Alert button
Picture for Slawomir Grzonkowski

Slawomir Grzonkowski

Alert button

Deep Detector Health Management under Adversarial Campaigns

Add code
Bookmark button
Alert button
Nov 19, 2019
Javier Echauz, Keith Kenemer, Sarfaraz Hussein, Jay Dhaliwal, Saurabh Shintre, Slawomir Grzonkowski, Andrew Gardner

Figure 1 for Deep Detector Health Management under Adversarial Campaigns
Figure 2 for Deep Detector Health Management under Adversarial Campaigns
Figure 3 for Deep Detector Health Management under Adversarial Campaigns
Figure 4 for Deep Detector Health Management under Adversarial Campaigns
Viaarxiv icon

Finding Rats in Cats: Detecting Stealthy Attacks using Group Anomaly Detection

Add code
Bookmark button
Alert button
May 20, 2019
Aditya Kuppa, Slawomir Grzonkowski, Muhammad Rizwan Asghar, Nhien-An Le-Khac

Figure 1 for Finding Rats in Cats: Detecting Stealthy Attacks using Group Anomaly Detection
Figure 2 for Finding Rats in Cats: Detecting Stealthy Attacks using Group Anomaly Detection
Figure 3 for Finding Rats in Cats: Detecting Stealthy Attacks using Group Anomaly Detection
Figure 4 for Finding Rats in Cats: Detecting Stealthy Attacks using Group Anomaly Detection
Viaarxiv icon

Detecting DGA domains with recurrent neural networks and side information

Add code
Bookmark button
Alert button
Oct 04, 2018
Ryan R. Curtin, Andrew B. Gardner, Slawomir Grzonkowski, Alexey Kleymenov, Alejandro Mosquera

Figure 1 for Detecting DGA domains with recurrent neural networks and side information
Figure 2 for Detecting DGA domains with recurrent neural networks and side information
Figure 3 for Detecting DGA domains with recurrent neural networks and side information
Figure 4 for Detecting DGA domains with recurrent neural networks and side information
Viaarxiv icon

On Detecting Messaging Abuse in Short Text Messages using Linguistic and Behavioral patterns

Add code
Bookmark button
Alert button
Aug 18, 2014
Alejandro Mosquera, Lamine Aouad, Slawomir Grzonkowski, Dylan Morss

Figure 1 for On Detecting Messaging Abuse in Short Text Messages using Linguistic and Behavioral patterns
Figure 2 for On Detecting Messaging Abuse in Short Text Messages using Linguistic and Behavioral patterns
Figure 3 for On Detecting Messaging Abuse in Short Text Messages using Linguistic and Behavioral patterns
Figure 4 for On Detecting Messaging Abuse in Short Text Messages using Linguistic and Behavioral patterns
Viaarxiv icon