Picture for Seyit Camtepe

Seyit Camtepe

Optimizing Cyber Defense in Dynamic Active Directories through Reinforcement Learning

Add code
Jun 28, 2024
Figure 1 for Optimizing Cyber Defense in Dynamic Active Directories through Reinforcement Learning
Figure 2 for Optimizing Cyber Defense in Dynamic Active Directories through Reinforcement Learning
Figure 3 for Optimizing Cyber Defense in Dynamic Active Directories through Reinforcement Learning
Figure 4 for Optimizing Cyber Defense in Dynamic Active Directories through Reinforcement Learning
Viaarxiv icon

ST-DPGAN: A Privacy-preserving Framework for Spatiotemporal Data Generation

Add code
Jun 04, 2024
Viaarxiv icon

Provably Unlearnable Examples

Add code
May 06, 2024
Viaarxiv icon

Radio Signal Classification by Adversarially Robust Quantum Machine Learning

Add code
Dec 13, 2023
Figure 1 for Radio Signal Classification by Adversarially Robust Quantum Machine Learning
Figure 2 for Radio Signal Classification by Adversarially Robust Quantum Machine Learning
Figure 3 for Radio Signal Classification by Adversarially Robust Quantum Machine Learning
Figure 4 for Radio Signal Classification by Adversarially Robust Quantum Machine Learning
Viaarxiv icon

Parameter-Saving Adversarial Training: Reinforcing Multi-Perturbation Robustness via Hypernetworks

Add code
Sep 28, 2023
Figure 1 for Parameter-Saving Adversarial Training: Reinforcing Multi-Perturbation Robustness via Hypernetworks
Figure 2 for Parameter-Saving Adversarial Training: Reinforcing Multi-Perturbation Robustness via Hypernetworks
Figure 3 for Parameter-Saving Adversarial Training: Reinforcing Multi-Perturbation Robustness via Hypernetworks
Figure 4 for Parameter-Saving Adversarial Training: Reinforcing Multi-Perturbation Robustness via Hypernetworks
Viaarxiv icon

Reducing Adversarial Training Cost with Gradient Approximation

Add code
Sep 18, 2023
Figure 1 for Reducing Adversarial Training Cost with Gradient Approximation
Figure 2 for Reducing Adversarial Training Cost with Gradient Approximation
Figure 3 for Reducing Adversarial Training Cost with Gradient Approximation
Figure 4 for Reducing Adversarial Training Cost with Gradient Approximation
Viaarxiv icon

Stealthy Physical Masked Face Recognition Attack via Adversarial Style Optimization

Add code
Sep 18, 2023
Figure 1 for Stealthy Physical Masked Face Recognition Attack via Adversarial Style Optimization
Figure 2 for Stealthy Physical Masked Face Recognition Attack via Adversarial Style Optimization
Figure 3 for Stealthy Physical Masked Face Recognition Attack via Adversarial Style Optimization
Figure 4 for Stealthy Physical Masked Face Recognition Attack via Adversarial Style Optimization
Viaarxiv icon

Quantum-Inspired Machine Learning: a Survey

Add code
Sep 08, 2023
Figure 1 for Quantum-Inspired Machine Learning: a Survey
Figure 2 for Quantum-Inspired Machine Learning: a Survey
Figure 3 for Quantum-Inspired Machine Learning: a Survey
Figure 4 for Quantum-Inspired Machine Learning: a Survey
Viaarxiv icon

Classification and Explanation of Distributed Denial-of-Service (DDoS) Attack Detection using Machine Learning and Shapley Additive Explanation (SHAP) Methods

Add code
Jun 27, 2023
Figure 1 for Classification and Explanation of Distributed Denial-of-Service (DDoS) Attack Detection using Machine Learning and Shapley Additive Explanation (SHAP) Methods
Figure 2 for Classification and Explanation of Distributed Denial-of-Service (DDoS) Attack Detection using Machine Learning and Shapley Additive Explanation (SHAP) Methods
Figure 3 for Classification and Explanation of Distributed Denial-of-Service (DDoS) Attack Detection using Machine Learning and Shapley Additive Explanation (SHAP) Methods
Figure 4 for Classification and Explanation of Distributed Denial-of-Service (DDoS) Attack Detection using Machine Learning and Shapley Additive Explanation (SHAP) Methods
Viaarxiv icon

Access-based Lightweight Physical Layer Authentication for the Internet of Things Devices

Add code
Mar 01, 2023
Figure 1 for Access-based Lightweight Physical Layer Authentication for the Internet of Things Devices
Figure 2 for Access-based Lightweight Physical Layer Authentication for the Internet of Things Devices
Figure 3 for Access-based Lightweight Physical Layer Authentication for the Internet of Things Devices
Figure 4 for Access-based Lightweight Physical Layer Authentication for the Internet of Things Devices
Viaarxiv icon