Evading {Provenance-Based}{ML} detectors with adversarial system actions K Mukherjee, J Wiedemeier, T Wang, J Wei, F Chen, M Kim, ... 32nd USENIX Security Symposium (USENIX Security 23), 1199-1216, 2023 | 17 | 2023 |
Interpreting gnn-based ids detections using provenance graph structural features K Mukherjee, J Wiedemeier, T Wang, M Kim, F Chen, M Kantarcioglu, ... arXiv preprint arXiv:2306.00934, 2023 | 5 | 2023 |
ProvIoT: Detecting Stealthy Attacks in IoT through Federated Edge-Cloud Security K Mukherjee, J Wiedemeier, Q Wang, J Kamimura, JJ Rhee, J Wei, Z Li, ... International Conference on Applied Cryptography and Network Security, 241-268, 2024 | | 2024 |
Interpreting GNN-based IDS Detections Using Provenance Graph Structural K Mukherjee, J Wiedemeier, T Wang, M Kim, F Chen, M Kantarcioglu, ... | | |