Picture for Omair Shafiq

Omair Shafiq

Traffic Management of Autonomous Vehicles using Policy Based Deep Reinforcement Learning and Intelligent Routing

Add code
Jun 28, 2022
Figure 1 for Traffic Management of Autonomous Vehicles using Policy Based Deep Reinforcement Learning and Intelligent Routing
Figure 2 for Traffic Management of Autonomous Vehicles using Policy Based Deep Reinforcement Learning and Intelligent Routing
Figure 3 for Traffic Management of Autonomous Vehicles using Policy Based Deep Reinforcement Learning and Intelligent Routing
Figure 4 for Traffic Management of Autonomous Vehicles using Policy Based Deep Reinforcement Learning and Intelligent Routing
Viaarxiv icon

RevDet: Robust and Memory Efficient Event Detection and Tracking in Large News Feeds

Add code
Mar 07, 2021
Figure 1 for RevDet: Robust and Memory Efficient Event Detection and Tracking in Large News Feeds
Figure 2 for RevDet: Robust and Memory Efficient Event Detection and Tracking in Large News Feeds
Figure 3 for RevDet: Robust and Memory Efficient Event Detection and Tracking in Large News Feeds
Figure 4 for RevDet: Robust and Memory Efficient Event Detection and Tracking in Large News Feeds
Viaarxiv icon

Investigating Resistance of Deep Learning-based IDS against Adversaries using min-max Optimization

Add code
Oct 30, 2019
Figure 1 for Investigating Resistance of Deep Learning-based IDS against Adversaries using min-max Optimization
Figure 2 for Investigating Resistance of Deep Learning-based IDS against Adversaries using min-max Optimization
Figure 3 for Investigating Resistance of Deep Learning-based IDS against Adversaries using min-max Optimization
Figure 4 for Investigating Resistance of Deep Learning-based IDS against Adversaries using min-max Optimization
Viaarxiv icon

Analyzing Adversarial Attacks Against Deep Learning for Intrusion Detection in IoT Networks

Add code
May 13, 2019
Figure 1 for Analyzing Adversarial Attacks Against Deep Learning for Intrusion Detection in IoT Networks
Figure 2 for Analyzing Adversarial Attacks Against Deep Learning for Intrusion Detection in IoT Networks
Figure 3 for Analyzing Adversarial Attacks Against Deep Learning for Intrusion Detection in IoT Networks
Figure 4 for Analyzing Adversarial Attacks Against Deep Learning for Intrusion Detection in IoT Networks
Viaarxiv icon