An Effective Deep Learning Based Multi-Class Classification of DoS and DDoS Attack Detection Authors: Arun Kumar Silivery, Kovvur Ram Mohan Rao, L K Suresh Kumar | Published: 2023-08-17 DDoS AttackIntrusion Detection SystemDeep Learning Method 2023.08.17 2025.05.28 Literature Database
Meta-Analysis and Systematic Review for Anomaly Network Intrusion Detection Systems: Detection Methods, Dataset, Validation Methodology, and Challenges Authors: Ziadoon K. Maseer, Robiah Yusof, Baidaa Al-Bander, Abdu Saif, Qusay Kanaan Kadhim | Published: 2023-08-05 | Updated: 2023-08-11 Intrusion Detection SystemMachine Learning MethodDeep Learning Method 2023.08.05 2025.05.28 Literature Database
Integrating Homomorphic Encryption and Trusted Execution Technology for Autonomous and Confidential Model Refining in Cloud Authors: Pinglan Liu, Wensheng Zhang | Published: 2023-08-02 Multi-Party ComputationDeep Learning MethodWatermark Robustness 2023.08.02 2025.05.28 Literature Database
Doubly Robust Instance-Reweighted Adversarial Training Authors: Daouda Sow, Sen Lin, Zhangyang Wang, Yingbin Liang | Published: 2023-08-01 Adversarial attackOptimization MethodsDeep Learning Method 2023.08.01 2025.05.28 Literature Database
A Novel Deep Learning based Model to Defend Network Intrusion Detection System against Adversarial Attacks Authors: Khushnaseeb Roshan, Aasim Zafar, Shiekh Burhan Ul Haque | Published: 2023-07-31 Data PreprocessingAdversarial attackDeep Learning Method 2023.07.31 2025.05.28 Literature Database
Federated Learning Based Distributed Localization of False Data Injection Attacks on Smart Grids Authors: Cihat Keçeci, Katherine R. Davis, Erchin Serpedin | Published: 2023-06-17 AlgorithmDeep Learning MethodFederated Learning 2023.06.17 2025.05.28 Literature Database
Inroads into Autonomous Network Defence using Explained Reinforcement Learning Authors: Myles Foley, Mia Wang, Zoe M, Chris Hicks, Vasilios Mavroudis | Published: 2023-06-15 AlgorithmSimulation Result EvaluationDeep Learning Method 2023.06.15 2025.05.28 Literature Database
Feature Engineering-Based Detection of Buffer Overflow Vulnerability in Source Code Using Neural Networks Authors: Mst Shapna Akter, Hossain Shahriar, Juan Rodriguez Cardenas, Sheikh Iqbal Ahamed, Alfredo Cuzzocrea | Published: 2023-06-01 Deep Learning MethodThreat modelingVulnerability Analysis 2023.06.01 2025.05.28 Literature Database
Frequency maps reveal the correlation between Adversarial Attacks and Implicit Bias Authors: Lorenzo Basile, Nikos Karantzas, Alberto d'Onofrio, Luca Manzoni, Luca Bortolussi, Alex Rodriguez, Fabio Anselmi | Published: 2023-05-24 | Updated: 2025-04-08 Adversarial ExampleAdversarial attackDeep Learning Method 2023.05.24 2025.05.28 Literature Database
Expressive Losses for Verified Robustness via Convex Combinations Authors: Alessandro De Palma, Rudy Bunel, Krishnamurthy Dvijotham, M. Pawan Kumar, Robert Stanforth, Alessio Lomuscio | Published: 2023-05-23 | Updated: 2024-03-18 Parameter TuningMachine Learning MethodDeep Learning Method 2023.05.23 2025.05.28 Literature Database