Alert button
Picture for Peilun Wu

Peilun Wu

Alert button

Evaluation and Optimization of Rendering Techniques for Autonomous Driving Simulation

Add code
Bookmark button
Alert button
Jun 27, 2023
Chengyi Wang, Chunji Xu, Peilun Wu

Figure 1 for Evaluation and Optimization of Rendering Techniques for Autonomous Driving Simulation
Figure 2 for Evaluation and Optimization of Rendering Techniques for Autonomous Driving Simulation
Figure 3 for Evaluation and Optimization of Rendering Techniques for Autonomous Driving Simulation
Figure 4 for Evaluation and Optimization of Rendering Techniques for Autonomous Driving Simulation
Viaarxiv icon

Holmes: An Efficient and Lightweight Semantic Based Anomalous Email Detector

Add code
Bookmark button
Alert button
May 12, 2021
Peilun Wu, Shiyi Yang, Hui Guo

Figure 1 for Holmes: An Efficient and Lightweight Semantic Based Anomalous Email Detector
Figure 2 for Holmes: An Efficient and Lightweight Semantic Based Anomalous Email Detector
Figure 3 for Holmes: An Efficient and Lightweight Semantic Based Anomalous Email Detector
Figure 4 for Holmes: An Efficient and Lightweight Semantic Based Anomalous Email Detector
Viaarxiv icon

DualNet: Locate Then Detect Effective Payload with Deep Attention Network

Add code
Bookmark button
Alert button
Oct 23, 2020
Shiyi Yang, Peilun Wu, Hui Guo

Figure 1 for DualNet: Locate Then Detect Effective Payload with Deep Attention Network
Figure 2 for DualNet: Locate Then Detect Effective Payload with Deep Attention Network
Figure 3 for DualNet: Locate Then Detect Effective Payload with Deep Attention Network
Figure 4 for DualNet: Locate Then Detect Effective Payload with Deep Attention Network
Viaarxiv icon

Densely Connected Residual Network for Attack Recognition

Add code
Bookmark button
Alert button
Aug 05, 2020
Peilun Wu, Nour Moustafa, Shiyi Yang, Hui Guo

Figure 1 for Densely Connected Residual Network for Attack Recognition
Figure 2 for Densely Connected Residual Network for Attack Recognition
Figure 3 for Densely Connected Residual Network for Attack Recognition
Figure 4 for Densely Connected Residual Network for Attack Recognition
Viaarxiv icon

Pelican: A Deep Residual Network for Network Intrusion Detection

Add code
Bookmark button
Alert button
Feb 04, 2020
Peilun Wu, Hui Guo

Figure 1 for Pelican: A Deep Residual Network for Network Intrusion Detection
Figure 2 for Pelican: A Deep Residual Network for Network Intrusion Detection
Figure 3 for Pelican: A Deep Residual Network for Network Intrusion Detection
Figure 4 for Pelican: A Deep Residual Network for Network Intrusion Detection
Viaarxiv icon

LuNet: A Deep Neural Network for Network Intrusion Detection

Add code
Bookmark button
Alert button
Oct 06, 2019
Peilun Wu, Hui Guo

Figure 1 for LuNet: A Deep Neural Network for Network Intrusion Detection
Figure 2 for LuNet: A Deep Neural Network for Network Intrusion Detection
Figure 3 for LuNet: A Deep Neural Network for Network Intrusion Detection
Figure 4 for LuNet: A Deep Neural Network for Network Intrusion Detection
Viaarxiv icon

A Transfer Learning Approach for Network Intrusion Detection

Add code
Bookmark button
Alert button
Oct 04, 2019
Peilun Wu, Hui Guo, Richard Buckland

Figure 1 for A Transfer Learning Approach for Network Intrusion Detection
Figure 2 for A Transfer Learning Approach for Network Intrusion Detection
Figure 3 for A Transfer Learning Approach for Network Intrusion Detection
Figure 4 for A Transfer Learning Approach for Network Intrusion Detection
Viaarxiv icon