Adversarial Evasion Attacks Practicality in Networks: Testing the Impact of Dynamic Learning Jun 8, 2023 Adversarial Attack Intrusion Detection
— Unverified 0Effective Intrusion Detection in Highly Imbalanced IoT Networks with Lightweight S2CGAN-IDS Jun 6, 2023 Intrusion Detection
— Unverified 0Federated Deep Learning for Intrusion Detection in IoT Networks Jun 5, 2023 Deep Learning Federated Learning
— Unverified 0Exploring Global and Local Information for Anomaly Detection with Normal Samples Jun 3, 2023 Anomaly Detection Fault Diagnosis
— Unverified 0REGARD: Rules of EngaGement for Automated cybeR Defense to aid in Intrusion Response May 23, 2023 Intrusion Detection
— Unverified 0Deep PackGen: A Deep Reinforcement Learning Framework for Adversarial Network Packet Generation May 18, 2023 Deep Reinforcement Learning Intrusion Detection
— Unverified 0Anomaly Detection Dataset for Industrial Control Systems May 11, 2023 Anomaly Detection Intrusion Detection
— Unverified 0POET: A Self-learning Framework for PROFINET Industrial Operations Behaviour Apr 29, 2023 Anomaly Detection Intrusion Detection
— Unverified 0Blockchain Large Language Models Apr 25, 2023 Anomaly Detection Intrusion Detection
— Unverified 0Deep transfer learning for intrusion detection in industrial control networks: A comprehensive review Apr 19, 2023 Intrusion Detection Transfer Learning
— Unverified 0Training Automated Defense Strategies Using Graph-based Cyber Attack Simulations Apr 17, 2023 Intrusion Detection reinforcement-learning
— Unverified 0Late Breaking Results: Scalable and Efficient Hyperdimensional Computing for Network Intrusion Detection Apr 11, 2023 Intrusion Detection Network Intrusion Detection
— Unverified 0BS-GAT Behavior Similarity Based Graph Attention Network for Network Intrusion Detection Apr 7, 2023 Graph Attention graph construction
— Unverified 0Explainable Intrusion Detection Systems Using Competitive Learning Techniques Mar 30, 2023 Intrusion Detection Navigate
— Unverified 0FeDiSa: A Semi-asynchronous Federated Learning Framework for Power System Fault and Cyberattack Discrimination Mar 28, 2023 Federated Learning Intrusion Detection
— Unverified 0Adaptive Bi-Recommendation and Self-Improving Network for Heterogeneous Domain Adaptation-Assisted IoT Intrusion Detection Mar 25, 2023 Domain Adaptation Intrusion Detection
— Unverified 0Feature Reduction Method Comparison Towards Explainability and Efficiency in Cybersecurity Intrusion Detection Systems Mar 22, 2023 feature selection Intrusion Detection
— Unverified 0A Novel Multi-Stage Approach for Hierarchical Intrusion Detection Mar 21, 2023 Anomaly Detection Intrusion Detection
Code Code Available 0Review on the Feasibility of Adversarial Evasion Attacks and Defenses for Network Intrusion Detection Systems Mar 13, 2023 Intrusion Detection Network Intrusion Detection
— Unverified 0Adv-Bot: Realistic Adversarial Botnet Attacks against Network Intrusion Detection Systems Mar 12, 2023 image-classification Image Classification
— Unverified 0CADeSH: Collaborative Anomaly Detection for Smart Homes Mar 2, 2023 Anomaly Detection Intrusion Detection
— Unverified 0EdgeServe: A Streaming System for Decentralized Model Serving Mar 2, 2023 Activity Recognition Autonomous Driving
— Unverified 0Deep Neural Networks based Meta-Learning for Network Intrusion Detection Feb 18, 2023 Intrusion Detection Meta-Learning
— Unverified 0Anomaly based network intrusion detection for IoT attacks using deep learning technique Feb 16, 2023 feature selection Intrusion Detection
— Unverified 0IoT Botnet Detection Using an Economic Deep Learning Model Feb 3, 2023 Deep Learning Intrusion Detection
