Joint Semantic Transfer Network for IoT Intrusion Detection Oct 28, 2022 Computational Efficiency Domain Adaptation
— Unverified 0TAD: Transfer Learning-based Multi-Adversarial Detection of Evasion Attacks against Network Intrusion Detection Systems Oct 27, 2022 Intrusion Detection Network Intrusion Detection
— Unverified 0CAN-BERT do it? Controller Area Network Intrusion Detection System based on BERT Language Model Oct 17, 2022 Anomaly Detection Intrusion Detection
— Unverified 0DI-NIDS: Domain Invariant Network Intrusion Detection System Oct 15, 2022 Domain Adaptation Intrusion Detection
— Unverified 0VHetNets for AI and AI for VHetNets: An Anomaly Detection Case Study for Ubiquitous IoT Oct 14, 2022 Anomaly Detection Intrusion Detection
— Unverified 0Anomaly Detection via Federated Learning Oct 12, 2022 Anomaly Detection Federated Learning
— Unverified 0FedDef: Defense Against Gradient Leakage in Federated Learning-based Network Intrusion Detection Systems Oct 8, 2022 Adversarial Attack Federated Learning
— Unverified 0Network Intrusion Detection System in a Light Bulb Oct 6, 2022 Intrusion Detection Network Intrusion Detection
— Unverified 0LGTBIDS: Layer-wise Graph Theory Based Intrusion Detection System in Beyond 5G Oct 6, 2022 Intrusion Detection
— Unverified 0Effective Metaheuristic Based Classifiers for Multiclass Intrusion Detection Oct 6, 2022 feature selection Intrusion Detection
— Unverified 0FastPacket: Towards Pre-trained Packets Embedding based on FastText for next-generation NIDS Sep 29, 2022 Deep Learning Intrusion Detection
— Unverified 0Anomaly detection optimization using big data and deep learning to reduce false-positive Sep 28, 2022 Anomaly Detection Intrusion Detection
— Unverified 0Big data analysis and distributed deep learning for next-generation intrusion detection system optimization Sep 28, 2022 Anomaly Detection Chatbot
— Unverified 0A Secure Healthcare 5.0 System Based on Blockchain Technology Entangled with Federated Learning Technique Sep 16, 2022 Federated Learning Intrusion Detection
— Unverified 0Intrusion Detection Systems Using Support Vector Machines on the KDDCUP'99 and NSL-KDD Datasets: A Comprehensive Survey Sep 12, 2022 Intrusion Detection
— Unverified 0A Comparative Study on Unsupervised Anomaly Detection for Time Series: Experiments and Analysis Sep 10, 2022 Anomaly Detection Diversity
— Unverified 0Nature Inspired Metaheuristic Effectiveness Used in Phishing Intrusion Detection Systems with Grey Wolf Algorithm Techniques Sep 9, 2022 Intrusion Detection Metaheuristic Optimization
— Unverified 0Explanation Method for Anomaly Detection on Mixed Numerical and Categorical Spaces Sep 9, 2022 Anomaly Detection Intrusion Detection
— Unverified 0CAN bus intrusion detection based on auxiliary classifier GAN and out-of-distribution detection Sep 5, 2022 Generative Adversarial Network Intrusion Detection
Code Code Available 1RX-ADS: Interpretable Anomaly Detection using Adversarial ML for Electric Vehicle CAN data Sep 5, 2022 Anomaly Detection Explanation Generation
— Unverified 0Zero-day DDoS Attack Detection Aug 31, 2022 Intrusion Detection Network Intrusion Detection
— Unverified 0A deep learning approach to predict the number of k-barriers for intrusion detection over a circular region using wireless sensor networks Aug 25, 2022 Intrusion Detection
Code Code Available 0ECU Identification using Neural Network Classification and Hyperparameter Tuning Aug 22, 2022 Classification Intrusion Detection
— Unverified 0Improving Multilayer-Perceptron(MLP)-based Network Anomaly Detection with Birch Clustering on CICIDS-2017 Dataset Aug 20, 2022 Anomaly Detection Clustering
— Unverified 0Designing an Artificial Immune System inspired Intrusion Detection System Aug 16, 2022 Intrusion Detection
— Unverified 0LCCDE: A Decision-Based Ensemble Framework for Intrusion Detection in The Internet of Vehicles Aug 5, 2022 Autonomous Vehicles Intrusion Detection
