no code implementations • 15 Feb 2024 • He Cheng, Shuhan Yuan
In this paper, we explore compromising deep sequential anomaly detection models by proposing a novel backdoor attack strategy.
no code implementations • 9 Oct 2022 • He Cheng, Depeng Xu, Shuhan Yuan, Xintao Wu
Given a sequence that is detected as anomalous, we can consider anomalous entry detection as an interpretable machine learning task because identifying anomalous entries in the sequence is to provide an interpretation to the detection result.