| Adversarial Examples in Constrained Domains | Nov 2, 2020 | Intrusion DetectionNetwork Intrusion Detection | —Unverified | 0 |
| DualNet: Locate Then Detect Effective Payload with Deep Attention Network | Oct 23, 2020 | Deep AttentionIntrusion Detection | —Unverified | 0 |
| Spiking Neural Networks with Single-Spike Temporal-Coded Neurons for Network Intrusion Detection | Oct 15, 2020 | Intrusion DetectionNetwork Intrusion Detection | —Unverified | 0 |
| The Effective Methods for Intrusion Detection With Limited Network Attack Data: Multi-Task Learning and Oversampling | Oct 6, 2020 | Intrusion DetectionMulti-Task Learning | —Unverified | 0 |
| Machine Learning Applications in Misuse and Anomaly Detection | Sep 10, 2020 | Anomaly DetectionBIG-bench Machine Learning | —Unverified | 0 |
| Self-Organizing Map assisted Deep Autoencoding Gaussian Mixture Model for Intrusion Detection | Aug 28, 2020 | Intrusion DetectionNetwork Intrusion Detection | CodeCode Available | 0 |
| Network Intrusion Detection Using Wrapper-based Decision Tree for Feature Selection | Aug 11, 2020 | feature selectionIntrusion Detection | —Unverified | 0 |
| Multi-Stage Optimized Machine Learning Framework for Network Intrusion Detection | Aug 9, 2020 | BIG-bench Machine Learningfeature selection | —Unverified | 0 |
| EagerNet: Early Predictions of Neural Networks for Computationally Efficient Intrusion Detection | Jul 27, 2020 | Intrusion DetectionNetwork Intrusion Detection | CodeCode Available | 0 |
| Adversarial Machine Learning in Network Intrusion Detection Systems | Apr 23, 2020 | BIG-bench Machine LearningIntrusion Detection | —Unverified | 0 |
| A New Intrusion Detection System using the Improved Dendritic Cell Algorithm | Apr 15, 2020 | Binary ClassificationEvolutionary Algorithms | —Unverified | 0 |
| Hybrid Model For Intrusion Detection Systems | Mar 19, 2020 | Intrusion Detectionmodel | —Unverified | 0 |
| 1D CNN Based Network Intrusion Detection with Normalization on Imbalanced Data | Mar 1, 2020 | BIG-bench Machine LearningIntrusion Detection | —Unverified | 0 |
| Survey of Network Intrusion Detection Methods from the Perspective of the Knowledge Discovery in Databases Process | Jan 27, 2020 | Intrusion DetectionNetwork Intrusion Detection | —Unverified | 0 |
| Pelican: A Deep Residual Network for Network Intrusion Detection | Jan 19, 2020 | BIG-bench Machine LearningIntrusion Detection | —Unverified | 0 |
| Synthesis of a Machine Learning Model for Detecting Computer Attacks Based on the CICIDS2017 Dataset | Jan 1, 2020 | Network Intrusion Detection | CodeCode Available | 0 |
| A Robust Comparison of the KDDCup99 and NSL-KDD IoT Network Intrusion Detection Datasets Through Various Machine Learning Algorithms | Dec 31, 2019 | Intrusion DetectionNetwork Intrusion Detection | —Unverified | 0 |
| Network Intrusion Detection based on LSTM and Feature Embedding | Nov 26, 2019 | Binary ClassificationIntrusion Detection | —Unverified | 0 |
| Domain Knowledge Aided Explainable Artificial Intelligence for Intrusion Detection and Response | Nov 22, 2019 | Explainable artificial intelligenceIntrusion Detection | —Unverified | 0 |
| Deep Anomaly Detection with Deviation Networks | Nov 19, 2019 | Anomaly DetectionCyber Attack Detection | CodeCode Available | 0 |
| Intrusion Detection using Sequential Hybrid Model | Oct 26, 2019 | Anomaly DetectionIntrusion Detection | —Unverified | 0 |
| ASNM Datasets: A Collection of Network Traffic Features for Testing of Adversarial Classifiers and Network Intrusion Detectors | Oct 23, 2019 | Intrusion DetectionNetwork Intrusion Detection | —Unverified | 0 |
| WOTBoost: Weighted Oversampling Technique in Boosting for imbalanced learning | Oct 17, 2019 | Fraud DetectionGeneral Classification | —Unverified | 0 |
| LuNet: A Deep Neural Network for Network Intrusion Detection | Sep 22, 2019 | Intrusion DetectionNetwork Intrusion Detection | CodeCode Available | 0 |
