Alert button
Picture for Joachim Fabini

Joachim Fabini

Alert button

A flow-based IDS using Machine Learning in eBPF

Add code
Bookmark button
Alert button
Feb 19, 2021
Maximilian Bachl, Joachim Fabini, Tanja Zseby

Figure 1 for A flow-based IDS using Machine Learning in eBPF
Viaarxiv icon

LFQ: Online Learning of Per-flow Queuing Policies using Deep Reinforcement Learning

Add code
Bookmark button
Alert button
Jul 08, 2020
Maximilian Bachl, Joachim Fabini, Tanja Zseby

Figure 1 for LFQ: Online Learning of Per-flow Queuing Policies using Deep Reinforcement Learning
Figure 2 for LFQ: Online Learning of Per-flow Queuing Policies using Deep Reinforcement Learning
Figure 3 for LFQ: Online Learning of Per-flow Queuing Policies using Deep Reinforcement Learning
Figure 4 for LFQ: Online Learning of Per-flow Queuing Policies using Deep Reinforcement Learning
Viaarxiv icon

SparseIDS: Learning Packet Sampling with Reinforcement Learning

Add code
Bookmark button
Alert button
Feb 10, 2020
Maximilian Bachl, Fares Meghdouri, Joachim Fabini, Tanja Zseby

Figure 1 for SparseIDS: Learning Packet Sampling with Reinforcement Learning
Figure 2 for SparseIDS: Learning Packet Sampling with Reinforcement Learning
Figure 3 for SparseIDS: Learning Packet Sampling with Reinforcement Learning
Figure 4 for SparseIDS: Learning Packet Sampling with Reinforcement Learning
Viaarxiv icon

Explainability and Adversarial Robustness for RNNs

Add code
Bookmark button
Alert button
Dec 20, 2019
Alexander Hartl, Maximilian Bachl, Joachim Fabini, Tanja Zseby

Figure 1 for Explainability and Adversarial Robustness for RNNs
Figure 2 for Explainability and Adversarial Robustness for RNNs
Figure 3 for Explainability and Adversarial Robustness for RNNs
Figure 4 for Explainability and Adversarial Robustness for RNNs
Viaarxiv icon

Walling up Backdoors in Intrusion Detection Systems

Add code
Bookmark button
Alert button
Oct 17, 2019
Maximilian Bachl, Alexander Hartl, Joachim Fabini, Tanja Zseby

Figure 1 for Walling up Backdoors in Intrusion Detection Systems
Figure 2 for Walling up Backdoors in Intrusion Detection Systems
Figure 3 for Walling up Backdoors in Intrusion Detection Systems
Figure 4 for Walling up Backdoors in Intrusion Detection Systems
Viaarxiv icon