Evaluation of Machine Learning Algorithms in Network-Based Intrusion Detection System

Authors: Tuan-Hong Chua, Iftekhar Salam | Published: 2022-03-10

LineVD: Statement-level Vulnerability Detection using Graph Neural Networks

Authors: David Hin, Andrey Kan, Huaming Chen, M. Ali Babar | Published: 2022-03-10 | Updated: 2022-03-25

The Cross-evaluation of Machine Learning-based Network Intrusion Detection Systems

Authors: Giovanni Apruzzese, Luca Pajola, Mauro Conti | Published: 2022-03-09

Adaptative Perturbation Patterns: Realistic Adversarial Learning for Robust Intrusion Detection

Authors: João Vitorino, Nuno Oliveira, Isabel Praça | Published: 2022-03-08 | Updated: 2022-03-29

LSTMSPLIT: Effective SPLIT Learning based LSTM on Sequential Time-Series Data

Authors: Lianlian Jiang, Yuexuan Wang, Wenyi Zheng, Chao Jin, Zengxiang Li, Sin G. Teo | Published: 2022-03-08

Towards Efficient Data-Centric Robust Machine Learning with Noise-based Augmentation

Authors: Xiaogeng Liu, Haoyu Wang, Yechao Zhang, Fangzhou Wu, Shengshan Hu | Published: 2022-03-08

ImageNet-Patch: A Dataset for Benchmarking Machine Learning Robustness against Adversarial Patches

Authors: Maura Pintor, Daniele Angioni, Angelo Sotgiu, Luca Demetrio, Ambra Demontis, Battista Biggio, Fabio Roli | Published: 2022-03-07 | Updated: 2025-01-15

Vulnerability Detection in Open Source Software: An Introduction

Authors: Stuart Millar | Published: 2022-03-06

Flurry: a Fast Framework for Reproducible Multi-layered Provenance Graph Representation Learning

Authors: Maya Kapoor, Joshua Melton, Michael Ridenhour, Mahalavanya Sriram, Thomas Moyer, Siddharth Krishnan | Published: 2022-03-05

Mobile authentication of copy detection patterns

Authors: Olga Taran, Joakim Tutt, Taras Holotyak, Roman Chaban, Slavi Bonev, Slava Voloshynovskiy | Published: 2022-03-04 | Updated: 2022-05-18