Picture for Islam Debicha

Islam Debicha

Targeted Adversarial Traffic Generation : Black-box Approach to Evade Intrusion Detection Systems in IoT Networks

Add code
Mar 24, 2026
Viaarxiv icon

Review on the Feasibility of Adversarial Evasion Attacks and Defenses for Network Intrusion Detection Systems

Add code
Mar 13, 2023
Figure 1 for Review on the Feasibility of Adversarial Evasion Attacks and Defenses for Network Intrusion Detection Systems
Figure 2 for Review on the Feasibility of Adversarial Evasion Attacks and Defenses for Network Intrusion Detection Systems
Figure 3 for Review on the Feasibility of Adversarial Evasion Attacks and Defenses for Network Intrusion Detection Systems
Figure 4 for Review on the Feasibility of Adversarial Evasion Attacks and Defenses for Network Intrusion Detection Systems
Viaarxiv icon

Adv-Bot: Realistic Adversarial Botnet Attacks against Network Intrusion Detection Systems

Add code
Mar 12, 2023
Viaarxiv icon

TAD: Transfer Learning-based Multi-Adversarial Detection of Evasion Attacks against Network Intrusion Detection Systems

Add code
Oct 27, 2022
Viaarxiv icon

Detect & Reject for Transferability of Black-box Adversarial Attacks Against Network Intrusion Detection Systems

Add code
Dec 22, 2021
Figure 1 for Detect & Reject for Transferability of Black-box Adversarial Attacks Against Network Intrusion Detection Systems
Figure 2 for Detect & Reject for Transferability of Black-box Adversarial Attacks Against Network Intrusion Detection Systems
Figure 3 for Detect & Reject for Transferability of Black-box Adversarial Attacks Against Network Intrusion Detection Systems
Figure 4 for Detect & Reject for Transferability of Black-box Adversarial Attacks Against Network Intrusion Detection Systems
Viaarxiv icon

Adversarial Training for Deep Learning-based Intrusion Detection Systems

Add code
Apr 20, 2021
Figure 1 for Adversarial Training for Deep Learning-based Intrusion Detection Systems
Figure 2 for Adversarial Training for Deep Learning-based Intrusion Detection Systems
Figure 3 for Adversarial Training for Deep Learning-based Intrusion Detection Systems
Figure 4 for Adversarial Training for Deep Learning-based Intrusion Detection Systems
Viaarxiv icon

Efficient Intrusion Detection Using Evidence Theory

Add code
Mar 15, 2021
Figure 1 for Efficient Intrusion Detection Using Evidence Theory
Figure 2 for Efficient Intrusion Detection Using Evidence Theory
Figure 3 for Efficient Intrusion Detection Using Evidence Theory
Figure 4 for Efficient Intrusion Detection Using Evidence Theory
Viaarxiv icon