Picture for Zhi Lu

Zhi Lu

A Hybrid Deep Learning Anomaly Detection Framework for Intrusion Detection

Add code
Dec 02, 2022
Figure 1 for A Hybrid Deep Learning Anomaly Detection Framework for Intrusion Detection
Figure 2 for A Hybrid Deep Learning Anomaly Detection Framework for Intrusion Detection
Figure 3 for A Hybrid Deep Learning Anomaly Detection Framework for Intrusion Detection
Figure 4 for A Hybrid Deep Learning Anomaly Detection Framework for Intrusion Detection
Viaarxiv icon

Intrusion Detection in Internet of Things using Convolutional Neural Networks

Add code
Nov 18, 2022
Figure 1 for Intrusion Detection in Internet of Things using Convolutional Neural Networks
Figure 2 for Intrusion Detection in Internet of Things using Convolutional Neural Networks
Figure 3 for Intrusion Detection in Internet of Things using Convolutional Neural Networks
Figure 4 for Intrusion Detection in Internet of Things using Convolutional Neural Networks
Viaarxiv icon

PhilaeX: Explaining the Failure and Success of AI Models in Malware Detection

Add code
Jul 02, 2022
Figure 1 for PhilaeX: Explaining the Failure and Success of AI Models in Malware Detection
Figure 2 for PhilaeX: Explaining the Failure and Success of AI Models in Malware Detection
Viaarxiv icon

RFGAN: RF-Based Human Synthesis

Add code
Dec 07, 2021
Figure 1 for RFGAN: RF-Based Human Synthesis
Figure 2 for RFGAN: RF-Based Human Synthesis
Figure 3 for RFGAN: RF-Based Human Synthesis
Figure 4 for RFGAN: RF-Based Human Synthesis
Viaarxiv icon

"How Does It Detect A Malicious App?" Explaining the Predictions of AI-based Android Malware Detector

Add code
Nov 06, 2021
Figure 1 for "How Does It Detect A Malicious App?" Explaining the Predictions of AI-based Android Malware Detector
Figure 2 for "How Does It Detect A Malicious App?" Explaining the Predictions of AI-based Android Malware Detector
Figure 3 for "How Does It Detect A Malicious App?" Explaining the Predictions of AI-based Android Malware Detector
Figure 4 for "How Does It Detect A Malicious App?" Explaining the Predictions of AI-based Android Malware Detector
Viaarxiv icon

Automated Detection of Individual Micro-calcifications from Mammograms using a Multi-stage Cascade Approach

Add code
Oct 07, 2016
Figure 1 for Automated Detection of Individual Micro-calcifications from Mammograms using a Multi-stage Cascade Approach
Figure 2 for Automated Detection of Individual Micro-calcifications from Mammograms using a Multi-stage Cascade Approach
Figure 3 for Automated Detection of Individual Micro-calcifications from Mammograms using a Multi-stage Cascade Approach
Figure 4 for Automated Detection of Individual Micro-calcifications from Mammograms using a Multi-stage Cascade Approach
Viaarxiv icon