| Heterogeneous Domain Adaptation for IoT Intrusion Detection: A Geometric Graph Alignment Approach | Jan 24, 2023 | Domain AdaptationIntrusion Detection | —Unverified | 0 |
| Host-Based Network Intrusion Detection via Feature Flattening and Two-stage Collaborative Classifier | Jun 15, 2023 | Intrusion DetectionNetwork Intrusion Detection | —Unverified | 0 |
| Zero-day DDoS Attack Detection | Aug 31, 2022 | Intrusion DetectionNetwork Intrusion Detection | —Unverified | 0 |
| 1D CNN Based Network Intrusion Detection with Normalization on Imbalanced Data | Mar 1, 2020 | BIG-bench Machine LearningIntrusion Detection | —Unverified | 0 |
| A Combination of Temporal Sequence Learning and Data Description for Anomaly-based NIDS | Jun 7, 2019 | Anomaly DetectionIntrusion Detection | —Unverified | 0 |
| Active Learning for Network Intrusion Detection | Apr 2, 2019 | Active LearningAnomaly Detection | —Unverified | 0 |
| A Cyber Threat Intelligence Sharing Scheme based on Federated Learning for Network Intrusion Detection | Nov 4, 2021 | Federated LearningIntrusion Detection | —Unverified | 0 |
| A Deep Belief Network Based Machine Learning System for Risky Host Detection | Dec 29, 2017 | BIG-bench Machine LearningFeature Engineering | —Unverified | 0 |
| A Defensive Framework Against Adversarial Attacks on Machine Learning-Based Network Intrusion Detection Systems | Feb 21, 2025 | Ensemble LearningFeature Engineering | —Unverified | 0 |
| A Dependable Hybrid Machine Learning Model for Network Intrusion Detection | Dec 8, 2022 | feature selectionHybrid Machine Learning | —Unverified | 0 |
| A Dual-Tier Adaptive One-Class Classification IDS for Emerging Cyberthreats | Mar 17, 2024 | ClusteringIntrusion Detection | —Unverified | 0 |
| Integrating Graph Neural Networks with Scattering Transform for Anomaly Detection | Apr 16, 2024 | Anomaly DetectionIntrusion Detection | —Unverified | 0 |
| Adv-Bot: Realistic Adversarial Botnet Attacks against Network Intrusion Detection Systems | Mar 12, 2023 | image-classificationImage Classification | —Unverified | 0 |
| Adversarial Evasion Attacks Practicality in Networks: Testing the Impact of Dynamic Learning | Jun 8, 2023 | Adversarial AttackIntrusion Detection | —Unverified | 0 |
| Adversarial Examples in Constrained Domains | Nov 2, 2020 | Intrusion DetectionNetwork Intrusion Detection | —Unverified | 0 |
| Adversarial Machine Learning in Network Intrusion Detection Systems | Apr 23, 2020 | BIG-bench Machine LearningIntrusion Detection | —Unverified | 0 |
| Adversarial Machine Learning In Network Intrusion Detection Domain: A Systematic Review | Dec 6, 2021 | BIG-bench Machine LearningFeature Engineering | —Unverified | 0 |
| A Grassmannian Approach to Zero-Shot Learning for Network Intrusion Detection | Sep 23, 2017 | AttributeIntrusion Detection | —Unverified | 0 |
| A Hypergraph-Based Machine Learning Ensemble Network Intrusion Detection System | Nov 8, 2022 | Intrusion DetectionNetwork Intrusion Detection | —Unverified | 0 |
| An Adversarial Robustness Benchmark for Enterprise Network Intrusion Detection | Feb 25, 2024 | Adversarial RobustnessCyber Attack Detection | —Unverified | 0 |
| Analyzing and Storing Network Intrusion Detection Data using Bayesian Coresets: A Preliminary Study in Offline and Streaming Settings | Jun 20, 2019 | Intrusion DetectionNetwork Intrusion Detection | —Unverified | 0 |
| An AutoML-based approach for Network Intrusion Detection | Nov 24, 2024 | AutoMLFeature Engineering | —Unverified | 0 |
| Building an Efficient Intrusion Detection System Based on Feature Selection and Ensemble Classifier | Apr 2, 2019 | Anomaly DetectionDimensionality Reduction | —Unverified | 0 |
| A Network Intrusions Detection System based on a Quantum Bio Inspired Algorithm | May 3, 2014 | ClassificationGeneral Classification | —Unverified | 0 |
| A New Intrusion Detection System using the Improved Dendritic Cell Algorithm | Apr 15, 2020 | Binary ClassificationEvolutionary Algorithms | —Unverified | 0 |
| A new semi-supervised inductive transfer learning framework: Co-Transfer | Aug 18, 2021 | Intrusion DetectionNetwork Intrusion Detection | —Unverified | 0 |
