\n \n \n
\n
\n\n \n \n \n \n \n \n NetProbe: Deep Learning-Driven DDoS Detection with a Two-Tiered Mitigation Strategy.\n \n \n \n \n\n\n \n Jha, P.; Singh, G.; Kumar, A.; Agrawal, D.; Patel, Y. S.; and Forough, J.\n\n\n \n\n\n\n In Korman, A.; Chakraborty, S.; Peri, S.; Boldrini, C.; and Robinson, P., editor(s),
Proceedings of the 26th International Conference on Distributed Computing and Networking, ICDCN 2025, Hyderabad, India, January 4-7, 2025, pages 402–407, 2025. ACM\n
\n\n
\n\n
\n\n
\n\n \n \n
Paper\n \n \n\n \n \n doi\n \n \n\n \n link\n \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n \n \n \n\n\n\n
\n
@inproceedings{DBLP:conf/icdcn/JhaSKAPF25,\n author = {Prianshu Jha and\n Gurpreet Singh and\n Amit Kumar and\n Dewesh Agrawal and\n Yashwant Singh Patel and\n Javad Forough},\n editor = {Amos Korman and\n Sandip Chakraborty and\n Sathya Peri and\n Chiara Boldrini and\n Peter Robinson},\n title = {NetProbe: Deep Learning-Driven DDoS Detection with a Two-Tiered Mitigation\n Strategy},\n booktitle = {Proceedings of the 26th International Conference on Distributed Computing\n and Networking, {ICDCN} 2025, Hyderabad, India, January 4-7, 2025},\n pages = {402--407},\n publisher = {{ACM}},\n year = {2025},\n url = {https://doi.org/10.1145/3700838.3703687},\n doi = {10.1145/3700838.3703687},\n timestamp = {Sat, 25 Jan 2025 00:00:00 +0100},\n biburl = {https://dblp.org/rec/conf/icdcn/JhaSKAPF25.bib},\n bibsource = {dblp computer science bibliography, https://dblp.org}\n}\n\n\n
\n\n\n\n
\n\n\n
\n
\n\n \n \n \n \n \n \n DynaNoise: Dynamic Probabilistic Noise Injection for Defending Against Membership Inference Attacks.\n \n \n \n \n\n\n \n Forough, J.; and Haddadi, H.\n\n\n \n\n\n\n
CoRR, abs/2505.13362. 2025.\n
\n\n
\n\n
\n\n
\n\n \n \n
Paper\n \n \n\n \n \n doi\n \n \n\n \n link\n \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n \n \n \n\n\n\n
\n
@article{DBLP:journals/corr/abs-2505-13362,\n author = {Javad Forough and\n Hamed Haddadi},\n title = {DynaNoise: Dynamic Probabilistic Noise Injection for Defending Against\n Membership Inference Attacks},\n journal = {CoRR},\n volume = {abs/2505.13362},\n year = {2025},\n url = {https://doi.org/10.48550/arXiv.2505.13362},\n doi = {10.48550/ARXIV.2505.13362},\n eprinttype = {arXiv},\n eprint = {2505.13362},\n timestamp = {Wed, 25 Jun 2025 01:00:00 +0200},\n biburl = {https://dblp.org/rec/journals/corr/abs-2505-13362.bib},\n bibsource = {dblp computer science bibliography, https://dblp.org}\n}\n\n\n
\n\n\n\n
\n\n\n
\n
\n\n \n \n \n \n \n \n GuardNet: Graph-Attention Filtering for Jailbreak Defense in Large Language Models.\n \n \n \n \n\n\n \n Forough, J.; Maheri, M.; and Haddadi, H.\n\n\n \n\n\n\n
CoRR, abs/2509.23037. 2025.\n
\n\n
\n\n
\n\n
\n\n \n \n
Paper\n \n \n\n \n \n doi\n \n \n\n \n link\n \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n \n \n \n\n\n\n
\n
@article{DBLP:journals/corr/abs-2509-23037,\n author = {Javad Forough and\n Mohammad Maheri and\n Hamed Haddadi},\n title = {GuardNet: Graph-Attention Filtering for Jailbreak Defense in Large\n Language Models},\n journal = {CoRR},\n volume = {abs/2509.23037},\n year = {2025},\n url = {https://doi.org/10.48550/arXiv.2509.23037},\n doi = {10.48550/ARXIV.2509.23037},\n eprinttype = {arXiv},\n eprint = {2509.23037},\n timestamp = {Mon, 20 Oct 2025 01:00:00 +0200},\n biburl = {https://dblp.org/rec/journals/corr/abs-2509-23037.bib},\n bibsource = {dblp computer science bibliography, https://dblp.org}\n}\n\n\n
\n\n\n\n
\n\n\n\n\n\n