Real-time Network Intrusion Detection via Decision Transformers Dec 12, 2023 Decision Making Intrusion Detection
— Unverified 0A Novel Federated Learning-Based IDS for Enhancing UAVs Privacy and Security Dec 7, 2023 Federated Learning Intrusion Detection
— Unverified 0FreqFed: A Frequency Analysis-Based Approach for Mitigating Poisoning Attacks in Federated Learning Dec 7, 2023 Federated Learning image-classification
— Unverified 0A Simple Framework to Enhance the Adversarial Robustness of Deep Learning-based Intrusion Detection System Dec 6, 2023 Adversarial Attack Adversarial Robustness
— Unverified 0Constrained Twin Variational Auto-Encoder for Intrusion Detection in IoT Systems Dec 5, 2023 Intrusion Detection Representation Learning
— Unverified 0Intrusion Detection System with Machine Learning and Multiple Datasets Dec 4, 2023 Intrusion Detection Prompt Engineering
— Unverified 0Anonymous Jamming Detection in 5G with Bayesian Network Model Based Inference Analysis Nov 28, 2023 Anomaly Detection Intrusion Detection
— Unverified 0CML-IDS: Enhancing Intrusion Detection in SDN through Collaborative Machine Learning Nov 28, 2023 Intrusion Detection
Code Code Available 0RIDE: Real-time Intrusion Detection via Explainable Machine Learning Implemented in a Memristor Hardware Architecture Nov 27, 2023 Intrusion Detection Network Intrusion Detection
— Unverified 0Enhancing Intrusion Detection In Internet Of Vehicles Through Federated Learning Nov 23, 2023 Federated Learning Intrusion Detection
— Unverified 0Open Set Dandelion Network for IoT Intrusion Detection Nov 19, 2023 Domain Adaptation Intrusion Detection
— Unverified 0SecureBERT and LLAMA 2 Empowered Control Area Network Intrusion Detection and Classification Nov 19, 2023 Intrusion Detection Language Modeling
— Unverified 0Explaining Tree Model Decisions in Natural Language for Network Intrusion Detection Oct 30, 2023 Intrusion Detection Network Intrusion Detection
— Unverified 0A model for multi-attack classification to improve intrusion detection performance using deep learning approaches Oct 25, 2023 Deep Learning Intrusion Detection
— Unverified 0The Efficacy of Transformer-based Adversarial Attacks in Security Domains Oct 17, 2023 Intrusion Detection Malware Detection
— Unverified 0Give and Take: Federated Transfer Learning for Industrial IoT Network Intrusion Detection Oct 11, 2023 Cloud Computing Intrusion Detection
— Unverified 0ByteStack-ID: Integrated Stacked Model Leveraging Payload Byte Frequency for Grayscale Image-based Network Intrusion Detection Oct 6, 2023 Intrusion Detection Network Intrusion Detection
— Unverified 0Untargeted White-box Adversarial Attack with Heuristic Defence Methods in Real-time Deep Learning based Network Intrusion Detection System Oct 5, 2023 Adversarial Attack Data Augmentation
— Unverified 0One-Class Classification for Intrusion Detection on Vehicular Networks Sep 25, 2023 Classification Intrusion Detection
— Unverified 0Learning-Based Detection of Malicious Volt-VAr Control Parameters in Smart Inverters Sep 19, 2023 Intrusion Detection
— Unverified 0AIDPS:Adaptive Intrusion Detection and Prevention System for Underwater Acoustic Sensor Networks Sep 14, 2023 Drift Detection Intrusion Detection
— Unverified 0TII-SSRC-23 Dataset: Typological Exploration of Diverse Traffic Patterns for Intrusion Detection Sep 14, 2023 Anomaly Detection Binary Classification
— Unverified 0Detecting Unknown Attacks in IoT Environments: An Open Set Classifier for Enhanced Network Intrusion Detection Sep 14, 2023 Intrusion Detection Network Intrusion Detection
— Unverified 0Efficient Network Representation for GNN-based Intrusion Detection Sep 11, 2023 Graph Neural Network Intrusion Detection
— Unverified 0Enhancing Trustworthiness in ML-Based Network Intrusion Detection with Uncertainty Quantification Sep 5, 2023 Active Learning Classification
