Unsupervised Network Intrusion Detection System for AVTP in Automotive Ethernet Networks Authors: Natasha Alkhatib, Maria Mushtaq, Hadi Ghauch, Jean-Luc Danger | Published: 2022-01-31 | Updated: 2022-04-25 Deep Learning-Based IDSAnomaly Detection MethodAutomotive Network Security 2022.01.31 2025.05.28 Literature Database
Machine Learning Interpretability Meets TLS Fingerprinting Authors: Mahdi Jafari Siavoshani, Amir Hossein Khajepour, Amirmohammad Ziaei, Amir Ali Gatmiri, Ali Taheri | Published: 2020-11-12 | Updated: 2021-09-12 Data LeakageModel Performance EvaluationDeep Learning-Based IDS 2020.11.12 2025.05.28 Literature Database
EMPIR: Ensembles of Mixed Precision Deep Networks for Increased Robustness against Adversarial Attacks Authors: Sanchari Sen, Balaraman Ravindran, Anand Raghunathan | Published: 2020-04-21 Machine LearningDeep Learning-Based IDSDefense Method 2020.04.21 2025.05.28 Literature Database
Network Intrusion Detection based on LSTM and Feature Embedding Authors: Hyeokmin Gwon, Chungjun Lee, Rakun Keum, Heeyoul Choi | Published: 2019-11-26 Attack TypeMachine Learning ApplicationDeep Learning-Based IDS 2019.11.26 2025.05.28 Literature Database
Host-based anomaly detection using Eigentraces feature extraction and one-class classification on system call trace data Authors: Ehsan Aghaei, Gursel Serpen | Published: 2019-11-25 Model Performance EvaluationDeep Learning-Based IDSResearch Methodology 2019.11.25 2025.05.28 Literature Database
Deep Learning in steganography and steganalysis from 2015 to 2018 Authors: Marc Chaumont | Published: 2019-03-31 | Updated: 2019-10-16 Steganography TechniquesMachine Learning ApplicationDeep Learning-Based IDS 2019.03.31 2025.05.28 Literature Database
Deep-Net: Deep Neural Network for Cyber Security Use Cases Authors: Vinayakumar R, Barathi Ganesh HB, Prabaharan Poornachandran, Anand Kumar M, Soman KP | Published: 2018-12-09 Cyber ThreatMalware DetectionDeep Learning-Based IDS 2018.12.09 2025.05.28 Literature Database
How Robust are Deep Neural Networks? Authors: Biswa Sengupta, Karl J. Friston | Published: 2018-04-30 Certified RobustnessDeep Learning-Based IDSWatermarking Technology 2018.04.30 2025.05.28 Literature Database