Hierarchical Classification for Intrusion Detection System: Effective Design and Empirical Analysis Authors: Md. Ashraf Uddin, Sunil Aryal, Mohamed Reda Bouadjenek, Muna Al-Hawawreh, Md. Alamin Talukder | Published: 2024-03-17 Training Data Extraction MethodModel Performance EvaluationHierarchical Classification Methods 2024.03.17 2025.05.27 Literature Database
A Dual-Tier Adaptive One-Class Classification IDS for Emerging Cyberthreats Authors: Md. Ashraf Uddin, Sunil Aryal, Mohamed Reda Bouadjenek, Muna Al-Hawawreh, Md. Alamin Talukder | Published: 2024-03-17 Intrusion Detection SystemUnknown Attack DetectionHierarchical Classification Methods 2024.03.17 2025.05.27 Literature Database
Hierarchical fuzzy neural networks with privacy preservation for heterogeneous big data Authors: Leijie Zhang, Ye Shi, Yu-Cheng Chang, Chin-Teng Lin | Published: 2022-09-18 AlgorithmModel ArchitectureHierarchical Classification Methods 2022.09.18 2025.05.28 Literature Database
CPS Attack Detection under Limited Local Information in Cyber Security: A Multi-node Multi-class Classification Ensemble Approach Authors: Junyi Liu, Yifu Tang, Haimeng Zhao, Xieheng Wang, Fangyu Li, Jingyi Zhang | Published: 2022-09-01 Model Performance EvaluationExperimental ValidationHierarchical Classification Methods 2022.09.01 2025.05.28 Literature Database
$p$-DkNN: Out-of-Distribution Detection Through Statistical Testing of Deep Representations Authors: Adam Dziedzic, Stephan Rabanser, Mohammad Yaghini, Armin Ale, Murat A. Erdogdu, Nicolas Papernot | Published: 2022-07-25 Out-of-Distribution DetectionModel Performance EvaluationHierarchical Classification Methods 2022.07.25 2025.05.28 Literature Database
FLAIR: Federated Learning Annotated Image Repository Authors: Congzheng Song, Filip Granqvist, Kunal Talwar | Published: 2022-07-18 Data Origins and EvolutionEvaluation of Technological NoveltyHierarchical Classification Methods 2022.07.18 2025.05.28 Literature Database
Integrity Authentication in Tree Models Authors: Weijie Zhao, Yingjie Lao, Ping Li | Published: 2022-05-30 | Updated: 2022-06-23 Identification of Signature KeySelection MethodHierarchical Classification Methods 2022.05.30 2025.05.28 Literature Database
SK-Tree: a systematic malware detection algorithm on streaming trees via the signature kernel Authors: Thomas Cochrane, Peter Foster, Varun Chhabra, Maud Lemercier, Cristopher Salvi, Terry Lyons | Published: 2021-02-16 | Updated: 2021-09-29 WatermarkingMalware Detection MethodHierarchical Classification Methods 2021.02.16 2025.05.28 Literature Database