Alert button
Picture for Elie Alhajjar

Elie Alhajjar

Alert button

A Machine Learning Pressure Emulator for Hydrogen Embrittlement

Add code
Bookmark button
Alert button
Jun 22, 2023
Minh Triet Chau, João Lucas de Sousa Almeida, Elie Alhajjar, Alberto Costa Nogueira Junior

Figure 1 for A Machine Learning Pressure Emulator for Hydrogen Embrittlement
Figure 2 for A Machine Learning Pressure Emulator for Hydrogen Embrittlement
Figure 3 for A Machine Learning Pressure Emulator for Hydrogen Embrittlement
Figure 4 for A Machine Learning Pressure Emulator for Hydrogen Embrittlement
Viaarxiv icon

Novelty Detection in Network Traffic: Using Survival Analysis for Feature Identification

Add code
Bookmark button
Alert button
Jan 16, 2023
Taylor Bradley, Elie Alhajjar, Nathaniel Bastian

Figure 1 for Novelty Detection in Network Traffic: Using Survival Analysis for Feature Identification
Figure 2 for Novelty Detection in Network Traffic: Using Survival Analysis for Feature Identification
Figure 3 for Novelty Detection in Network Traffic: Using Survival Analysis for Feature Identification
Viaarxiv icon

Cubature Kalman Filter Based Training of Hybrid Differential Equation Recurrent Neural Network Physiological Dynamic Models

Add code
Bookmark button
Alert button
Oct 12, 2021
Ahmet Demirkaya, Tales Imbiriba, Kyle Lockwood, Sumientra Rampersad, Elie Alhajjar, Giovanna Guidoboni, Zachary Danziger, Deniz Erdogmus

Figure 1 for Cubature Kalman Filter Based Training of Hybrid Differential Equation Recurrent Neural Network Physiological Dynamic Models
Figure 2 for Cubature Kalman Filter Based Training of Hybrid Differential Equation Recurrent Neural Network Physiological Dynamic Models
Figure 3 for Cubature Kalman Filter Based Training of Hybrid Differential Equation Recurrent Neural Network Physiological Dynamic Models
Viaarxiv icon

Adversarial Machine Learning in Network Intrusion Detection Systems

Add code
Bookmark button
Alert button
Apr 23, 2020
Elie Alhajjar, Paul Maxwell, Nathaniel D. Bastian

Figure 1 for Adversarial Machine Learning in Network Intrusion Detection Systems
Figure 2 for Adversarial Machine Learning in Network Intrusion Detection Systems
Figure 3 for Adversarial Machine Learning in Network Intrusion Detection Systems
Figure 4 for Adversarial Machine Learning in Network Intrusion Detection Systems
Viaarxiv icon