Picture for Xingang Shi

Xingang Shi

threaTrace: Detecting and Tracing Host-based Threats in Node Level Through Provenance Graph Learning

Add code
Nov 08, 2021
Figure 1 for threaTrace: Detecting and Tracing Host-based Threats in Node Level Through Provenance Graph Learning
Figure 2 for threaTrace: Detecting and Tracing Host-based Threats in Node Level Through Provenance Graph Learning
Figure 3 for threaTrace: Detecting and Tracing Host-based Threats in Node Level Through Provenance Graph Learning
Figure 4 for threaTrace: Detecting and Tracing Host-based Threats in Node Level Through Provenance Graph Learning
Viaarxiv icon

DeepAID: Interpreting and Improving Deep Learning-based Anomaly Detection in Security Applications

Add code
Sep 23, 2021
Figure 1 for DeepAID: Interpreting and Improving Deep Learning-based Anomaly Detection in Security Applications
Figure 2 for DeepAID: Interpreting and Improving Deep Learning-based Anomaly Detection in Security Applications
Figure 3 for DeepAID: Interpreting and Improving Deep Learning-based Anomaly Detection in Security Applications
Figure 4 for DeepAID: Interpreting and Improving Deep Learning-based Anomaly Detection in Security Applications
Viaarxiv icon

Practical Traffic-space Adversarial Attacks on Learning-based NIDSs

Add code
May 15, 2020
Figure 1 for Practical Traffic-space Adversarial Attacks on Learning-based NIDSs
Figure 2 for Practical Traffic-space Adversarial Attacks on Learning-based NIDSs
Figure 3 for Practical Traffic-space Adversarial Attacks on Learning-based NIDSs
Figure 4 for Practical Traffic-space Adversarial Attacks on Learning-based NIDSs
Viaarxiv icon