Alert button
Picture for Vrizlynn L. L. Thing

Vrizlynn L. L. Thing

Alert button

Privacy-Preserving Intrusion Detection using Convolutional Neural Networks

Add code
Bookmark button
Alert button
Apr 15, 2024
Martin Kodys, Zhongmin Dai, Vrizlynn L. L. Thing

Viaarxiv icon

An adversarial attack approach for eXplainable AI evaluation on deepfake detection models

Add code
Bookmark button
Alert button
Dec 08, 2023
Balachandar Gowrisankar, Vrizlynn L. L. Thing

Figure 1 for An adversarial attack approach for eXplainable AI evaluation on deepfake detection models
Figure 2 for An adversarial attack approach for eXplainable AI evaluation on deepfake detection models
Figure 3 for An adversarial attack approach for eXplainable AI evaluation on deepfake detection models
Figure 4 for An adversarial attack approach for eXplainable AI evaluation on deepfake detection models
Viaarxiv icon

Enhancing Cyber-Resilience in Self-Healing Cyber-Physical Systems with Implicit Guarantees

Add code
Bookmark button
Alert button
May 15, 2023
Randolph Loh, Vrizlynn L. L. Thing

Figure 1 for Enhancing Cyber-Resilience in Self-Healing Cyber-Physical Systems with Implicit Guarantees
Figure 2 for Enhancing Cyber-Resilience in Self-Healing Cyber-Physical Systems with Implicit Guarantees
Figure 3 for Enhancing Cyber-Resilience in Self-Healing Cyber-Physical Systems with Implicit Guarantees
Figure 4 for Enhancing Cyber-Resilience in Self-Healing Cyber-Physical Systems with Implicit Guarantees
Viaarxiv icon

Few-shot Weakly-supervised Cybersecurity Anomaly Detection

Add code
Bookmark button
Alert button
Apr 15, 2023
Rahul Kale, Vrizlynn L. L. Thing

Figure 1 for Few-shot Weakly-supervised Cybersecurity Anomaly Detection
Figure 2 for Few-shot Weakly-supervised Cybersecurity Anomaly Detection
Figure 3 for Few-shot Weakly-supervised Cybersecurity Anomaly Detection
Figure 4 for Few-shot Weakly-supervised Cybersecurity Anomaly Detection
Viaarxiv icon

Deepfake Detection with Deep Learning: Convolutional Neural Networks versus Transformers

Add code
Bookmark button
Alert button
Apr 07, 2023
Vrizlynn L. L. Thing

Figure 1 for Deepfake Detection with Deep Learning: Convolutional Neural Networks versus Transformers
Figure 2 for Deepfake Detection with Deep Learning: Convolutional Neural Networks versus Transformers
Figure 3 for Deepfake Detection with Deep Learning: Convolutional Neural Networks versus Transformers
Figure 4 for Deepfake Detection with Deep Learning: Convolutional Neural Networks versus Transformers
Viaarxiv icon

Feature Mining for Encrypted Malicious Traffic Detection with Deep Learning and Other Machine Learning Algorithms

Add code
Bookmark button
Alert button
Apr 07, 2023
Zihao Wang, Vrizlynn L. L. Thing

Figure 1 for Feature Mining for Encrypted Malicious Traffic Detection with Deep Learning and Other Machine Learning Algorithms
Figure 2 for Feature Mining for Encrypted Malicious Traffic Detection with Deep Learning and Other Machine Learning Algorithms
Figure 3 for Feature Mining for Encrypted Malicious Traffic Detection with Deep Learning and Other Machine Learning Algorithms
Figure 4 for Feature Mining for Encrypted Malicious Traffic Detection with Deep Learning and Other Machine Learning Algorithms
Viaarxiv icon

A Hybrid Deep Learning Anomaly Detection Framework for Intrusion Detection

Add code
Bookmark button
Alert button
Dec 02, 2022
Rahul Kale, Zhi Lu, Kar Wai Fok, Vrizlynn L. L. Thing

Figure 1 for A Hybrid Deep Learning Anomaly Detection Framework for Intrusion Detection
Figure 2 for A Hybrid Deep Learning Anomaly Detection Framework for Intrusion Detection
Figure 3 for A Hybrid Deep Learning Anomaly Detection Framework for Intrusion Detection
Figure 4 for A Hybrid Deep Learning Anomaly Detection Framework for Intrusion Detection
Viaarxiv icon

IEEE Big Data Cup 2022: Privacy Preserving Matching of Encrypted Images with Deep Learning

Add code
Bookmark button
Alert button
Nov 18, 2022
Vrizlynn L. L. Thing

Figure 1 for IEEE Big Data Cup 2022: Privacy Preserving Matching of Encrypted Images with Deep Learning
Figure 2 for IEEE Big Data Cup 2022: Privacy Preserving Matching of Encrypted Images with Deep Learning
Figure 3 for IEEE Big Data Cup 2022: Privacy Preserving Matching of Encrypted Images with Deep Learning
Figure 4 for IEEE Big Data Cup 2022: Privacy Preserving Matching of Encrypted Images with Deep Learning
Viaarxiv icon

Intrusion Detection in Internet of Things using Convolutional Neural Networks

Add code
Bookmark button
Alert button
Nov 18, 2022
Martin Kodys, Zhi Lu, Kar Wai Fok, Vrizlynn L. L. Thing

Figure 1 for Intrusion Detection in Internet of Things using Convolutional Neural Networks
Figure 2 for Intrusion Detection in Internet of Things using Convolutional Neural Networks
Figure 3 for Intrusion Detection in Internet of Things using Convolutional Neural Networks
Figure 4 for Intrusion Detection in Internet of Things using Convolutional Neural Networks
Viaarxiv icon

Clustering based opcode graph generation for malware variant detection

Add code
Bookmark button
Alert button
Nov 18, 2022
Kar Wai Fok, Vrizlynn L. L. Thing

Figure 1 for Clustering based opcode graph generation for malware variant detection
Figure 2 for Clustering based opcode graph generation for malware variant detection
Figure 3 for Clustering based opcode graph generation for malware variant detection
Figure 4 for Clustering based opcode graph generation for malware variant detection
Viaarxiv icon