In this paper, DNNs have been utilized to predict the attacks on Network Intrusion Detection System (N-IDS).
SOTA for Network Intrusion Detection on KDD
Based on the extracted architecture attributes, we also demonstrate that an attacker can build a meta-model that accurately fingerprints the architecture and family of the pre-trained model in a transfer learning setting.
However, different from leveraging attack transferability from substitute models, we propose zeroth order optimization (ZOO) based attacks to directly estimate the gradients of the targeted DNN for generating adversarial examples.
In this work we investigate the effect of the convolutional network depth on its accuracy in the large-scale image recognition setting.
#97 best model for Image Classification on ImageNet
Our simple design results in a homogeneous, multi-branch architecture that has only a few hyper-parameters to set.
#36 best model for Image Classification on ImageNet
Defending Machine Learning models involves certifying and verifying model robustness and model hardening with approaches such as pre-processing inputs, augmenting training data with adversarial samples, and leveraging runtime detection methods to flag any inputs that might have been modified by an adversary.
Its principled nature also enables us to identify methods for both training and attacking neural networks that are reliable and, in a certain sense, universal.