Alert button
Picture for Julian Jang-Jaccard

Julian Jang-Jaccard

Alert button

Measuring Technological Convergence in Encryption Technologies with Proximity Indices: A Text Mining and Bibliometric Analysis using OpenAlex

Add code
Bookmark button
Alert button
Mar 03, 2024
Alessandro Tavazzi, Dimitri Percia David, Julian Jang-Jaccard, Alain Mermoud

Figure 1 for Measuring Technological Convergence in Encryption Technologies with Proximity Indices: A Text Mining and Bibliometric Analysis using OpenAlex
Figure 2 for Measuring Technological Convergence in Encryption Technologies with Proximity Indices: A Text Mining and Bibliometric Analysis using OpenAlex
Figure 3 for Measuring Technological Convergence in Encryption Technologies with Proximity Indices: A Text Mining and Bibliometric Analysis using OpenAlex
Figure 4 for Measuring Technological Convergence in Encryption Technologies with Proximity Indices: A Text Mining and Bibliometric Analysis using OpenAlex
Viaarxiv icon

Classification and Explanation of Distributed Denial-of-Service (DDoS) Attack Detection using Machine Learning and Shapley Additive Explanation (SHAP) Methods

Add code
Bookmark button
Alert button
Jun 27, 2023
Yuanyuan Wei, Julian Jang-Jaccard, Amardeep Singh, Fariza Sabrina, Seyit Camtepe

Figure 1 for Classification and Explanation of Distributed Denial-of-Service (DDoS) Attack Detection using Machine Learning and Shapley Additive Explanation (SHAP) Methods
Figure 2 for Classification and Explanation of Distributed Denial-of-Service (DDoS) Attack Detection using Machine Learning and Shapley Additive Explanation (SHAP) Methods
Figure 3 for Classification and Explanation of Distributed Denial-of-Service (DDoS) Attack Detection using Machine Learning and Shapley Additive Explanation (SHAP) Methods
Figure 4 for Classification and Explanation of Distributed Denial-of-Service (DDoS) Attack Detection using Machine Learning and Shapley Additive Explanation (SHAP) Methods
Viaarxiv icon

Generative Adversarial Networks for Malware Detection: a Survey

Add code
Bookmark button
Alert button
Feb 24, 2023
Aeryn Dunmore, Julian Jang-Jaccard, Fariza Sabrina, Jin Kwak

Figure 1 for Generative Adversarial Networks for Malware Detection: a Survey
Figure 2 for Generative Adversarial Networks for Malware Detection: a Survey
Figure 3 for Generative Adversarial Networks for Malware Detection: a Survey
Viaarxiv icon

Improving Multilayer-Perceptron(MLP)-based Network Anomaly Detection with Birch Clustering on CICIDS-2017 Dataset

Add code
Bookmark button
Alert button
Aug 20, 2022
Yuhua Yin, Julian Jang-Jaccard, Fariza Sabrina, Jin Kwak

Figure 1 for Improving Multilayer-Perceptron(MLP)-based Network Anomaly Detection with Birch Clustering on CICIDS-2017 Dataset
Figure 2 for Improving Multilayer-Perceptron(MLP)-based Network Anomaly Detection with Birch Clustering on CICIDS-2017 Dataset
Figure 3 for Improving Multilayer-Perceptron(MLP)-based Network Anomaly Detection with Birch Clustering on CICIDS-2017 Dataset
Figure 4 for Improving Multilayer-Perceptron(MLP)-based Network Anomaly Detection with Birch Clustering on CICIDS-2017 Dataset
Viaarxiv icon

LSTM-Autoencoder based Anomaly Detection for Indoor Air Quality Time Series Data

Add code
Bookmark button
Alert button
Apr 14, 2022
Yuanyuan Wei, Julian Jang-Jaccard, Wen Xu, Fariza Sabrina, Seyit Camtepe, Mikael Boulic

