Picture for Giovanni Apruzzese

Giovanni Apruzzese

Concept-based Adversarial Attacks: Tricking Humans and Classifiers Alike

Add code
Mar 18, 2022
Figure 1 for Concept-based Adversarial Attacks: Tricking Humans and Classifiers Alike
Figure 2 for Concept-based Adversarial Attacks: Tricking Humans and Classifiers Alike
Figure 3 for Concept-based Adversarial Attacks: Tricking Humans and Classifiers Alike
Viaarxiv icon

The Cross-evaluation of Machine Learning-based Network Intrusion Detection Systems

Add code
Mar 09, 2022
Figure 1 for The Cross-evaluation of Machine Learning-based Network Intrusion Detection Systems
Figure 2 for The Cross-evaluation of Machine Learning-based Network Intrusion Detection Systems
Figure 3 for The Cross-evaluation of Machine Learning-based Network Intrusion Detection Systems
Figure 4 for The Cross-evaluation of Machine Learning-based Network Intrusion Detection Systems
Viaarxiv icon

On the Evaluation of Sequential Machine Learning for Network Intrusion Detection

Add code
Jun 15, 2021
Figure 1 for On the Evaluation of Sequential Machine Learning for Network Intrusion Detection
Figure 2 for On the Evaluation of Sequential Machine Learning for Network Intrusion Detection
Figure 3 for On the Evaluation of Sequential Machine Learning for Network Intrusion Detection
Figure 4 for On the Evaluation of Sequential Machine Learning for Network Intrusion Detection
Viaarxiv icon

Hardening Random Forest Cyber Detectors Against Adversarial Attacks

Add code
Dec 09, 2019
Figure 1 for Hardening Random Forest Cyber Detectors Against Adversarial Attacks
Figure 2 for Hardening Random Forest Cyber Detectors Against Adversarial Attacks
Figure 3 for Hardening Random Forest Cyber Detectors Against Adversarial Attacks
Figure 4 for Hardening Random Forest Cyber Detectors Against Adversarial Attacks
Viaarxiv icon