Alert button
Picture for Khushnaseeb Roshan

Khushnaseeb Roshan

Alert button

Black-box Adversarial Transferability: An Empirical Study in Cybersecurity Perspective

Add code
Bookmark button
Alert button
Apr 15, 2024
Khushnaseeb Roshan, Aasim Zafar

Viaarxiv icon

Untargeted White-box Adversarial Attack with Heuristic Defence Methods in Real-time Deep Learning based Network Intrusion Detection System

Add code
Bookmark button
Alert button
Oct 07, 2023
Khushnaseeb Roshan, Aasim Zafar, Sheikh Burhan Ul Haque

Figure 1 for Untargeted White-box Adversarial Attack with Heuristic Defence Methods in Real-time Deep Learning based Network Intrusion Detection System
Figure 2 for Untargeted White-box Adversarial Attack with Heuristic Defence Methods in Real-time Deep Learning based Network Intrusion Detection System
Figure 3 for Untargeted White-box Adversarial Attack with Heuristic Defence Methods in Real-time Deep Learning based Network Intrusion Detection System
Figure 4 for Untargeted White-box Adversarial Attack with Heuristic Defence Methods in Real-time Deep Learning based Network Intrusion Detection System
Viaarxiv icon

A Novel Deep Learning based Model to Defend Network Intrusion Detection System against Adversarial Attacks

Add code
Bookmark button
Alert button
Jul 31, 2023
Khushnaseeb Roshan, Aasim Zafar, Shiekh Burhan Ul Haque

Figure 1 for A Novel Deep Learning based Model to Defend Network Intrusion Detection System against Adversarial Attacks
Figure 2 for A Novel Deep Learning based Model to Defend Network Intrusion Detection System against Adversarial Attacks
Figure 3 for A Novel Deep Learning based Model to Defend Network Intrusion Detection System against Adversarial Attacks
Figure 4 for A Novel Deep Learning based Model to Defend Network Intrusion Detection System against Adversarial Attacks
Viaarxiv icon

Using Kernel SHAP XAI Method to optimize the Network Anomaly Detection Model

Add code
Bookmark button
Alert button
Jul 31, 2023
Khushnaseeb Roshan, Aasim Zafar

Figure 1 for Using Kernel SHAP XAI Method to optimize the Network Anomaly Detection Model
Figure 2 for Using Kernel SHAP XAI Method to optimize the Network Anomaly Detection Model
Figure 3 for Using Kernel SHAP XAI Method to optimize the Network Anomaly Detection Model
Figure 4 for Using Kernel SHAP XAI Method to optimize the Network Anomaly Detection Model
Viaarxiv icon

Utilizing XAI technique to improve autoencoder based model for computer network anomaly detection with shapley additive explanation(SHAP)

Add code
Bookmark button
Alert button
Dec 14, 2021
Khushnaseeb Roshan, Aasim Zafar

Figure 1 for Utilizing XAI technique to improve autoencoder based model for computer network anomaly detection with shapley additive explanation(SHAP)
Figure 2 for Utilizing XAI technique to improve autoencoder based model for computer network anomaly detection with shapley additive explanation(SHAP)
Figure 3 for Utilizing XAI technique to improve autoencoder based model for computer network anomaly detection with shapley additive explanation(SHAP)
Figure 4 for Utilizing XAI technique to improve autoencoder based model for computer network anomaly detection with shapley additive explanation(SHAP)
Viaarxiv icon