Deep Learning Method

An Effective Deep Learning Based Multi-Class Classification of DoS and DDoS Attack Detection

Authors: Arun Kumar Silivery, Kovvur Ram Mohan Rao, L K Suresh Kumar | Published: 2023-08-17
DDoS Attack
Intrusion Detection System
Deep Learning Method

Meta-Analysis and Systematic Review for Anomaly Network Intrusion Detection Systems: Detection Methods, Dataset, Validation Methodology, and Challenges

Authors: Ziadoon K. Maseer, Robiah Yusof, Baidaa Al-Bander, Abdu Saif, Qusay Kanaan Kadhim | Published: 2023-08-05 | Updated: 2023-08-11
Intrusion Detection System
Machine Learning Method
Deep Learning Method

Integrating Homomorphic Encryption and Trusted Execution Technology for Autonomous and Confidential Model Refining in Cloud

Authors: Pinglan Liu, Wensheng Zhang | Published: 2023-08-02
Multi-Party Computation
Deep Learning Method
Watermark Robustness

Doubly Robust Instance-Reweighted Adversarial Training

Authors: Daouda Sow, Sen Lin, Zhangyang Wang, Yingbin Liang | Published: 2023-08-01
Adversarial attack
Optimization Methods
Deep Learning Method

A Novel Deep Learning based Model to Defend Network Intrusion Detection System against Adversarial Attacks

Authors: Khushnaseeb Roshan, Aasim Zafar, Shiekh Burhan Ul Haque | Published: 2023-07-31
Data Preprocessing
Adversarial attack
Deep Learning Method

Federated Learning Based Distributed Localization of False Data Injection Attacks on Smart Grids

Authors: Cihat Keçeci, Katherine R. Davis, Erchin Serpedin | Published: 2023-06-17
Algorithm
Deep Learning Method
Federated Learning

Inroads into Autonomous Network Defence using Explained Reinforcement Learning

Authors: Myles Foley, Mia Wang, Zoe M, Chris Hicks, Vasilios Mavroudis | Published: 2023-06-15
Algorithm
Simulation Result Evaluation
Deep Learning Method

Feature Engineering-Based Detection of Buffer Overflow Vulnerability in Source Code Using Neural Networks

Authors: Mst Shapna Akter, Hossain Shahriar, Juan Rodriguez Cardenas, Sheikh Iqbal Ahamed, Alfredo Cuzzocrea | Published: 2023-06-01
Deep Learning Method
Threat modeling
Vulnerability Analysis

Frequency maps reveal the correlation between Adversarial Attacks and Implicit Bias

Authors: Lorenzo Basile, Nikos Karantzas, Alberto d'Onofrio, Luca Manzoni, Luca Bortolussi, Alex Rodriguez, Fabio Anselmi | Published: 2023-05-24 | Updated: 2025-04-08
Adversarial Example
Adversarial attack
Deep Learning Method

Expressive Losses for Verified Robustness via Convex Combinations

Authors: Alessandro De Palma, Rudy Bunel, Krishnamurthy Dvijotham, M. Pawan Kumar, Robert Stanforth, Alessio Lomuscio | Published: 2023-05-23 | Updated: 2024-03-18
Parameter Tuning
Machine Learning Method
Deep Learning Method