Picture for Zhi Lu

Zhi Lu

A Hybrid Deep Learning Anomaly Detection Framework for Intrusion Detection

Add code
Dec 02, 2022
Viaarxiv icon

Intrusion Detection in Internet of Things using Convolutional Neural Networks

Add code
Nov 18, 2022
Viaarxiv icon

PhilaeX: Explaining the Failure and Success of AI Models in Malware Detection

Add code
Jul 02, 2022
Figure 1 for PhilaeX: Explaining the Failure and Success of AI Models in Malware Detection
Figure 2 for PhilaeX: Explaining the Failure and Success of AI Models in Malware Detection
Viaarxiv icon

RFGAN: RF-Based Human Synthesis

Add code
Dec 07, 2021
Figure 1 for RFGAN: RF-Based Human Synthesis
Figure 2 for RFGAN: RF-Based Human Synthesis
Figure 3 for RFGAN: RF-Based Human Synthesis
Figure 4 for RFGAN: RF-Based Human Synthesis
Viaarxiv icon

"How Does It Detect A Malicious App?" Explaining the Predictions of AI-based Android Malware Detector

Add code
Nov 06, 2021
Figure 1 for "How Does It Detect A Malicious App?" Explaining the Predictions of AI-based Android Malware Detector
Figure 2 for "How Does It Detect A Malicious App?" Explaining the Predictions of AI-based Android Malware Detector
Figure 3 for "How Does It Detect A Malicious App?" Explaining the Predictions of AI-based Android Malware Detector
Figure 4 for "How Does It Detect A Malicious App?" Explaining the Predictions of AI-based Android Malware Detector
Viaarxiv icon

Automated Detection of Individual Micro-calcifications from Mammograms using a Multi-stage Cascade Approach

Add code
Oct 07, 2016
Figure 1 for Automated Detection of Individual Micro-calcifications from Mammograms using a Multi-stage Cascade Approach
Figure 2 for Automated Detection of Individual Micro-calcifications from Mammograms using a Multi-stage Cascade Approach
Figure 3 for Automated Detection of Individual Micro-calcifications from Mammograms using a Multi-stage Cascade Approach
Figure 4 for Automated Detection of Individual Micro-calcifications from Mammograms using a Multi-stage Cascade Approach
Viaarxiv icon