Code Code Available 2A Novel Approach To Network Intrusion Detection System Using Deep Learning For Sdn: Futuristic Approach Aug 3, 2022 Binary Classification Deep Learning
— Unverified 0Digital Twin-based Intrusion Detection for Industrial Control Systems Jul 20, 2022 Intrusion Detection
Code Code Available 1IDPS Signature Classification with a Reject Option and the Incorporation of Expert Knowledge Jul 19, 2022 Intrusion Detection
— Unverified 0Supervised Contrastive ResNet and Transfer Learning for the In-vehicle Intrusion Detection System Jul 18, 2022 Intrusion Detection Transfer Learning
— Unverified 0Creating an Explainable Intrusion Detection System Using Self Organizing Maps Jul 15, 2022 Explainable artificial intelligence Explainable Artificial Intelligence (XAI)
— Unverified 0Anomal-E: A Self-Supervised Network Intrusion Detection System based on Graph Neural Networks Jul 14, 2022 Anomaly Detection Intrusion Detection
Code Code Available 1Explainable Intrusion Detection Systems (X-IDS): A Survey of Current Methods, Challenges, and Opportunities Jul 13, 2022 Explainable Artificial Intelligence (XAI) Intrusion Detection
— Unverified 0Statistical Detection of Adversarial examples in Blockchain-based Federated Forest In-vehicle Network Intrusion Detection Systems Jul 11, 2022 Autonomous Vehicles Intrusion Detection
— Unverified 0Bayesian Hyperparameter Optimization for Deep Neural Network-Based Network Intrusion Detection Jul 7, 2022 Bayesian Optimization Hyperparameter Optimization
— Unverified 0An Intrusion Detection System based on Deep Belief Networks Jul 5, 2022 Intrusion Detection Network Intrusion Detection
Code Code Available 1AnoShift: A Distribution Shift Benchmark for Unsupervised Anomaly Detection Jun 30, 2022 Intrusion Detection Network Intrusion Detection
Code Code Available 1CoAP-DoS: An IoT Network Intrusion Dataset Jun 29, 2022 BIG-bench Machine Learning Intrusion Detection
— Unverified 0Robustness Evaluation of Deep Unsupervised Learning Algorithms for Intrusion Detection Systems Jun 25, 2022 Anomaly Detection Data Poisoning
Code Code Available 1LBDMIDS: LSTM Based Deep Learning Model for Intrusion Detection Systems for IoT Networks Jun 23, 2022 Intrusion Detection Network Intrusion Detection
— Unverified 0Open-Source Framework for Encrypted Internet and Malicious Traffic Classification Jun 21, 2022 Intrusion Detection Traffic Classification
Code Code Available 1Using EBGAN for Anomaly Intrusion Detection Jun 21, 2022 Intrusion Detection
— Unverified 0Hands-on Wireless Sensing with Wi-Fi: A Tutorial Jun 20, 2022 Gesture Recognition Intrusion Detection
— Unverified 0When a RF Beats a CNN and GRU, Together -- A Comparison of Deep Learning and Classical Machine Learning Approaches for Encrypted Malware Traffic Classification Jun 16, 2022 Classification Intrusion Detection
Code Code Available 0RTIDS: A Robust Transformer-Based Approach for Intrusion Detection System Jun 13, 2022 Decoder Intrusion Detection
— Unverified 0Are Embedding Spaces Interpretable? Results of an Intrusion Detection Evaluation on a Large French Corpus Jun 1, 2022 Intrusion Detection
— Unverified 0FedSA: Accelerating Intrusion Detection in Collaborative Environments with Federated Simulated Annealing May 23, 2022 Federated Learning Intrusion Detection
— Unverified 0A False Sense of Security? Revisiting the State of Machine Learning-Based Industrial Intrusion Detection May 18, 2022 BIG-bench Machine Learning Intrusion Detection
Code Code Available 0User Localization using RF Sensing: A Performance comparison between LIS and mmWave Radars May 17, 2022 Gesture Recognition Intrusion Detection
— Unverified 0Multibit Tries Packet Classification with Deep Reinforcement Learning May 17, 2022 Classification Deep Reinforcement Learning
— Unverified 0