Alert button
Picture for Wesley Joon-Wie Tann

Wesley Joon-Wie Tann

Alert button

Mitigating Adversarial Attacks by Distributing Different Copies to Different Users

Add code
Bookmark button
Alert button
Nov 30, 2021
Jiyi Zhang, Wesley Joon-Wie Tann, Ee-Chien Chang

Figure 1 for Mitigating Adversarial Attacks by Distributing Different Copies to Different Users
Figure 2 for Mitigating Adversarial Attacks by Distributing Different Copies to Different Users
Figure 3 for Mitigating Adversarial Attacks by Distributing Different Copies to Different Users
Figure 4 for Mitigating Adversarial Attacks by Distributing Different Copies to Different Users
Viaarxiv icon

Filtering DDoS Attacks from Unlabeled Network Traffic Data Using Online Deep Learning

Add code
Bookmark button
Alert button
Dec 12, 2020
Wesley Joon-Wie Tann, Jackie Tan Jin Wei, Joanna Purba, Ee-Chien Chang

Figure 1 for Filtering DDoS Attacks from Unlabeled Network Traffic Data Using Online Deep Learning
Figure 2 for Filtering DDoS Attacks from Unlabeled Network Traffic Data Using Online Deep Learning
Figure 3 for Filtering DDoS Attacks from Unlabeled Network Traffic Data Using Online Deep Learning
Figure 4 for Filtering DDoS Attacks from Unlabeled Network Traffic Data Using Online Deep Learning
Viaarxiv icon

SHADOWCAST: Controlling Network Properties to Explain Graph Generation

Add code
Bookmark button
Alert button
Jun 06, 2020
Wesley Joon-Wie Tann, Ee-Chien Chang, Bryan Hooi

Figure 1 for SHADOWCAST: Controlling Network Properties to Explain Graph Generation
Figure 2 for SHADOWCAST: Controlling Network Properties to Explain Graph Generation
Figure 3 for SHADOWCAST: Controlling Network Properties to Explain Graph Generation
Figure 4 for SHADOWCAST: Controlling Network Properties to Explain Graph Generation
Viaarxiv icon