| A Transfer Learning Approach for Network Intrusion Detection | Sep 5, 2019 | Intrusion DetectionNetwork Intrusion Detection | —Unverified | 0 |
| SynGAN: Towards Generating Synthetic Network Attacks using GANs | Aug 26, 2019 | Intrusion DetectionNetwork Intrusion Detection | —Unverified | 0 |
| Sparse Bayesian approach for metric learning in latent space | Aug 15, 2019 | Face RecognitionHyperspectral Image Classification | CodeCode Available | 0 |
| Analyzing and Storing Network Intrusion Detection Data using Bayesian Coresets: A Preliminary Study in Offline and Streaming Settings | Jun 20, 2019 | Intrusion DetectionNetwork Intrusion Detection | —Unverified | 0 |
| A Combination of Temporal Sequence Learning and Data Description for Anomaly-based NIDS | Jun 7, 2019 | Anomaly DetectionIntrusion Detection | —Unverified | 0 |
| Mimic Learning to Generate a Shareable Network Intrusion Detection Model | May 2, 2019 | Intrusion DetectionNetwork Intrusion Detection | —Unverified | 0 |
| Building an Efficient Intrusion Detection System Based on Feature Selection and Ensemble Classifier | Apr 2, 2019 | Anomaly DetectionDimensionality Reduction | —Unverified | 0 |
| Active Learning for Network Intrusion Detection | Apr 2, 2019 | Active LearningAnomaly Detection | —Unverified | 0 |
| Rallying Adversarial Techniques against Deep Learning for Network Security | Mar 27, 2019 | BIG-bench Machine LearningDeep Learning | —Unverified | 0 |
| Deep Adversarial Learning in Intrusion Detection: A Data Augmentation Enhanced Framework | Jan 23, 2019 | Data AugmentationIntrusion Detection | —Unverified | 0 |
| Use Dimensionality Reduction and SVM Methods to Increase the Penetration Rate of Computer Networks | Dec 7, 2018 | Anomaly DetectionDiagnostic | —Unverified | 0 |
| Benchmarking datasets for Anomaly-based Network Intrusion Detection: KDD CUP 99 alternatives | Nov 13, 2018 | BenchmarkingIntrusion Detection | CodeCode Available | 0 |
| Evaluating Shallow and Deep Neural Networks for Network Intrusion Detection Systems in Cyber Security | Oct 8, 2018 | BenchmarkingBIG-bench Machine Learning | CodeCode Available | 0 |
| Anomaly Detection via Minimum Likelihood Generative Adversarial Networks | Aug 1, 2018 | Anomaly DetectionIntrusion Detection | —Unverified | 0 |
| Learning Representations of Ultrahigh-dimensional Data for Random Distance-based Outlier Detection | Jun 13, 2018 | Anomaly DetectionDisease Prediction | CodeCode Available | 0 |
| V-CNN: When Convolutional Neural Network encounters Data Visualization | Jun 12, 2018 | Data VisualizationDeep Learning | —Unverified | 0 |
| A Taxonomy of Network Threats and the Effect of Current Datasets on Intrusion Detection Systems | Jun 9, 2018 | Anomaly DetectionIntrusion Detection | CodeCode Available | 0 |
| Onion-Peeling Outlier Detection in 2-D data Sets | Mar 12, 2018 | ClusteringFraud Detection | —Unverified | 0 |
| Kitsune: An Ensemble of Autoencoders for Online Network Intrusion Detection | Feb 25, 2018 | Intrusion DetectionNetwork Intrusion Detection | CodeCode Available | 0 |
| Detection of Adversarial Training Examples in Poisoning Attacks through Anomaly Detection | Feb 8, 2018 | Anomaly DetectionBIG-bench Machine Learning | CodeCode Available | 0 |
| A Deep Belief Network Based Machine Learning System for Risky Host Detection | Dec 29, 2017 | BIG-bench Machine LearningFeature Engineering | —Unverified | 0 |
| A Grassmannian Approach to Zero-Shot Learning for Network Intrusion Detection | Sep 23, 2017 | AttributeIntrusion Detection | —Unverified | 0 |
| Security Evaluation of Pattern Classifiers under Attack | Sep 2, 2017 | ClassificationGeneral Classification | —Unverified | 0 |
| Energy-based Models for Video Anomaly Detection | Aug 17, 2017 | Anomaly DetectionFeature Engineering | —Unverified | 0 |
| Model Selection for Anomaly Detection | Jul 12, 2017 | Anomaly DetectionClassification | —Unverified | 0 |
| Hybrid Isolation Forest - Application to Intrusion Detection | May 10, 2017 | Anomaly DetectionComputational Efficiency | CodeCode Available | 0 |