Alert button
Picture for Zhi Lu

Zhi Lu

Alert button

A Hybrid Deep Learning Anomaly Detection Framework for Intrusion Detection

Add code
Bookmark button
Alert button
Dec 02, 2022
Rahul Kale, Zhi Lu, Kar Wai Fok, Vrizlynn L. L. Thing

Figure 1 for A Hybrid Deep Learning Anomaly Detection Framework for Intrusion Detection
Figure 2 for A Hybrid Deep Learning Anomaly Detection Framework for Intrusion Detection
Figure 3 for A Hybrid Deep Learning Anomaly Detection Framework for Intrusion Detection
Figure 4 for A Hybrid Deep Learning Anomaly Detection Framework for Intrusion Detection
Viaarxiv icon

Intrusion Detection in Internet of Things using Convolutional Neural Networks

Add code
Bookmark button
Alert button
Nov 18, 2022
Martin Kodys, Zhi Lu, Kar Wai Fok, Vrizlynn L. L. Thing

Figure 1 for Intrusion Detection in Internet of Things using Convolutional Neural Networks
Figure 2 for Intrusion Detection in Internet of Things using Convolutional Neural Networks
Figure 3 for Intrusion Detection in Internet of Things using Convolutional Neural Networks
Figure 4 for Intrusion Detection in Internet of Things using Convolutional Neural Networks
Viaarxiv icon

PhilaeX: Explaining the Failure and Success of AI Models in Malware Detection

Add code
Bookmark button
Alert button
Jul 02, 2022
Zhi Lu, Vrizlynn L. L. Thing

Figure 1 for PhilaeX: Explaining the Failure and Success of AI Models in Malware Detection
Figure 2 for PhilaeX: Explaining the Failure and Success of AI Models in Malware Detection
Viaarxiv icon

RFGAN: RF-Based Human Synthesis

Add code
Bookmark button
Alert button
Dec 07, 2021
Cong Yu, Zhi Wu, Dongheng Zhang, Zhi Lu, Yang Hu, Yan Chen

Figure 1 for RFGAN: RF-Based Human Synthesis
Figure 2 for RFGAN: RF-Based Human Synthesis
Figure 3 for RFGAN: RF-Based Human Synthesis
Figure 4 for RFGAN: RF-Based Human Synthesis
Viaarxiv icon

"How Does It Detect A Malicious App?" Explaining the Predictions of AI-based Android Malware Detector

Add code
Bookmark button
Alert button
Nov 06, 2021
Zhi Lu, Vrizlynn L. L. Thing

Figure 1 for "How Does It Detect A Malicious App?" Explaining the Predictions of AI-based Android Malware Detector
Figure 2 for "How Does It Detect A Malicious App?" Explaining the Predictions of AI-based Android Malware Detector
Figure 3 for "How Does It Detect A Malicious App?" Explaining the Predictions of AI-based Android Malware Detector
Figure 4 for "How Does It Detect A Malicious App?" Explaining the Predictions of AI-based Android Malware Detector
Viaarxiv icon

Automated Detection of Individual Micro-calcifications from Mammograms using a Multi-stage Cascade Approach

Add code
Bookmark button
Alert button
Oct 07, 2016
Zhi Lu, Gustavo Carneiro, Neeraj Dhungel, Andrew P. Bradley

Figure 1 for Automated Detection of Individual Micro-calcifications from Mammograms using a Multi-stage Cascade Approach
Figure 2 for Automated Detection of Individual Micro-calcifications from Mammograms using a Multi-stage Cascade Approach
Figure 3 for Automated Detection of Individual Micro-calcifications from Mammograms using a Multi-stage Cascade Approach
Figure 4 for Automated Detection of Individual Micro-calcifications from Mammograms using a Multi-stage Cascade Approach
Viaarxiv icon