Change Detection in Noisy Dynamic Networks: A Spectral Embedding Approach Oct 5, 2019 Change Detection Fraud Detection
— Unverified 0Intrusion detection systems using classical machine learning techniques versus integrated unsupervised feature learning and deep neural network Oct 1, 2019 BIG-bench Machine Learning Feature Engineering
— Unverified 0K-Metamodes: frequency- and ensemble-based distributed k-modes clustering for security analytics Sep 30, 2019 Clustering Intrusion Detection
Code Code Available 0LuNet: A Deep Neural Network for Network Intrusion Detection Sep 22, 2019 Intrusion Detection Network Intrusion Detection
Code Code Available 0Detecting malicious logins as graph anomalies Sep 19, 2019 Intrusion Detection
— Unverified 0Walling up Backdoors in Intrusion Detection Systems Sep 17, 2019 Autonomous Driving Intrusion Detection
Code Code Available 0Destination-aware Adaptive Traffic Flow Rule Aggregation in Software-Defined Networks Sep 7, 2019 Intrusion Detection
— Unverified 0A Transfer Learning Approach for Network Intrusion Detection Sep 5, 2019 Intrusion Detection Network Intrusion Detection
— Unverified 0TEST: an End-to-End Network Traffic Examination and Identification Framework Based on Spatio-Temporal Features Extraction Aug 26, 2019 Intrusion Detection Traffic Classification
— Unverified 0SynGAN: Towards Generating Synthetic Network Attacks using GANs Aug 26, 2019 Intrusion Detection Network Intrusion Detection
— Unverified 0Sparse Bayesian approach for metric learning in latent space Aug 15, 2019 Face Recognition Hyperspectral Image Classification
Code Code Available 0Omni SCADA Intrusion Detection Using Deep Learning Algorithms Aug 6, 2019 Deep Learning Intrusion Detection
— Unverified 0Road Context-aware Intrusion Detection System for Autonomous Cars Aug 2, 2019 Intrusion Detection
— Unverified 0Learning Neural Representations for Network Anomaly Detection Aug 1, 2019 Anomaly Detection Intrusion Detection
Code Code Available 0Data Analysis of Wireless Networks Using Classification Techniques Jul 22, 2019 Classification General Classification
— Unverified 0New Era of Deeplearning-Based Malware Intrusion Detection: The Malware Detection and Prediction Based On Deep Learning Jul 19, 2019 Clustering Deep Learning
— Unverified 0Using Temporal and Topological Features for Intrusion Detection in Operational Networks Jul 9, 2019 Intrusion Detection Time Series
— Unverified 0Multivariate Big Data Analysis for Intrusion Detection: 5 steps from the haystack to the needle Jun 27, 2019 Anomaly Detection Intrusion Detection
— Unverified 0Analyzing and Storing Network Intrusion Detection Data using Bayesian Coresets: A Preliminary Study in Offline and Streaming Settings Jun 20, 2019 Intrusion Detection Network Intrusion Detection
— Unverified 0Finding Needles in a Moving Haystack: Prioritizing Alerts with Adversarial Reinforcement Learning Jun 20, 2019 Intrusion Detection reinforcement-learning
— Unverified 0Deep Reinforcement Learning for Cyber Security Jun 13, 2019 Deep Reinforcement Learning Intrusion Detection
— Unverified 0A Combination of Temporal Sequence Learning and Data Description for Anomaly-based NIDS Jun 7, 2019 Anomaly Detection Intrusion Detection
— Unverified 0CANet: An Unsupervised Intrusion Detection System for High Dimensional CAN Bus Data Jun 6, 2019 Intrusion Detection
— Unverified 0The Adversarial Machine Learning Conundrum: Can The Insecurity of ML Become The Achilles' Heel of Cognitive Networks? Jun 3, 2019 Intrusion Detection Traffic Classification
— Unverified 0Generative Adversarial Networks for Distributed Intrusion Detection in the Internet of Things Jun 3, 2019 Generative Adversarial Network Intrusion Detection
