Explainable and Transferable Adversarial Attack for ML-Based Network Intrusion Detectors Authors: Hangsheng Zhang, Dongqi Han, Yinlong Liu, Zhiliang Wang, Jiyan Sun, Shangyuan Zhuang, Jiqiang Liu, Jinsong Dong | Published: 2024-01-19 ポイズニングモデルの解釈性敵対的攻撃 2024.01.19 2025.04.03 文献データベース
X Hacking: The Threat of Misguided AutoML Authors: Rahul Sharma, Sergey Redyuk, Sumantrak Mukherjee, Andrea Sipka, Sebastian Vollmer, David Selby | Published: 2024-01-16 | Updated: 2024-02-12 XAI(説明可能なAI)バイアスモデルの解釈性 2024.01.16 2025.04.03 文献データベース
Benchmark Evaluation of Anomaly-Based Intrusion Detection Systems in the Context of Smart Grids Authors: Ömer Sen, Simon Glomb, Martin Henze, Andreas Ulbig | Published: 2023-12-21 モデルの解釈性異常検出手法統計的手法 2023.12.21 2025.04.03 文献データベース
An Explainable Ensemble-based Intrusion Detection System for Software-Defined Vehicle Ad-hoc Networks Authors: Shakil Ibne Ahsan, Phil Legg, S M Iftekharul Alam | Published: 2023-12-08 | Updated: 2024-10-11 モデルの解釈性侵入検知システム車両ネットワーク 2023.12.08 2025.04.03 文献データベース
Characterizing climate pathways using feature importance on echo state networks Authors: Katherine Goode, Daniel Ries, Kellie McClernon | Published: 2023-10-12 データ生成モデルの解釈性気候情報 2023.10.12 2025.04.03 文献データベース
FedEdge AI-TC: A Semi-supervised Traffic Classification Method based on Trusted Federated Deep Learning for Mobile Edge Computing Authors: Pan Wang, Zeyi Li, Mengyi Fu, Zixuan Wang, Ze Zhang, MinYao Liu | Published: 2023-08-14 モデルの解釈性モデル性能評価連合学習 2023.08.14 2025.04.03 文献データベース
The Curse of Recursion: Training on Generated Data Makes Models Forget Authors: Ilia Shumailov, Zakhar Shumaylov, Yiren Zhao, Yarin Gal, Nicolas Papernot, Ross Anderson | Published: 2023-05-27 | Updated: 2024-04-14 LLM性能評価サンプリング手法モデルの解釈性 2023.05.27 2025.04.03 文献データベース
Explainable AI for Android Malware Detection: Towards Understanding Why the Models Perform So Well? Authors: Yue Liu, Chakkrit Tantithamthavorn, Li Li, Yepang Liu | Published: 2022-09-02 モデルの解釈性モデル性能評価実験的検証 2022.09.02 2025.04.03 文献データベース
Explainable Artificial Intelligence Applications in Cyber Security: State-of-the-Art in Research Authors: Zhibo Zhang, Hussam Al Hamadi, Ernesto Damiani, Chan Yeob Yeun, Fatma Taher | Published: 2022-08-31 XAIの応用データセット生成モデルの解釈性 2022.08.31 2025.04.03 文献データベース
Firenze: Model Evaluation Using Weak Signals Authors: Bhavna Soman, Ali Torkamani, Michael J. Morais, Jeffrey Bickford, Baris Coskun | Published: 2022-07-02 データ生成モデルの解釈性評価手法 2022.07.02 2025.04.03 文献データベース