Evaluating and improving adversarial robustness of machine learning-based network intrusion detectors
Machine learning (ML), especially deep learning (DL) techniques have been increasingly
used in anomaly-based network intrusion detection systems (NIDS). However, ML/DL has …
used in anomaly-based network intrusion detection systems (NIDS). However, ML/DL has …
Variational recurrent models for solving partially observable control tasks
In partially observable (PO) environments, deep reinforcement learning (RL) agents often
suffer from unsatisfactory performance, since two problems need to be tackled together: how to …
suffer from unsatisfactory performance, since two problems need to be tackled together: how to …
Deepaid: Interpreting and improving deep learning-based anomaly detection in security applications
Unsupervised Deep Learning (DL) techniques have been widely used in various security-related
anomaly detection applications, owing to the great promise of being able to detect …
anomaly detection applications, owing to the great promise of being able to detect …
[HTML][HTML] Self-organization of action hierarchy and compositionality by reinforcement learning with recurrent neural networks
Recurrent neural networks (RNNs) for reinforcement learning (RL) have shown distinct
advantages, eg, solving memory-dependent tasks and meta-learning. However, little effort has …
advantages, eg, solving memory-dependent tasks and meta-learning. However, little effort has …
Threatrace: Detecting and tracing host-based threats in node level through provenance graph learning
Host-based threats such as Program Attack, Malware Implantation, and Advanced Persistent
Threats (APT), are commonly adopted by modern attackers. Recent studies propose …
Threats (APT), are commonly adopted by modern attackers. Recent studies propose …
[PDF][PDF] Anomaly Detection in the Open World: Normality Shift Detection, Explanation, and Adaptation.
Concept drift is one of the most frustrating challenges for learning-based security
applications built on the closeworld assumption of identical distribution between training and …
applications built on the closeworld assumption of identical distribution between training and …
A multidimensional chaotic image encryption algorithm based on the region of interest
Most image encryption algorithms encrypt the whole image, but only part of the data is
important in the image. In this paper, we propose a multidimensional chaotic image encryption …
important in the image. In this paper, we propose a multidimensional chaotic image encryption …
Variational oracle guiding for reinforcement learning
How to make intelligent decisions is a central problem in machine learning and artificial
intelligence. Despite recent successes of deep reinforcement learning (RL) in various decision …
intelligence. Despite recent successes of deep reinforcement learning (RL) in various decision …
[PDF][PDF] ROV-MI: Large-Scale, Accurate and Efficient Measurement of ROV Deployment.
Securing inter-domain routing systems of the Internet from illegitimate prefix annoucements
has been a great concern for the researchers and network operators. After the failure of …
has been a great concern for the researchers and network operators. After the failure of …
Recent advances in differentiation of isomers by ion mobility mass spectrometry
Differentiation of isomers is an important analytical task in many fields, eg, chemistry, biology,
pharmaceutical science, medicine, environmental science, food science. Ion mobility mass …
pharmaceutical science, medicine, environmental science, food science. Ion mobility mass …