Obserwuj
Josh Wiedemeier
Tytuł
Cytowane przez
Cytowane przez
Rok
Evading {Provenance-Based}{ML} detectors with adversarial system actions
K Mukherjee, J Wiedemeier, T Wang, J Wei, F Chen, M Kim, ...
32nd USENIX Security Symposium (USENIX Security 23), 1199-1216, 2023
172023
Interpreting gnn-based ids detections using provenance graph structural features
K Mukherjee, J Wiedemeier, T Wang, M Kim, F Chen, M Kantarcioglu, ...
arXiv preprint arXiv:2306.00934, 2023
52023
ProvIoT: Detecting Stealthy Attacks in IoT through Federated Edge-Cloud Security
K Mukherjee, J Wiedemeier, Q Wang, J Kamimura, JJ Rhee, J Wei, Z Li, ...
International Conference on Applied Cryptography and Network Security, 241-268, 2024
2024
Interpreting GNN-based IDS Detections Using Provenance Graph Structural
K Mukherjee, J Wiedemeier, T Wang, M Kim, F Chen, M Kantarcioglu, ...
Nie można teraz wykonać tej operacji. Spróbuj ponownie później.
Prace 1–4