Picture for Peilun Wu

Peilun Wu

Evaluation and Optimization of Rendering Techniques for Autonomous Driving Simulation

Add code
Jun 27, 2023
Viaarxiv icon

Holmes: An Efficient and Lightweight Semantic Based Anomalous Email Detector

Add code
May 12, 2021
Figure 1 for Holmes: An Efficient and Lightweight Semantic Based Anomalous Email Detector
Figure 2 for Holmes: An Efficient and Lightweight Semantic Based Anomalous Email Detector
Figure 3 for Holmes: An Efficient and Lightweight Semantic Based Anomalous Email Detector
Figure 4 for Holmes: An Efficient and Lightweight Semantic Based Anomalous Email Detector
Viaarxiv icon

DualNet: Locate Then Detect Effective Payload with Deep Attention Network

Add code
Oct 23, 2020
Figure 1 for DualNet: Locate Then Detect Effective Payload with Deep Attention Network
Figure 2 for DualNet: Locate Then Detect Effective Payload with Deep Attention Network
Figure 3 for DualNet: Locate Then Detect Effective Payload with Deep Attention Network
Figure 4 for DualNet: Locate Then Detect Effective Payload with Deep Attention Network
Viaarxiv icon

Densely Connected Residual Network for Attack Recognition

Add code
Aug 05, 2020
Figure 1 for Densely Connected Residual Network for Attack Recognition
Figure 2 for Densely Connected Residual Network for Attack Recognition
Figure 3 for Densely Connected Residual Network for Attack Recognition
Figure 4 for Densely Connected Residual Network for Attack Recognition
Viaarxiv icon

Pelican: A Deep Residual Network for Network Intrusion Detection

Add code
Feb 04, 2020
Figure 1 for Pelican: A Deep Residual Network for Network Intrusion Detection
Figure 2 for Pelican: A Deep Residual Network for Network Intrusion Detection
Figure 3 for Pelican: A Deep Residual Network for Network Intrusion Detection
Figure 4 for Pelican: A Deep Residual Network for Network Intrusion Detection
Viaarxiv icon

LuNet: A Deep Neural Network for Network Intrusion Detection

Add code
Oct 06, 2019
Figure 1 for LuNet: A Deep Neural Network for Network Intrusion Detection
Figure 2 for LuNet: A Deep Neural Network for Network Intrusion Detection
Figure 3 for LuNet: A Deep Neural Network for Network Intrusion Detection
Figure 4 for LuNet: A Deep Neural Network for Network Intrusion Detection
Viaarxiv icon

A Transfer Learning Approach for Network Intrusion Detection

Add code
Oct 04, 2019
Figure 1 for A Transfer Learning Approach for Network Intrusion Detection
Figure 2 for A Transfer Learning Approach for Network Intrusion Detection
Figure 3 for A Transfer Learning Approach for Network Intrusion Detection
Figure 4 for A Transfer Learning Approach for Network Intrusion Detection
Viaarxiv icon