— Unverified 0Behavioural Reports of Multi-Stage Malware Jan 30, 2023 feature selection Intrusion Detection
Code Code Available 0Towards Adversarial Realism and Robust Learning for IoT Intrusion Detection and Classification Jan 30, 2023 Adversarial Robustness Binary Classification
— Unverified 0Leveraging Planning Landmarks for Hybrid Online Goal Recognition Jan 25, 2023 Intrusion Detection
— Unverified 0Heterogeneous Domain Adaptation for IoT Intrusion Detection: A Geometric Graph Alignment Approach Jan 24, 2023 Domain Adaptation Intrusion Detection
— Unverified 0BayBFed: Bayesian Backdoor Defense for Federated Learning Jan 23, 2023 backdoor defense Federated Learning
— Unverified 0Novelty Detection in Network Traffic: Using Survival Analysis for Feature Identification Jan 16, 2023 Intrusion Detection Novelty Detection
— Unverified 0DRL-GAN: A Hybrid Approach for Binary and Multiclass Network Intrusion Detection Jan 5, 2023 Deep Reinforcement Learning Generative Adversarial Network
— Unverified 0Detection, Explanation and Filtering of Cyber Attacks Combining Symbolic and Sub-Symbolic Methods Dec 23, 2022 Decision Making Explainable Artificial Intelligence (XAI)
— Unverified 0Ensemble learning techniques for intrusion detection system in the context of cybersecurity Dec 21, 2022 Ensemble Learning Intrusion Detection
— Unverified 0DOC-NAD: A Hybrid Deep One-class Classifier for Network Anomaly Detection Dec 15, 2022 Anomaly Detection Intrusion Detection
— Unverified 0Synthesis of Adversarial DDOS Attacks Using Tabular Generative Adversarial Networks Dec 14, 2022 Intrusion Detection Network Intrusion Detection
Code Code Available 0AdvCat: Domain-Agnostic Robustness Assessment for Cybersecurity-Critical Applications with Categorical Inputs Dec 13, 2022 Adversarial Robustness Fake News Detection
— Unverified 0Separating Flows in Encrypted Tunnel Traffic Dec 12, 2022 Intrusion Detection Network Intrusion Detection
Code Code Available 0A Dependable Hybrid Machine Learning Model for Network Intrusion Detection Dec 8, 2022 feature selection Hybrid Machine Learning
— Unverified 0Application of a Dynamic Line Graph Neural Network for Intrusion Detection With Semisupervised Learning Dec 2, 2022 Anomaly Detection Graph Neural Network
— Unverified 0A Hybrid Deep Learning Anomaly Detection Framework for Intrusion Detection Dec 2, 2022 Anomaly Detection Deep Learning
— Unverified 0Network Security Modelling with Distributional Data Nov 24, 2022 Intrusion Detection
— Unverified 0Intrusion Detection in Internet of Things using Convolutional Neural Networks Nov 18, 2022 Intrusion Detection
— Unverified 0A Hypergraph-Based Machine Learning Ensemble Network Intrusion Detection System Nov 8, 2022 Intrusion Detection Network Intrusion Detection
— Unverified 0Reliable Malware Analysis and Detection using Topology Data Analysis Nov 3, 2022 Intrusion Detection Malware Analysis
Code Code Available 0Joint Semantic Transfer Network for IoT Intrusion Detection Oct 28, 2022 Computational Efficiency Domain Adaptation
— Unverified 0GowFed -- A novel Federated Network Intrusion Detection System Oct 28, 2022 Federated Learning Intrusion Detection
— Unverified 0TAD: Transfer Learning-based Multi-Adversarial Detection of Evasion Attacks against Network Intrusion Detection Systems Oct 27, 2022 Intrusion Detection Network Intrusion Detection
— Unverified 0CAN-BERT do it? Controller Area Network Intrusion Detection System based on BERT Language Model Oct 17, 2022 Anomaly Detection Intrusion Detection
— Unverified 0DI-NIDS: Domain Invariant Network Intrusion Detection System Oct 15, 2022 Domain Adaptation Intrusion Detection
— Unverified 0