SSCAE — Semantic, Syntactic, and Context-aware natural language Adversarial Examples generator Authors: Javad Rafiei Asl, Mohammad H. Rafiei, Manar Alohaly, Daniel Takabi | Published: 2024-03-18 Dynamic Threshold CalculationAdversarial ExampleEvaluation Method 2024.03.18 2025.05.27 Literature Database
Problem space structural adversarial attacks for Network Intrusion Detection Systems based on Graph Neural Networks Authors: Andrea Venturi, Dario Stabili, Mirco Marchetti | Published: 2024-03-18 | Updated: 2024-04-23 Intrusion Detection SystemAdversarial TrainingStructural Attack 2024.03.18 2025.05.27 Literature Database
Nonsmooth Implicit Differentiation: Deterministic and Stochastic Convergence Rates Authors: Riccardo Grazzi, Massimiliano Pontil, Saverio Salzo | Published: 2024-03-18 | Updated: 2024-06-04 Convergence GuaranteeConvergence AnalysisOptimization Problem 2024.03.18 2025.05.27 Literature Database
Semantic Data Representation for Explainable Windows Malware Detection Models Authors: Peter Švec, Štefan Balogh, Martin Homola, Ján Kľuka, Tomáš Bisták | Published: 2024-03-18 WatermarkingDataset GenerationMalware Classification 2024.03.18 2025.05.27 Literature Database
Hierarchical Classification for Intrusion Detection System: Effective Design and Empirical Analysis Authors: Md. Ashraf Uddin, Sunil Aryal, Mohamed Reda Bouadjenek, Muna Al-Hawawreh, Md. Alamin Talukder | Published: 2024-03-17 Training Data Extraction MethodModel Performance EvaluationHierarchical Classification Methods 2024.03.17 2025.05.27 Literature Database
CBR — Boosting Adaptive Classification By Retrieval of Encrypted Network Traffic with Out-of-distribution Authors: Amir Lukach, Ran Dubin, Amit Dvir, Chen Hajaj | Published: 2024-03-17 Few-Shot LearningMalware ClassificationMethods for Dynamically Identifying New Classes 2024.03.17 2025.05.27 Literature Database
A Dual-Tier Adaptive One-Class Classification IDS for Emerging Cyberthreats Authors: Md. Ashraf Uddin, Sunil Aryal, Mohamed Reda Bouadjenek, Muna Al-Hawawreh, Md. Alamin Talukder | Published: 2024-03-17 Intrusion Detection SystemUnknown Attack DetectionHierarchical Classification Methods 2024.03.17 2025.05.27 Literature Database
usfAD Based Effective Unknown Attack Detection Focused IDS Framework Authors: Md. Ashraf Uddin, Sunil Aryal, Mohamed Reda Bouadjenek, Muna Al-Hawawreh, Md. Alamin Talukder | Published: 2024-03-17 DDoS Attack DetectionIntrusion Detection SystemUnknown Attack Detection 2024.03.17 2025.05.27 Literature Database
Pencil: Private and Extensible Collaborative Learning without the Non-Colluding Assumption Authors: Xuanqi Liu, Zhuotao Liu, Qi Li, Ke Xu, Mingwei Xu | Published: 2024-03-17 Training ProtocolPrivacy Protection MethodFederated Learning 2024.03.17 2025.05.27 Literature Database
QuantumLeak: Stealing Quantum Neural Networks from Cloud-based NISQ Machines Authors: Zhenxiao Fu, Min Yang, Cheng Chu, Yilun Xu, Gang Huang, Fan Chen | Published: 2024-03-16 WatermarkingModel Extraction AttackQuantum Framework 2024.03.16 2025.05.27 Literature Database