Picture for Pavel Laskov

Pavel Laskov

University of Tuebingen

SoK: Pragmatic Assessment of Machine Learning for Network Intrusion Detection

Add code
Apr 30, 2023
Viaarxiv icon

Wild Networks: Exposure of 5G Network Infrastructures to Adversarial Examples

Add code
Jul 04, 2022
Figure 1 for Wild Networks: Exposure of 5G Network Infrastructures to Adversarial Examples
Figure 2 for Wild Networks: Exposure of 5G Network Infrastructures to Adversarial Examples
Figure 3 for Wild Networks: Exposure of 5G Network Infrastructures to Adversarial Examples
Figure 4 for Wild Networks: Exposure of 5G Network Infrastructures to Adversarial Examples
Viaarxiv icon

The Role of Machine Learning in Cybersecurity

Add code
Jun 20, 2022
Figure 1 for The Role of Machine Learning in Cybersecurity
Figure 2 for The Role of Machine Learning in Cybersecurity
Figure 3 for The Role of Machine Learning in Cybersecurity
Figure 4 for The Role of Machine Learning in Cybersecurity
Viaarxiv icon

SoK: The Impact of Unlabelled Data in Cyberthreat Detection

Add code
May 18, 2022
Figure 1 for SoK: The Impact of Unlabelled Data in Cyberthreat Detection
Figure 2 for SoK: The Impact of Unlabelled Data in Cyberthreat Detection
Figure 3 for SoK: The Impact of Unlabelled Data in Cyberthreat Detection
Figure 4 for SoK: The Impact of Unlabelled Data in Cyberthreat Detection
Viaarxiv icon

Evasion Attacks against Machine Learning at Test Time

Add code
Aug 21, 2017
Figure 1 for Evasion Attacks against Machine Learning at Test Time
Figure 2 for Evasion Attacks against Machine Learning at Test Time
Figure 3 for Evasion Attacks against Machine Learning at Test Time
Figure 4 for Evasion Attacks against Machine Learning at Test Time
Viaarxiv icon

Poisoning Attacks against Support Vector Machines

Add code
Mar 25, 2013
Figure 1 for Poisoning Attacks against Support Vector Machines
Figure 2 for Poisoning Attacks against Support Vector Machines
Figure 3 for Poisoning Attacks against Support Vector Machines
Viaarxiv icon

Security Analysis of Online Centroid Anomaly Detection

Add code
Feb 27, 2010
Figure 1 for Security Analysis of Online Centroid Anomaly Detection
Figure 2 for Security Analysis of Online Centroid Anomaly Detection
Figure 3 for Security Analysis of Online Centroid Anomaly Detection
Figure 4 for Security Analysis of Online Centroid Anomaly Detection
Viaarxiv icon