Aug 8, 2024 Benchmarking Intrusion Detection
— Unverified 0Towards Low-Barrier Cybersecurity Research and Education for Industrial Control Systems Aug 31, 2023 Intrusion Detection Learning Theory
— Unverified 0Towards Network Traffic Monitoring Using Deep Transfer Learning Jan 4, 2021 Classification General Classification
— Unverified 0Toward Supervised Anomaly Detection Jan 23, 2014 Active Learning Anomaly Detection
— Unverified 0Training a Bidirectional GAN-based One-Class Classifier for Network Intrusion Detection Feb 2, 2022 Anomaly Detection Intrusion Detection
— Unverified 0Training a quantum annealing based restricted Boltzmann machine on cybersecurity data Nov 24, 2020 Intrusion Detection
— Unverified 0Training Automated Defense Strategies Using Graph-based Cyber Attack Simulations Apr 17, 2023 Intrusion Detection reinforcement-learning
— Unverified 0Transformers and Large Language Models for Efficient Intrusion Detection Systems: A Comprehensive Survey Aug 14, 2024 Autonomous Vehicles Cloud Computing
— Unverified 0Transforming In-Vehicle Network Intrusion Detection: VAE-based Knowledge Distillation Meets Explainable AI Oct 11, 2024 Autonomous Vehicles Intrusion Detection
— Unverified 0Triadic-OCD: Asynchronous Online Change Detection with Provable Robustness, Optimality, and Convergence May 3, 2024 Change Detection Intrusion Detection
— Unverified 0Trustworthy Anomaly Detection: A Survey Feb 15, 2022 Anomaly Detection Fairness
— Unverified 0Trustworthy Intrusion Detection: Confidence Estimation Using Latent Space Sep 19, 2024 Anomaly Detection Binary Classification
— Unverified 0Two-stage Deep Stacked Autoencoder with Shallow Learning for Network Intrusion Detection System Dec 3, 2021 Feature Engineering Intrusion Detection
— Unverified 0Two Timescale Convergent Q-learning for Sleep--Scheduling in Wireless Sensor Networks Dec 27, 2013 feature selection Intrusion Detection
— Unverified 0Unmasking Stealthy Attacks on Nonlinear DAE Models of Power Grids Feb 28, 2025 Intrusion Detection
— Unverified 0Unsupervised anomalies detection in IIoT edge devices networks using federated learning Aug 23, 2023 Federated Learning Intrusion Detection
— Unverified 0Unsupervised Anomaly Detectors to Detect Intrusions in the Current Threat Landscape Dec 21, 2020 Anomaly Detection Binary Classification
— Unverified 0Unsupervised Intrusion Detection System for Unmanned Aerial Vehicle with Less Labeling Effort Nov 1, 2020 Intrusion Detection
— Unverified 0Untargeted White-box Adversarial Attack with Heuristic Defence Methods in Real-time Deep Learning based Network Intrusion Detection System Oct 5, 2023 Adversarial Attack Data Augmentation
— Unverified 0Use Dimensionality Reduction and SVM Methods to Increase the Penetration Rate of Computer Networks Dec 7, 2018 Anomaly Detection Diagnostic
— Unverified 0User Localization using RF Sensing: A Performance comparison between LIS and mmWave Radars May 17, 2022 Gesture Recognition Intrusion Detection
— Unverified 0usfAD Based Effective Unknown Attack Detection Focused IDS Framework Mar 17, 2024 Anomaly Detection Intrusion Detection
— Unverified 0Using EBGAN for Anomaly Intrusion Detection Jun 21, 2022 Intrusion Detection
— Unverified 0Using Kernel SHAP XAI Method to optimize the Network Anomaly Detection Model Jul 31, 2023 Anomaly Detection Explainable artificial intelligence
— Unverified 0Using Randomness to Improve Robustness of Machine-Learning Models Against Evasion Attacks Aug 10, 2018 BIG-bench Machine Learning Intrusion Detection
— Unverified 0Using Temporal and Topological Features for Intrusion Detection in Operational Networks Jul 9, 2019 Intrusion Detection Time Series
— Unverified 0Utilizing XAI technique to improve autoencoder based model for computer network anomaly detection with shapley additive explanation(SHAP) Dec 14, 2021 Anomaly Detection Explainable artificial intelligence
— Unverified 0V-CNN: When Convolutional Neural Network encounters Data Visualization Jun 12, 2018 Data Visualization Deep Learning
— Unverified 0VHetNets for AI and AI for VHetNets: An Anomaly Detection Case Study for Ubiquitous IoT Oct 14, 2022 Anomaly Detection Intrusion Detection
— Unverified 0Visually Analyze SHAP Plots to Diagnose Misclassifications in ML-based Intrusion Detection Nov 4, 2024 Decision Making Explainable artificial intelligence
— Unverified 0WeiDetect: Weibull Distribution-Based Defense against Poisoning Attacks in Federated Learning for Network Intrusion Detection Systems Apr 6, 2025 Federated Learning Intrusion Detection
— Unverified 0WOTBoost: Weighted Oversampling Technique in Boosting for imbalanced learning Oct 17, 2019 Fraud Detection General Classification
— Unverified 0Zero-Day Botnet Attack Detection in IoV: A Modular Approach Using Isolation Forests and Particle Swarm Optimization Apr 26, 2025 Autonomous Driving Autonomous Vehicles
— Unverified 0Zero-day DDoS Attack Detection Aug 31, 2022 Intrusion Detection Network Intrusion Detection
— Unverified 0Zero-shot learning approach to adaptive Cybersecurity using Explainable AI Jun 21, 2021 Intrusion Detection Management
— Unverified 0Zero-X: A Blockchain-Enabled Open-Set Federated Learning Framework for Zero-Day Attack Detection in IoV Jul 3, 2024 Federated Learning Intrusion Detection
— Unverified 0Evaluation of Machine Learning Classifiers for Zero-Day Intrusion Detection -- An Analysis on CIC-AWS-2018 dataset May 9, 2019 BIG-bench Machine Learning General Classification
— Unverified 0Graph-Powered Defense: Controller Area Network Intrusion Detection for Unmanned Aerial Vehicles Dec 3, 2024 Graph Attention Intrusion Detection
— Unverified 0Hands-on Wireless Sensing with Wi-Fi: A Tutorial Jun 20, 2022 Gesture Recognition Intrusion Detection
— Unverified 0Hardening Random Forest Cyber Detectors Against Adversarial Attacks Dec 9, 2019 BIG-bench Machine Learning Intrusion Detection
— Unverified 0HBFL: A Hierarchical Blockchain-based Federated Learning Framework for a Collaborative IoT Intrusion Detection Apr 8, 2022 Federated Learning Intrusion Detection
— Unverified 0Heterogeneous Domain Adaptation for IoT Intrusion Detection: A Geometric Graph Alignment Approach Jan 24, 2023 Domain Adaptation Intrusion Detection
— Unverified 0Hierarchical Classification for Intrusion Detection System: Effective Design and Empirical Analysis Mar 17, 2024 Classification Intrusion Detection
— Unverified 0Host-based anomaly detection using Eigentraces feature extraction and one-class classification on system call trace data Nov 25, 2019 Anomaly Detection Intrusion Detection
— Unverified 0Host-Based Network Intrusion Detection via Feature Flattening and Two-stage Collaborative Classifier Jun 15, 2023 Intrusion Detection Network Intrusion Detection
— Unverified 0How Far Should We Look Back to Achieve Effective Real-Time Time-Series Anomaly Detection? Feb 12, 2021 Anomaly Detection Fraud Detection
— Unverified 0