| Evaluating Standard Feature Sets Towards Increased Generalisability and Explainability of ML-based Network Intrusion Detection | Apr 15, 2021 | BIG-bench Machine LearningIntrusion Detection | —Unverified | 0 |
| An incremental hybrid adaptive network-based IDS in Software Defined Networks to detect stealth attacks | Apr 1, 2024 | Drift DetectionIntrusion Detection | —Unverified | 0 |
| An Interpretable Federated Learning-based Network Intrusion Detection Framework | Jan 10, 2022 | Federated LearningIntrusion Detection | —Unverified | 0 |
| Anomaly based network intrusion detection for IoT attacks using deep learning technique | Feb 16, 2023 | feature selectionIntrusion Detection | —Unverified | 0 |
| Cybersecurity Anomaly Detection in Adversarial Environments | May 14, 2021 | Anomaly DetectionBIG-bench Machine Learning | —Unverified | 0 |
| Anomaly Detection via Minimum Likelihood Generative Adversarial Networks | Aug 1, 2018 | Anomaly DetectionIntrusion Detection | —Unverified | 0 |
| A Novel Approach To Network Intrusion Detection System Using Deep Learning For Sdn: Futuristic Approach | Aug 3, 2022 | Binary ClassificationDeep Learning | —Unverified | 0 |
| A Novel Deep Learning based Model to Defend Network Intrusion Detection System against Adversarial Attacks | Jul 31, 2023 | Adversarial AttackIntrusion Detection | —Unverified | 0 |
| A Novel Resampling Technique for Imbalanced Dataset Optimization | Dec 30, 2020 | Intrusion DetectionMalware Detection | —Unverified | 0 |
| Are We There Yet? Unraveling the State-of-the-Art Graph Network Intrusion Detection Systems | Mar 26, 2025 | Intrusion DetectionNetwork Intrusion Detection | —Unverified | 0 |
| Security Evaluation of Pattern Classifiers under Attack | Sep 2, 2017 | ClassificationGeneral Classification | —Unverified | 0 |
| Segmented Federated Learning for Adaptive Intrusion Detection System | Jul 2, 2021 | Federated LearningIntrusion Detection | —Unverified | 0 |
| Sequential Binary Classification for Intrusion Detection | Jun 10, 2024 | Binary ClassificationClassification | —Unverified | 0 |
| SoK: Realistic Adversarial Attacks and Defenses for Intelligent Network Intrusion Detection | Aug 13, 2023 | Anomaly DetectionIntrusion Detection | —Unverified | 0 |
| Sorting out typicality with the inverse moment matrix SOS polynomial | Jun 13, 2016 | Intrusion DetectionNetwork Intrusion Detection | —Unverified | 0 |
| Spiking Neural Networks with Single-Spike Temporal-Coded Neurons for Network Intrusion Detection | Oct 15, 2020 | Intrusion DetectionNetwork Intrusion Detection | —Unverified | 0 |
| Statistical Detection of Adversarial examples in Blockchain-based Federated Forest In-vehicle Network Intrusion Detection Systems | Jul 11, 2022 | Autonomous VehiclesIntrusion Detection | —Unverified | 0 |
| Strengthening Network Intrusion Detection in IoT Environments with Self-Supervised Learning and Few Shot Learning | Jun 4, 2024 | Few-Shot LearningIntrusion Detection | —Unverified | 0 |
| Supervised Feature Selection Techniques in Network Intrusion Detection: a Critical Review | Apr 11, 2021 | Feature Correlationfeature selection | —Unverified | 0 |
| Survey of Network Intrusion Detection Methods from the Perspective of the Knowledge Discovery in Databases Process | Jan 27, 2020 | Intrusion DetectionNetwork Intrusion Detection | —Unverified | 0 |
| SynGAN: Towards Generating Synthetic Network Attacks using GANs | Aug 26, 2019 | Intrusion DetectionNetwork Intrusion Detection | —Unverified | 0 |
| Systematic Evaluation of Synthetic Data Augmentation for Multi-class NetFlow Traffic | Aug 28, 2024 | Binary ClassificationClassification | —Unverified | 0 |
| TAD: Transfer Learning-based Multi-Adversarial Detection of Evasion Attacks against Network Intrusion Detection Systems | Oct 27, 2022 | Intrusion DetectionNetwork Intrusion Detection | —Unverified | 0 |
| TANTRA: Timing-Based Adversarial Network Traffic Reshaping Attack | Mar 10, 2021 | Intrusion DetectionNetwork Intrusion Detection | —Unverified | 0 |