— Unverified 0Multidomain transformer-based deep learning for early detection of network intrusion Sep 3, 2023 Intrusion Detection Network Intrusion Detection
— Unverified 0Towards Low-Barrier Cybersecurity Research and Education for Industrial Control Systems Aug 31, 2023 Intrusion Detection Learning Theory
— Unverified 0Assessing Cyclostationary Malware Detection via Feature Selection and Classification Aug 29, 2023 Anomaly Detection Classification
— Unverified 0Are Existing Out-Of-Distribution Techniques Suitable for Network Intrusion Detection? Aug 28, 2023 Contrastive Learning Intrusion Detection
Code Code Available 0Unsupervised anomalies detection in IIoT edge devices networks using federated learning Aug 23, 2023 Federated Learning Intrusion Detection
— Unverified 0Performance Comparison and Implementation of Bayesian Variants for Network Intrusion Detection Aug 22, 2023 Anomaly Detection Intrusion Detection
— Unverified 0Real-time Regular Expression Matching Aug 20, 2023 Intrusion Detection Network Intrusion Detection
— Unverified 0Forensic Data Analytics for Anomaly Detection in Evolving Networks Aug 17, 2023 Anomaly Detection Feature Engineering
— Unverified 0SoK: Realistic Adversarial Attacks and Defenses for Intelligent Network Intrusion Detection Aug 13, 2023 Anomaly Detection Intrusion Detection
— Unverified 0A Novel Deep Learning based Model to Defend Network Intrusion Detection System against Adversarial Attacks Jul 31, 2023 Adversarial Attack Intrusion Detection
— Unverified 0Using Kernel SHAP XAI Method to optimize the Network Anomaly Detection Model Jul 31, 2023 Anomaly Detection Explainable artificial intelligence
— Unverified 0Identifying Relevant Features of CSE-CIC-IDS2018 Dataset for the Development of an Intrusion Detection System Jul 21, 2023 feature selection Intrusion Detection
— Unverified 0Towards Reliable Rare Category Analysis on Graphs via Individual Calibration Jul 19, 2023 Fraud Detection Intrusion Detection
Code Code Available 0A Machine Learning based Empirical Evaluation of Cyber Threat Actors High Level Attack Patterns over Low level Attack Patterns in Attributing Attacks Jul 17, 2023 Attribute Intrusion Detection
— Unverified 0Man-in-the-Middle Intrusion Detection Based on CNN-LSTM Model Jul 17, 2023 Intrusion Detection
— Unverified 0Convergence of Communications, Control, and Machine Learning for Secure and Autonomous Vehicle Navigation Jul 5, 2023 Autonomous Navigation Autonomous Vehicles
— Unverified 0Machine Learning-Based Intrusion Detection: Feature Selection versus Feature Extraction Jul 4, 2023 feature selection Intrusion Detection
— Unverified 0Planning Landmark Based Goal Recognition Revisited: Does Using Initial State Landmarks Make Sense? Jun 27, 2023 Intrusion Detection
— Unverified 0An Intelligent Mechanism for Monitoring and Detecting Intrusions in IoT Devices Jun 23, 2023 Federated Learning Intrusion Detection
— Unverified 0Decentralized Online Federated G-Network Learning for Lightweight Intrusion Detection Jun 22, 2023 Federated Learning Intrusion Detection
— Unverified 0Online Self-Supervised Deep Learning for Intrusion Detection Systems Jun 22, 2023 Deep Learning Intrusion Detection
— Unverified 0OptIForest: Optimal Isolation Forest for Anomaly Detection Jun 22, 2023 Anomaly Detection Benchmarking
Code Code Available 0Host-Based Network Intrusion Detection via Feature Flattening and Two-stage Collaborative Classifier Jun 15, 2023 Intrusion Detection Network Intrusion Detection
— Unverified 0Is there a Trojan! : Literature survey and critical evaluation of the latest ML based modern intrusion detection systems in IoT environments Jun 14, 2023 Intrusion Detection
— Unverified 0Intrusion Detection: A Deep Learning Approach Jun 13, 2023 Deep Learning Intrusion Detection
— Unverified 0