— Unverified 0Attacker Behaviour Profiling using Stochastic Ensemble of Hidden Markov Models May 28, 2019 Ensemble Learning Intrusion Detection
— Unverified 0Building an Effective Intrusion Detection System using Unsupervised Feature Selection in Multi-objective Optimization Framework May 16, 2019 feature selection Intrusion Detection
— Unverified 0Modern Problems Require Modern Solutions: Hybrid Concepts for Industrial Intrusion Detection May 15, 2019 Intrusion Detection
— Unverified 0Analyzing Adversarial Attacks Against Deep Learning for Intrusion Detection in IoT Networks May 13, 2019 Adversarial Robustness Intrusion Detection
— Unverified 0Evaluation of Machine Learning Classifiers for Zero-Day Intrusion Detection -- An Analysis on CIC-AWS-2018 dataset May 9, 2019 BIG-bench Machine Learning General Classification
— Unverified 0Convolutional Neural Network for Intrusion Detection System In Cyber Physical Systems May 8, 2019 Intrusion Detection
— Unverified 0Mimic Learning to Generate a Shareable Network Intrusion Detection Model May 2, 2019 Intrusion Detection Network Intrusion Detection
— Unverified 0Exploring Information Centrality for Intrusion Detection in Large Networks Apr 27, 2019 Anomaly Detection Intrusion Detection
— Unverified 0End-to-End Adversarial Learning for Intrusion Detection in Computer Networks Apr 25, 2019 Diversity Intrusion Detection
— Unverified 0Should I Raise The Red Flag? A comprehensive survey of anomaly scoring methods toward mitigating false alarms Apr 14, 2019 Anomaly Detection Intrusion Detection
— Unverified 0A Compendium on Network and Host based Intrusion Detection Systems Apr 6, 2019 Deep Learning Intrusion Detection
— Unverified 0Efficient GAN-based method for cyber-intrusion detection Apr 4, 2019 Anomaly Detection Generative Adversarial Network
— Unverified 0Active Learning for Network Intrusion Detection Apr 2, 2019 Active Learning Anomaly Detection
— Unverified 0Building an Efficient Intrusion Detection System Based on Feature Selection and Ensemble Classifier Apr 2, 2019 Anomaly Detection Dimensionality Reduction
— Unverified 0Extending Signature-based Intrusion Detection Systems WithBayesian Abductive Reasoning Mar 28, 2019 Intrusion Detection
— Unverified 0Rallying Adversarial Techniques against Deep Learning for Network Security Mar 27, 2019 BIG-bench Machine Learning Deep Learning
— Unverified 0Probabilistic Modeling for Novelty Detection with Applications to Fraud Identification Mar 5, 2019 Decoder Fraud Detection
— Unverified 0A comparative evaluation of novelty detection algorithms for discrete sequences Feb 28, 2019 Fraud Detection Intrusion Detection
— Unverified 0Securing Fog-to-Things Environment Using Intrusion Detection System Based On Ensemble Learning Jan 30, 2019 Anomaly Detection Ensemble Learning
— Unverified 0Deep Adversarial Learning in Intrusion Detection: A Data Augmentation Enhanced Framework Jan 23, 2019 Data Augmentation Intrusion Detection
— Unverified 0A short review on Applications of Deep learning for Cyber security Dec 15, 2018 Android Malware Detection BIG-bench Machine Learning
— Unverified 0Anomaly Generation using Generative Adversarial Networks in Host Based Intrusion Detection Dec 11, 2018 Anomaly Detection Intrusion Detection
— Unverified 0Attentional Heterogeneous Graph Neural Network: Application to Program Reidentification Dec 10, 2018 Graph Classification Graph Embedding
— Unverified 0Use Dimensionality Reduction and SVM Methods to Increase the Penetration Rate of Computer Networks Dec 7, 2018 Anomaly Detection Diagnostic
— Unverified 0Cyber Anomaly Detection Using Graph-node Role-dynamics Dec 6, 2018 Anomaly Detection Intrusion Detection
— Unverified 0