Picture for Jean-Michel Dricot

Jean-Michel Dricot

Review on the Feasibility of Adversarial Evasion Attacks and Defenses for Network Intrusion Detection Systems

Add code
Mar 13, 2023
Figure 1 for Review on the Feasibility of Adversarial Evasion Attacks and Defenses for Network Intrusion Detection Systems
Figure 2 for Review on the Feasibility of Adversarial Evasion Attacks and Defenses for Network Intrusion Detection Systems
Figure 3 for Review on the Feasibility of Adversarial Evasion Attacks and Defenses for Network Intrusion Detection Systems
Figure 4 for Review on the Feasibility of Adversarial Evasion Attacks and Defenses for Network Intrusion Detection Systems
Viaarxiv icon

Adv-Bot: Realistic Adversarial Botnet Attacks against Network Intrusion Detection Systems

Add code
Mar 12, 2023
Viaarxiv icon

TAD: Transfer Learning-based Multi-Adversarial Detection of Evasion Attacks against Network Intrusion Detection Systems

Add code
Oct 27, 2022
Viaarxiv icon

Detect & Reject for Transferability of Black-box Adversarial Attacks Against Network Intrusion Detection Systems

Add code
Dec 22, 2021
Figure 1 for Detect & Reject for Transferability of Black-box Adversarial Attacks Against Network Intrusion Detection Systems
Figure 2 for Detect & Reject for Transferability of Black-box Adversarial Attacks Against Network Intrusion Detection Systems
Figure 3 for Detect & Reject for Transferability of Black-box Adversarial Attacks Against Network Intrusion Detection Systems
Figure 4 for Detect & Reject for Transferability of Black-box Adversarial Attacks Against Network Intrusion Detection Systems
Viaarxiv icon

Adversarial Training for Deep Learning-based Intrusion Detection Systems

Add code
Apr 20, 2021
Figure 1 for Adversarial Training for Deep Learning-based Intrusion Detection Systems
Figure 2 for Adversarial Training for Deep Learning-based Intrusion Detection Systems
Figure 3 for Adversarial Training for Deep Learning-based Intrusion Detection Systems
Figure 4 for Adversarial Training for Deep Learning-based Intrusion Detection Systems
Viaarxiv icon

Efficient Intrusion Detection Using Evidence Theory

Add code
Mar 15, 2021
Figure 1 for Efficient Intrusion Detection Using Evidence Theory
Figure 2 for Efficient Intrusion Detection Using Evidence Theory
Figure 3 for Efficient Intrusion Detection Using Evidence Theory
Figure 4 for Efficient Intrusion Detection Using Evidence Theory
Viaarxiv icon