Figure 1 for LSTM-Autoencoder based Anomaly Detection for Indoor Air Quality Time Series Data
Figure 2 for LSTM-Autoencoder based Anomaly Detection for Indoor Air Quality Time Series Data
Figure 3 for LSTM-Autoencoder based Anomaly Detection for Indoor Air Quality Time Series Data
Figure 4 for LSTM-Autoencoder based Anomaly Detection for Indoor Air Quality Time Series Data
Viaarxiv icon

IGRF-RFE: A Hybrid Feature Selection Method for MLP-based Network Intrusion Detection on UNSW-NB15 Dataset

Add code
Bookmark button
Alert button
Mar 30, 2022
Yuhua Yin, Julian Jang-Jaccard, Wen Xu, Amardeep Singh, Jinting Zhu, Fariza Sabrina, Jin Kwak

Figure 1 for IGRF-RFE: A Hybrid Feature Selection Method for MLP-based Network Intrusion Detection on UNSW-NB15 Dataset
Figure 2 for IGRF-RFE: A Hybrid Feature Selection Method for MLP-based Network Intrusion Detection on UNSW-NB15 Dataset
Figure 3 for IGRF-RFE: A Hybrid Feature Selection Method for MLP-based Network Intrusion Detection on UNSW-NB15 Dataset
Figure 4 for IGRF-RFE: A Hybrid Feature Selection Method for MLP-based Network Intrusion Detection on UNSW-NB15 Dataset
Viaarxiv icon

Training a Bidirectional GAN-based One-Class Classifier for Network Intrusion Detection

Add code
Bookmark button
Alert button
Feb 02, 2022
Wen Xu, Julian Jang-Jaccard, Tong Liu, Fariza Sabrina

Figure 1 for Training a Bidirectional GAN-based One-Class Classifier for Network Intrusion Detection
Figure 2 for Training a Bidirectional GAN-based One-Class Classifier for Network Intrusion Detection
Figure 3 for Training a Bidirectional GAN-based One-Class Classifier for Network Intrusion Detection
Figure 4 for Training a Bidirectional GAN-based One-Class Classifier for Network Intrusion Detection
Viaarxiv icon

A Game-Theoretic Approach for AI-based Botnet Attack Defence

Add code
Bookmark button
Alert button
Dec 04, 2021
Hooman Alavizadeh, Julian Jang-Jaccard, Tansu Alpcan, Seyit A. Camtepe

Figure 1 for A Game-Theoretic Approach for AI-based Botnet Attack Defence
Figure 2 for A Game-Theoretic Approach for AI-based Botnet Attack Defence
Figure 3 for A Game-Theoretic Approach for AI-based Botnet Attack Defence
Figure 4 for A Game-Theoretic Approach for AI-based Botnet Attack Defence
Viaarxiv icon

Deep Q-Learning based Reinforcement Learning Approach for Network Intrusion Detection

Add code
Bookmark button
Alert button
Nov 27, 2021
Hooman Alavizadeh, Julian Jang-Jaccard, Hootan Alavizadeh

Figure 1 for Deep Q-Learning based Reinforcement Learning Approach for Network Intrusion Detection
Figure 2 for Deep Q-Learning based Reinforcement Learning Approach for Network Intrusion Detection
Figure 3 for Deep Q-Learning based Reinforcement Learning Approach for Network Intrusion Detection
Figure 4 for Deep Q-Learning based Reinforcement Learning Approach for Network Intrusion Detection
Viaarxiv icon

Intrusion Detection using Spatial-Temporal features based on Riemannian Manifold

Add code
Bookmark button
Alert button
Oct 31, 2021
Amardeep Singh, Julian Jang-Jaccard

Figure 1 for Intrusion Detection using Spatial-Temporal features based on Riemannian Manifold
Figure 2 for Intrusion Detection using Spatial-Temporal features based on Riemannian Manifold
Figure 3 for Intrusion Detection using Spatial-Temporal features based on Riemannian Manifold
Figure 4 for Intrusion Detection using Spatial-Temporal features based on Riemannian Manifold
Viaarxiv icon