Picture for Kevin Choi

Kevin Choi

Accuracy-Privacy Trade-off in the Mitigation of Membership Inference Attack in Federated Learning

Add code
Jul 26, 2024
Viaarxiv icon

Improving Intrusion Detection with Domain-Invariant Representation Learning in Latent Space

Add code
Jan 02, 2024
Viaarxiv icon

FedBayes: A Zero-Trust Federated Learning Aggregation to Defend Against Adversarial Attacks

Add code
Dec 04, 2023
Viaarxiv icon

MIA-BAD: An Approach for Enhancing Membership Inference Attack and its Mitigation with Federated Learning

Add code
Nov 28, 2023
Viaarxiv icon

A Novel Approach To User Agent String Parsing For Vulnerability Analysis Using Mutli-Headed Attention

Add code
Jun 06, 2023
Figure 1 for A Novel Approach To User Agent String Parsing For Vulnerability Analysis Using Mutli-Headed Attention
Figure 2 for A Novel Approach To User Agent String Parsing For Vulnerability Analysis Using Mutli-Headed Attention
Figure 3 for A Novel Approach To User Agent String Parsing For Vulnerability Analysis Using Mutli-Headed Attention
Figure 4 for A Novel Approach To User Agent String Parsing For Vulnerability Analysis Using Mutli-Headed Attention
Viaarxiv icon

Thistle: A Vector Database in Rust

Add code
Mar 25, 2023
Viaarxiv icon

Zero Day Threat Detection Using Metric Learning Autoencoders

Add code
Nov 01, 2022
Viaarxiv icon

Anomaly Detection via Federated Learning

Add code
Oct 12, 2022
Figure 1 for Anomaly Detection via Federated Learning
Figure 2 for Anomaly Detection via Federated Learning
Figure 3 for Anomaly Detection via Federated Learning
Figure 4 for Anomaly Detection via Federated Learning
Viaarxiv icon

Lateral Movement Detection Using User Behavioral Analysis

Add code
Aug 29, 2022
Figure 1 for Lateral Movement Detection Using User Behavioral Analysis
Figure 2 for Lateral Movement Detection Using User Behavioral Analysis
Figure 3 for Lateral Movement Detection Using User Behavioral Analysis
Figure 4 for Lateral Movement Detection Using User Behavioral Analysis
Viaarxiv icon

Zero Day Threat Detection Using Graph and Flow Based Security Telemetry

Add code
May 04, 2022
Figure 1 for Zero Day Threat Detection Using Graph and Flow Based Security Telemetry
Figure 2 for Zero Day Threat Detection Using Graph and Flow Based Security Telemetry
Figure 3 for Zero Day Threat Detection Using Graph and Flow Based Security Telemetry
Figure 4 for Zero Day Threat Detection Using Graph and Flow Based Security Telemetry
Viaarxiv icon