Picture for Jiahai Yang

Jiahai Yang

Towards Generalizable Autonomous Penetration Testing via Domain Randomization and Meta-Reinforcement Learning

Add code
Dec 05, 2024
Figure 1 for Towards Generalizable Autonomous Penetration Testing via Domain Randomization and Meta-Reinforcement Learning
Figure 2 for Towards Generalizable Autonomous Penetration Testing via Domain Randomization and Meta-Reinforcement Learning
Figure 3 for Towards Generalizable Autonomous Penetration Testing via Domain Randomization and Meta-Reinforcement Learning
Figure 4 for Towards Generalizable Autonomous Penetration Testing via Domain Randomization and Meta-Reinforcement Learning
Viaarxiv icon

threaTrace: Detecting and Tracing Host-based Threats in Node Level Through Provenance Graph Learning

Add code
Nov 08, 2021
Figure 1 for threaTrace: Detecting and Tracing Host-based Threats in Node Level Through Provenance Graph Learning
Figure 2 for threaTrace: Detecting and Tracing Host-based Threats in Node Level Through Provenance Graph Learning
Figure 3 for threaTrace: Detecting and Tracing Host-based Threats in Node Level Through Provenance Graph Learning
Figure 4 for threaTrace: Detecting and Tracing Host-based Threats in Node Level Through Provenance Graph Learning
Viaarxiv icon

DeepAID: Interpreting and Improving Deep Learning-based Anomaly Detection in Security Applications

Add code
Sep 23, 2021
Figure 1 for DeepAID: Interpreting and Improving Deep Learning-based Anomaly Detection in Security Applications
Figure 2 for DeepAID: Interpreting and Improving Deep Learning-based Anomaly Detection in Security Applications
Figure 3 for DeepAID: Interpreting and Improving Deep Learning-based Anomaly Detection in Security Applications
Figure 4 for DeepAID: Interpreting and Improving Deep Learning-based Anomaly Detection in Security Applications
Viaarxiv icon

Practical Traffic-space Adversarial Attacks on Learning-based NIDSs

Add code
May 15, 2020
Figure 1 for Practical Traffic-space Adversarial Attacks on Learning-based NIDSs
Figure 2 for Practical Traffic-space Adversarial Attacks on Learning-based NIDSs
Figure 3 for Practical Traffic-space Adversarial Attacks on Learning-based NIDSs
Figure 4 for Practical Traffic-space Adversarial Attacks on Learning-based NIDSs
Viaarxiv icon

HinDom: A Robust Malicious Domain Detection System based on Heterogeneous Information Network with Transductive Classification

Add code
Sep 04, 2019
Figure 1 for HinDom: A Robust Malicious Domain Detection System based on Heterogeneous Information Network with Transductive Classification
Figure 2 for HinDom: A Robust Malicious Domain Detection System based on Heterogeneous Information Network with Transductive Classification
Figure 3 for HinDom: A Robust Malicious Domain Detection System based on Heterogeneous Information Network with Transductive Classification
Figure 4 for HinDom: A Robust Malicious Domain Detection System based on Heterogeneous Information Network with Transductive Classification
Viaarxiv icon