Picture for Raj Jain

Raj Jain

LEMDA: A Novel Feature Engineering Method for Intrusion Detection in IoT Systems

Add code
Apr 20, 2024
Viaarxiv icon

TRUST XAI: Model-Agnostic Explanations for AI With a Case Study on IIoT Security

Add code
May 02, 2022
Figure 1 for TRUST XAI: Model-Agnostic Explanations for AI With a Case Study on IIoT Security
Figure 2 for TRUST XAI: Model-Agnostic Explanations for AI With a Case Study on IIoT Security
Figure 3 for TRUST XAI: Model-Agnostic Explanations for AI With a Case Study on IIoT Security
Figure 4 for TRUST XAI: Model-Agnostic Explanations for AI With a Case Study on IIoT Security
Viaarxiv icon

ADDAI: Anomaly Detection using Distributed AI

Add code
May 02, 2022
Figure 1 for ADDAI: Anomaly Detection using Distributed AI
Figure 2 for ADDAI: Anomaly Detection using Distributed AI
Figure 3 for ADDAI: Anomaly Detection using Distributed AI
Figure 4 for ADDAI: Anomaly Detection using Distributed AI
Viaarxiv icon

Effect of Imbalanced Datasets on Security of Industrial IoT Using Machine Learning

Add code
Dec 02, 2019
Figure 1 for Effect of Imbalanced Datasets on Security of Industrial IoT Using Machine Learning
Figure 2 for Effect of Imbalanced Datasets on Security of Industrial IoT Using Machine Learning
Figure 3 for Effect of Imbalanced Datasets on Security of Industrial IoT Using Machine Learning
Figure 4 for Effect of Imbalanced Datasets on Security of Industrial IoT Using Machine Learning
Viaarxiv icon

Machine Learning Based Network Vulnerability Analysis of Industrial Internet of Things

Add code
Nov 13, 2019
Figure 1 for Machine Learning Based Network Vulnerability Analysis of Industrial Internet of Things
Figure 2 for Machine Learning Based Network Vulnerability Analysis of Industrial Internet of Things
Figure 3 for Machine Learning Based Network Vulnerability Analysis of Industrial Internet of Things
Figure 4 for Machine Learning Based Network Vulnerability Analysis of Industrial Internet of Things
Viaarxiv icon

Feasibility of Supervised Machine Learning for Cloud Security

Add code
Oct 23, 2018
Figure 1 for Feasibility of Supervised Machine Learning for Cloud Security
Figure 2 for Feasibility of Supervised Machine Learning for Cloud Security
Figure 3 for Feasibility of Supervised Machine Learning for Cloud Security
Figure 4 for Feasibility of Supervised Machine Learning for Cloud Security
Viaarxiv icon