LBDMIDS: LSTM Based Deep Learning Model for Intrusion Detection Systems for IoT Networks Authors: Kumar Saurabh, Saksham Sood, P. Aditya Kumar, Uphar Singh, Ranjana Vyas, O. P. Vyas, Rahamatullah Khondoker | Published: 2022-06-23 Intrusion Detection SystemDeep Learning MethodEvaluation Method 2022.06.23 2025.05.28 Literature Database
On the explainable properties of 1-Lipschitz Neural Networks: An Optimal Transport Perspective Authors: Mathieu Serrurier, Franck Mamalet, Thomas Fel, Louis Béthune, Thibaut Boissin | Published: 2022-06-14 | Updated: 2024-02-02 Sample ComplexityRobustnessDeep Learning Method 2022.06.14 2025.05.28 Literature Database
Deploying Convolutional Networks on Untrusted Platforms Using 2D Holographic Reduced Representations Authors: Mohammad Mahmudul Alam, Edward Raff, Tim Oates, James Holt | Published: 2022-06-13 Training ProtocolAdversarial Attack MethodsDeep Learning Method 2022.06.13 2025.05.28 Literature Database
Fusing Feature Engineering and Deep Learning: A Case Study for Malware Classification Authors: Daniel Gibert, Carles Mateu, Jordi Planes, Quan Le | Published: 2022-06-12 Malware DetectionAdversarial ExampleDeep Learning Method 2022.06.12 2025.05.28 Literature Database
Darknet Traffic Classification and Adversarial Attacks Authors: Nhien Rust-Nguyen, Mark Stamp | Published: 2022-06-12 Performance EvaluationAdversarial Attack MethodsDeep Learning Method 2022.06.12 2025.05.28 Literature Database
Bayesian Estimation of Differential Privacy Authors: Santiago Zanella-Béguelin, Lukas Wutschitz, Shruti Tople, Ahmed Salem, Victor Rühle, Andrew Paverd, Mohammad Naseri, Boris Köpf, Daniel Jones | Published: 2022-06-10 | Updated: 2022-06-15 Privacy AssessmentBayesian SecurityDeep Learning Method 2022.06.10 2025.05.28 Literature Database
GSmooth: Certified Robustness against Semantic Transformations via Generalized Randomized Smoothing Authors: Zhongkai Hao, Chengyang Ying, Yinpeng Dong, Hang Su, Jun Zhu, Jian Song | Published: 2022-06-09 | Updated: 2022-06-29 RobustnessImpact of GeneralizationDeep Learning Method 2022.06.09 2025.05.28 Literature Database
Dap-FL: Federated Learning flourishes by adaptive tuning and secure aggregation Authors: Qian Chen, Zilong Wang, Jiawei Chen, Haonan Yan, Xiaodong Lin | Published: 2022-06-08 Reinforcement LearningDeep Learning MethodFederated Learning 2022.06.08 2025.05.28 Literature Database
Evaluation of Machine Learning Algorithms in Network-Based Intrusion Detection System Authors: Tuan-Hong Chua, Iftekhar Salam | Published: 2022-03-10 Performance EvaluationDeep Learning MethodFeature Engineering 2022.03.10 2025.05.28 Literature Database
LineVD: Statement-level Vulnerability Detection using Graph Neural Networks Authors: David Hin, Andrey Kan, Huaming Chen, M. Ali Babar | Published: 2022-03-10 | Updated: 2022-03-25 Graph Neural NetworkDeep Learning MethodVulnerability Analysis 2022.03.10 2025.05.28 Literature Database