Search Results for author: Vrizlynn L. L. Thing

Found 11 papers, 0 papers with code

An adversarial attack approach for eXplainable AI evaluation on deepfake detection models

no code implementations8 Dec 2023 Balachandar Gowrisankar, Vrizlynn L. L. Thing

In this paper, we perform experiments to show that generic removal/insertion XAI evaluation methods are not suitable for deepfake detection models.

Adversarial Attack DeepFake Detection +2

Few-shot Weakly-supervised Cybersecurity Anomaly Detection

no code implementations15 Apr 2023 Rahul Kale, Vrizlynn L. L. Thing

In this paper, we propose an enhancement to an existing few-shot weakly-supervised deep learning anomaly detection framework.

Data Augmentation Representation Learning +2

Feature Mining for Encrypted Malicious Traffic Detection with Deep Learning and Other Machine Learning Algorithms

no code implementations7 Apr 2023 ZiHao Wang, Vrizlynn L. L. Thing

Currently, research on encrypted malicious traffic detection without decryption has focused on feature extraction and the choice of machine learning or deep learning algorithms.

Deepfake Detection with Deep Learning: Convolutional Neural Networks versus Transformers

no code implementations7 Apr 2023 Vrizlynn L. L. Thing

In this work, we study the evolutions of deep learning architectures, particularly CNNs and Transformers.

DeepFake Detection Face Swapping

A Hybrid Deep Learning Anomaly Detection Framework for Intrusion Detection

no code implementations2 Dec 2022 Rahul Kale, Zhi Lu, Kar Wai Fok, Vrizlynn L. L. Thing

Cyber intrusion attacks that compromise the users' critical and sensitive data are escalating in volume and intensity, especially with the growing connections between our daily life and the Internet.

Intrusion Detection Unsupervised Anomaly Detection

IEEE Big Data Cup 2022: Privacy Preserving Matching of Encrypted Images with Deep Learning

no code implementations18 Nov 2022 Vrizlynn L. L. Thing

Our solution achieved 1st place at the IEEE Big Data Cup 2022: Privacy Preserving Matching of Encrypted Images Challenge.

Data Augmentation Motion Detection +1

Intrusion Detection in Internet of Things using Convolutional Neural Networks

no code implementations18 Nov 2022 Martin Kodys, Zhi Lu, Kar Wai Fok, Vrizlynn L. L. Thing

As security mechanisms are often neglected during the deployment of IoT devices, they are more easily attacked by complicated and large volume intrusion attacks using advanced techniques.

Intrusion Detection

PhilaeX: Explaining the Failure and Success of AI Models in Malware Detection

no code implementations2 Jul 2022 Zhi Lu, Vrizlynn L. L. Thing

It is especially so when the model's incorrect prediction can lead to severe damages or even losses to lives and critical assets.

Decision Making Malware Detection

"How Does It Detect A Malicious App?" Explaining the Predictions of AI-based Android Malware Detector

no code implementations6 Nov 2021 Zhi Lu, Vrizlynn L. L. Thing

In the following experiments, we compare the explainability and fidelity of our proposed method with state-of-the-arts, respectively.

Android Malware Detection Malware Detection

Cannot find the paper you are looking for? You can Submit a new open access paper.