Abstract is missing.
- Reasoning with Counterfactual Explanations for Code Vulnerability Detection and CorrectionAnjana Wijekoon, Nirmalie Wiratunga. 1-13 [doi]
- An Assessment of Robustness for Adversarial Attacks and Physical Distortions on Image Classification using Explainable AIK. T. Yasas Mahima, Mohamed Ayoob, Guhanathan Poravi. 14-28 [doi]
- Semi-Supervised Detection of Algorithmically Generated Domains using Neural Network-Based AutoencodersFederico Cruciani, Samuel J. Moore, Bronagh Quigley, Sadiq Sani. 29-37 [doi]
- An Empirical Study on Cross-Data Transferability of Adversarial Attacks on Object DetectorsAlexander Michael Staff, Jin Zhang, Jingyue Li, Jing Xie, Elizabeth Ann Traiger, Jon Arne Glomsrud, Kristian Bertheussen Karolius. 38-52 [doi]
- A Real-Time In-Vehicle Network Testbed for Machine Learning-Based IDS Training and ValidationHesamaldin Jadidbonab, Andrew Tomlinson, Hoang Nga Nguyen, Trang Doan, Siraj Ahmed Shaikh. 53-68 [doi]
- Bayesian Hyper-Parameter Optimization for Malware DetectionFahad T. AlGorain, John A. Clark. 69-84 [doi]
- Memory Efficient Federated Deep Learning for Intrusion Detection in IoT NetworksIdris Zakariyya, Harsha K. Kaluterage, M. Omar Al-Kadri. 85-99 [doi]
- On the Need for Collaborative Intelligence in CybersecurityTrevor Martin. 100-112 [doi]
- A Novel Anomaly Detection Approach to Secure APIs from CyberattacksArshardh Ifthikar, Nipun Thennakoon, Sanjeewa Malalgoda, Harsha Moraliyage, Thamindu Jayawickrama, Tiroshan Madushanka, Saman Hettiarachchi. 113-126 [doi]