Picture for Chunming Wu

Chunming Wu

An Attention-Based Deep Generative Model for Anomaly Detection in Industrial Control Systems

Add code
May 03, 2024
Figure 1 for An Attention-Based Deep Generative Model for Anomaly Detection in Industrial Control Systems
Figure 2 for An Attention-Based Deep Generative Model for Anomaly Detection in Industrial Control Systems
Figure 3 for An Attention-Based Deep Generative Model for Anomaly Detection in Industrial Control Systems
Figure 4 for An Attention-Based Deep Generative Model for Anomaly Detection in Industrial Control Systems
Viaarxiv icon

Self-Supervised Interest Transfer Network via Prototypical Contrastive Learning for Recommendation

Add code
Feb 28, 2023
Viaarxiv icon

Towards the Desirable Decision Boundary by Moderate-Margin Adversarial Training

Add code
Jul 16, 2022
Figure 1 for Towards the Desirable Decision Boundary by Moderate-Margin Adversarial Training
Figure 2 for Towards the Desirable Decision Boundary by Moderate-Margin Adversarial Training
Figure 3 for Towards the Desirable Decision Boundary by Moderate-Margin Adversarial Training
Figure 4 for Towards the Desirable Decision Boundary by Moderate-Margin Adversarial Training
Viaarxiv icon

Treating Crowdsourcing as Examination: How to Score Tasks and Online Workers?

Add code
Apr 26, 2022
Figure 1 for Treating Crowdsourcing as Examination: How to Score Tasks and Online Workers?
Figure 2 for Treating Crowdsourcing as Examination: How to Score Tasks and Online Workers?
Figure 3 for Treating Crowdsourcing as Examination: How to Score Tasks and Online Workers?
Figure 4 for Treating Crowdsourcing as Examination: How to Score Tasks and Online Workers?
Viaarxiv icon

Adversarial Attacks against Windows PE Malware Detection: A Survey of the State-of-the-Art

Add code
Dec 23, 2021
Figure 1 for Adversarial Attacks against Windows PE Malware Detection: A Survey of the State-of-the-Art
Figure 2 for Adversarial Attacks against Windows PE Malware Detection: A Survey of the State-of-the-Art
Figure 3 for Adversarial Attacks against Windows PE Malware Detection: A Survey of the State-of-the-Art
Figure 4 for Adversarial Attacks against Windows PE Malware Detection: A Survey of the State-of-the-Art
Viaarxiv icon

Towards Imperceptible Adversarial Image Patches Based on Network Explanations

Add code
Dec 10, 2020
Figure 1 for Towards Imperceptible Adversarial Image Patches Based on Network Explanations
Figure 2 for Towards Imperceptible Adversarial Image Patches Based on Network Explanations
Figure 3 for Towards Imperceptible Adversarial Image Patches Based on Network Explanations
Figure 4 for Towards Imperceptible Adversarial Image Patches Based on Network Explanations
Viaarxiv icon

Review: Deep Learning Methods for Cybersecurity and Intrusion Detection Systems

Add code
Dec 04, 2020
Figure 1 for Review: Deep Learning Methods for Cybersecurity and Intrusion Detection Systems
Figure 2 for Review: Deep Learning Methods for Cybersecurity and Intrusion Detection Systems
Figure 3 for Review: Deep Learning Methods for Cybersecurity and Intrusion Detection Systems
Figure 4 for Review: Deep Learning Methods for Cybersecurity and Intrusion Detection Systems
Viaarxiv icon

Deep Graph Matching and Searching for Semantic Code Retrieval

Add code
Oct 24, 2020
Figure 1 for Deep Graph Matching and Searching for Semantic Code Retrieval
Figure 2 for Deep Graph Matching and Searching for Semantic Code Retrieval
Figure 3 for Deep Graph Matching and Searching for Semantic Code Retrieval
Figure 4 for Deep Graph Matching and Searching for Semantic Code Retrieval
Viaarxiv icon

EI-MTD:Moving Target Defense for Edge Intelligence against Adversarial Attacks

Add code
Oct 11, 2020
Figure 1 for EI-MTD:Moving Target Defense for Edge Intelligence against Adversarial Attacks
Figure 2 for EI-MTD:Moving Target Defense for Edge Intelligence against Adversarial Attacks
Figure 3 for EI-MTD:Moving Target Defense for Edge Intelligence against Adversarial Attacks
Figure 4 for EI-MTD:Moving Target Defense for Edge Intelligence against Adversarial Attacks
Viaarxiv icon

Hierarchical Graph Matching Networks for Deep Graph Similarity Learning

Add code
Jul 08, 2020
Figure 1 for Hierarchical Graph Matching Networks for Deep Graph Similarity Learning
Figure 2 for Hierarchical Graph Matching Networks for Deep Graph Similarity Learning
Figure 3 for Hierarchical Graph Matching Networks for Deep Graph Similarity Learning
Figure 4 for Hierarchical Graph Matching Networks for Deep Graph Similarity Learning
Viaarxiv icon