Manda: On adversarial example detection for network intrusion detection system. Wang, N., Chen, Y., Xiao, Y., Hu, Y., Lou, W., & Hou, Y T. IEEE Transactions on Dependable and Secure Computing, 20(2):1139–1153, IEEE, 2022. bibtex @article{wang2022manda,
title={Manda: On adversarial example detection for network intrusion detection system},
author={Wang, Ning and Chen, Yimin and Xiao, Yang and Hu, Yang and Lou, Wenjing and Hou, Y Thomas},
journal={IEEE Transactions on Dependable and Secure Computing},
volume={20},
number={2},
pages={1139--1153},
year={2022},
publisher={IEEE}
}
Downloads: 0
{"_id":"GFGPzpvA56zpsN3uF","bibbaseid":"wang-chen-xiao-hu-lou-hou-mandaonadversarialexampledetectionfornetworkintrusiondetectionsystem-2022","author_short":["Wang, N.","Chen, Y.","Xiao, Y.","Hu, Y.","Lou, W.","Hou, Y T."],"bibdata":{"bibtype":"article","type":"article","title":"Manda: On adversarial example detection for network intrusion detection system","author":[{"propositions":[],"lastnames":["Wang"],"firstnames":["Ning"],"suffixes":[]},{"propositions":[],"lastnames":["Chen"],"firstnames":["Yimin"],"suffixes":[]},{"propositions":[],"lastnames":["Xiao"],"firstnames":["Yang"],"suffixes":[]},{"propositions":[],"lastnames":["Hu"],"firstnames":["Yang"],"suffixes":[]},{"propositions":[],"lastnames":["Lou"],"firstnames":["Wenjing"],"suffixes":[]},{"propositions":[],"lastnames":["Hou"],"firstnames":["Y","Thomas"],"suffixes":[]}],"journal":"IEEE Transactions on Dependable and Secure Computing","volume":"20","number":"2","pages":"1139–1153","year":"2022","publisher":"IEEE","bibtex":"@article{wang2022manda,\n title={Manda: On adversarial example detection for network intrusion detection system},\n author={Wang, Ning and Chen, Yimin and Xiao, Yang and Hu, Yang and Lou, Wenjing and Hou, Y Thomas},\n journal={IEEE Transactions on Dependable and Secure Computing},\n volume={20},\n number={2},\n pages={1139--1153},\n year={2022},\n publisher={IEEE}\n}\n\n","author_short":["Wang, N.","Chen, Y.","Xiao, Y.","Hu, Y.","Lou, W.","Hou, Y T."],"key":"wang2022manda","id":"wang2022manda","bibbaseid":"wang-chen-xiao-hu-lou-hou-mandaonadversarialexampledetectionfornetworkintrusiondetectionsystem-2022","role":"author","urls":{},"metadata":{"authorlinks":{}}},"bibtype":"article","biburl":"https://bibbase.org/f/yYwna2beu8w8Zh3D2/chen-pub.bib","dataSources":["Rxy8umoNP78qdq56v","yM68t35RzDgJZajbn"],"keywords":[],"search_terms":["manda","adversarial","example","detection","network","intrusion","detection","system","wang","chen","xiao","hu","lou","hou"],"title":"Manda: On adversarial example detection for network intrusion detection system","year":2022}