Hierarchical Classification Methods

Hierarchical Classification for Intrusion Detection System: Effective Design and Empirical Analysis

Authors: Md. Ashraf Uddin, Sunil Aryal, Mohamed Reda Bouadjenek, Muna Al-Hawawreh, Md. Alamin Talukder | Published: 2024-03-17
Training Data Extraction Method
Model Performance Evaluation
Hierarchical Classification Methods

A Dual-Tier Adaptive One-Class Classification IDS for Emerging Cyberthreats

Authors: Md. Ashraf Uddin, Sunil Aryal, Mohamed Reda Bouadjenek, Muna Al-Hawawreh, Md. Alamin Talukder | Published: 2024-03-17
Intrusion Detection System
Unknown Attack Detection
Hierarchical Classification Methods

Hierarchical fuzzy neural networks with privacy preservation for heterogeneous big data

Authors: Leijie Zhang, Ye Shi, Yu-Cheng Chang, Chin-Teng Lin | Published: 2022-09-18
Algorithm
Model Architecture
Hierarchical Classification Methods

CPS Attack Detection under Limited Local Information in Cyber Security: A Multi-node Multi-class Classification Ensemble Approach

Authors: Junyi Liu, Yifu Tang, Haimeng Zhao, Xieheng Wang, Fangyu Li, Jingyi Zhang | Published: 2022-09-01
Model Performance Evaluation
Experimental Validation
Hierarchical Classification Methods

$p$-DkNN: Out-of-Distribution Detection Through Statistical Testing of Deep Representations

Authors: Adam Dziedzic, Stephan Rabanser, Mohammad Yaghini, Armin Ale, Murat A. Erdogdu, Nicolas Papernot | Published: 2022-07-25
Out-of-Distribution Detection
Model Performance Evaluation
Hierarchical Classification Methods

FLAIR: Federated Learning Annotated Image Repository

Authors: Congzheng Song, Filip Granqvist, Kunal Talwar | Published: 2022-07-18
Data Origins and Evolution
Evaluation of Technological Novelty
Hierarchical Classification Methods

Integrity Authentication in Tree Models

Authors: Weijie Zhao, Yingjie Lao, Ping Li | Published: 2022-05-30 | Updated: 2022-06-23
Identification of Signature Key
Selection Method
Hierarchical Classification Methods

SK-Tree: a systematic malware detection algorithm on streaming trees via the signature kernel

Authors: Thomas Cochrane, Peter Foster, Varun Chhabra, Maud Lemercier, Cristopher Salvi, Terry Lyons | Published: 2021-02-16 | Updated: 2021-09-29
Watermarking
Malware Detection Method
Hierarchical Classification Methods