TabMT: Generating tabular data with masked transformers

M Gulati, P Roysdon - Advances in Neural Information …, 2024 - proceedings.neurips.cc
Abstract Autoregressive and Masked Transformers are incredibly effective as generative
models and classifiers. While these models are most prevalent in NLP, they also exhibit …

Effective network intrusion detection via representation learning: A Denoising AutoEncoder approach

IO Lopes, D Zou, IH Abdulqadder, FA Ruambo… - Computer …, 2022 - Elsevier
The introduction of deep learning techniques in intrusion detection problems has enabled
an enhanced standard of detection effectiveness. However, most of the progress has …

Investigating on the robustness of flow-based intrusion detection system against adversarial samples using Generative Adversarial Networks

PT Duy, NH Khoa, H Do Hoang, VH Pham - Journal of Information …, 2023 - Elsevier
Abstract Recently, Software Defined Networking (SDN) has emerged as the key technology
in programming and orchestrating security policy in the security operations centers (SOCs) …

Advanced Cyber Deception Framework (ACDF): A Comprehensive Study

M Maldonado, C Johnson, M Gulati… - 2024 International …, 2024 - ieeexplore.ieee.org
Deception frameworks provide an effective environment for data collection on cyber
criminals. Using deception techniques these frameworks help security professionals identify …

[PDF][PDF] Transfer Learning based Intrusion Detection Systems

H Mandali - 2022 - atrium.lib.uoguelph.ca
In recent times, organizations face many cyberattacks daily especially through Internet. The
traditional approach has been that once new attack is identified, the models are re-trained …

Feature Based Transfer Learning Intrusion Detection System.

AM Kelani - 2023 - atrium.lib.uoguelph.ca
Recent Cyber security breaches, such as the latest T-Mobile data leak in May 2023, which
revealed the PINs, Full names, and Phone numbers of some customers, and a string of other …