VHetNets for AI and AI for VHetNets: An Anomaly Detection Case Study for Ubiquitous IoT Oct 14, 2022 Anomaly Detection Intrusion Detection
— Unverified 0Anomaly Detection via Federated Learning Oct 12, 2022 Anomaly Detection Federated Learning
— Unverified 0FedDef: Defense Against Gradient Leakage in Federated Learning-based Network Intrusion Detection Systems Oct 8, 2022 Adversarial Attack Federated Learning
— Unverified 0Network Intrusion Detection System in a Light Bulb Oct 6, 2022 Intrusion Detection Network Intrusion Detection
— Unverified 0Effective Metaheuristic Based Classifiers for Multiclass Intrusion Detection Oct 6, 2022 feature selection Intrusion Detection
— Unverified 0LGTBIDS: Layer-wise Graph Theory Based Intrusion Detection System in Beyond 5G Oct 6, 2022 Intrusion Detection
— Unverified 0FastPacket: Towards Pre-trained Packets Embedding based on FastText for next-generation NIDS Sep 29, 2022 Deep Learning Intrusion Detection
— Unverified 0Big data analysis and distributed deep learning for next-generation intrusion detection system optimization Sep 28, 2022 Anomaly Detection Chatbot
— Unverified 0Anomaly detection optimization using big data and deep learning to reduce false-positive Sep 28, 2022 Anomaly Detection Intrusion Detection
— Unverified 0A Secure Healthcare 5.0 System Based on Blockchain Technology Entangled with Federated Learning Technique Sep 16, 2022 Federated Learning Intrusion Detection
— Unverified 0Intrusion Detection Systems Using Support Vector Machines on the KDDCUP'99 and NSL-KDD Datasets: A Comprehensive Survey Sep 12, 2022 Intrusion Detection
— Unverified 0A Comparative Study on Unsupervised Anomaly Detection for Time Series: Experiments and Analysis Sep 10, 2022 Anomaly Detection Diversity
— Unverified 0Explanation Method for Anomaly Detection on Mixed Numerical and Categorical Spaces Sep 9, 2022 Anomaly Detection Intrusion Detection
— Unverified 0Nature Inspired Metaheuristic Effectiveness Used in Phishing Intrusion Detection Systems with Grey Wolf Algorithm Techniques Sep 9, 2022 Intrusion Detection Metaheuristic Optimization
— Unverified 0RX-ADS: Interpretable Anomaly Detection using Adversarial ML for Electric Vehicle CAN data Sep 5, 2022 Anomaly Detection Explanation Generation
— Unverified 0Zero-day DDoS Attack Detection Aug 31, 2022 Intrusion Detection Network Intrusion Detection
— Unverified 0A deep learning approach to predict the number of k-barriers for intrusion detection over a circular region using wireless sensor networks Aug 25, 2022 Intrusion Detection
Code Code Available 0ECU Identification using Neural Network Classification and Hyperparameter Tuning Aug 22, 2022 Classification Intrusion Detection
— Unverified 0Improving Multilayer-Perceptron(MLP)-based Network Anomaly Detection with Birch Clustering on CICIDS-2017 Dataset Aug 20, 2022 Anomaly Detection Clustering
— Unverified 0Designing an Artificial Immune System inspired Intrusion Detection System Aug 16, 2022 Intrusion Detection
— Unverified 0A Novel Approach To Network Intrusion Detection System Using Deep Learning For Sdn: Futuristic Approach Aug 3, 2022 Binary Classification Deep Learning
— Unverified 0IDPS Signature Classification with a Reject Option and the Incorporation of Expert Knowledge Jul 19, 2022 Intrusion Detection
— Unverified 0Supervised Contrastive ResNet and Transfer Learning for the In-vehicle Intrusion Detection System Jul 18, 2022 Intrusion Detection Transfer Learning
— Unverified 0Creating an Explainable Intrusion Detection System Using Self Organizing Maps Jul 15, 2022 Explainable artificial intelligence Explainable Artificial Intelligence (XAI)
— Unverified 0Explainable Intrusion Detection Systems (X-IDS): A Survey of Current Methods, Challenges, and Opportunities Jul 13, 2022 Explainable Artificial Intelligence (XAI) Intrusion Detection
— Unverified 0Statistical Detection of Adversarial examples in Blockchain-based Federated Forest In-vehicle Network Intrusion Detection Systems Jul 11, 2022 Autonomous Vehicles Intrusion Detection
— Unverified 0Bayesian Hyperparameter Optimization for Deep Neural Network-Based Network Intrusion Detection Jul 7, 2022 Bayesian Optimization Hyperparameter Optimization
— Unverified 0CoAP-DoS: An IoT Network Intrusion Dataset Jun 29, 2022 BIG-bench Machine Learning Intrusion Detection
— Unverified 0LBDMIDS: LSTM Based Deep Learning Model for Intrusion Detection Systems for IoT Networks Jun 23, 2022 Intrusion Detection Network Intrusion Detection
— Unverified 0Using EBGAN for Anomaly Intrusion Detection Jun 21, 2022 Intrusion Detection
— Unverified 0Hands-on Wireless Sensing with Wi-Fi: A Tutorial Jun 20, 2022 Gesture Recognition Intrusion Detection
— Unverified 0When a RF Beats a CNN and GRU, Together -- A Comparison of Deep Learning and Classical Machine Learning Approaches for Encrypted Malware Traffic Classification Jun 16, 2022 Classification Intrusion Detection
Code Code Available 0RTIDS: A Robust Transformer-Based Approach for Intrusion Detection System Jun 13, 2022 Decoder Intrusion Detection
— Unverified 0Are Embedding Spaces Interpretable? Results of an Intrusion Detection Evaluation on a Large French Corpus Jun 1, 2022 Intrusion Detection
— Unverified 0FedSA: Accelerating Intrusion Detection in Collaborative Environments with Federated Simulated Annealing May 23, 2022 Federated Learning Intrusion Detection
— Unverified 0A False Sense of Security? Revisiting the State of Machine Learning-Based Industrial Intrusion Detection May 18, 2022 BIG-bench Machine Learning Intrusion Detection
Code Code Available 0Multibit Tries Packet Classification with Deep Reinforcement Learning May 17, 2022 Classification Deep Reinforcement Learning
— Unverified 0User Localization using RF Sensing: A Performance comparison between LIS and mmWave Radars May 17, 2022 Gesture Recognition Intrusion Detection
— Unverified 0Explainable and Optimally Configured Artificial Neural Networks for Attack Detection in Smart Homes May 17, 2022 Intrusion Detection
— Unverified 0Many Field Packet Classification with Decomposition and Reinforcement Learning May 16, 2022 Classification Deep Reinforcement Learning
— Unverified 0On Generalisability of Machine Learning-based Network Intrusion Detection Systems May 9, 2022 BIG-bench Machine Learning Intrusion Detection
— Unverified 0Ensemble Classifier Design Tuned to Dataset Characteristics for Network Intrusion Detection May 8, 2022 Classification Intrusion Detection
— Unverified 0Anomaly Detection in Intra-Vehicle Networks May 7, 2022 Anomaly Detection Intrusion Detection
— Unverified 0Federated Semi-Supervised Classification of Multimedia Flows for 3D Networks May 1, 2022 Anomaly Detection feature selection
— Unverified 0An Online Ensemble Learning Model for Detecting Attacks in Wireless Sensor Networks Apr 28, 2022 Ensemble Learning Intrusion Detection
— Unverified 0A review of Federated Learning in Intrusion Detection Systems for IoT Apr 26, 2022 Federated Learning Intrusion Detection
— Unverified 0STC-IDS: Spatial-Temporal Correlation Feature Analyzing based Intrusion Detection System for Intelligent Connected Vehicles Apr 23, 2022 Anomaly Classification Bayesian Optimization
— Unverified 0ARLIF-IDS -- Attention augmented Real-Time Isolation Forest Intrusion Detection System Apr 20, 2022 Intrusion Detection
— Unverified 0Dependable Intrusion Detection System for IoT: A Deep Transfer Learning-based Approach Apr 11, 2022 Attribute Intrusion Detection
— Unverified 0HBFL: A Hierarchical Blockchain-based Federated Learning Framework for a Collaborative IoT Intrusion Detection Apr 8, 2022 Federated Learning Intrusion Detection
— Unverified 0