Deep Reinforcement Learning in the Advanced Cybersecurity Threat Detection and Protection
Sewak, Mohit, Sahay, Sanjay K., Rathore, Hemant
Published in Information systems frontiers (01.04.2023)
Published in Information systems frontiers (01.04.2023)
Get full text
Journal Article
Robust Android Malware Detection System Against Adversarial Attacks Using Q-Learning
Rathore, Hemant, Sahay, Sanjay K., Nikam, Piyush, Sewak, Mohit
Published in Information systems frontiers (01.08.2021)
Published in Information systems frontiers (01.08.2021)
Get full text
Journal Article
Advances in Secure Knowledge Management in the Artificial Intelligence Era
Sahay, Sanjay K., Goel, Nihita, Jadliwala, Murtuza, Upadhyaya, Shambhu
Published in Information systems frontiers (01.08.2021)
Published in Information systems frontiers (01.08.2021)
Get full text
Journal Article
Designing Adversarial Attack and Defence for Robust Android Malware Detection Models
Rathore, Hemant, Sahay, Sanjay K., Dhillon, Jasleen, Sewak, Mohit
Published in 2021 51st Annual IEEE/IFIP International Conference on Dependable Systems and Networks - Supplemental Volume (DSN-S) (01.06.2021)
Published in 2021 51st Annual IEEE/IFIP International Conference on Dependable Systems and Networks - Supplemental Volume (DSN-S) (01.06.2021)
Get full text
Conference Proceeding
Comparison of Deep Learning and the Classical Machine Learning Algorithm for the Malware Detection
Sewak, Mohit, Sahay, Sanjay K., Rathore, Hemant
Published in 2018 19th IEEE/ACIS International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing (SNPD) (01.06.2018)
Published in 2018 19th IEEE/ACIS International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing (SNPD) (01.06.2018)
Get full text
Conference Proceeding
ADVERSARIALuscator: An Adversarial-DRL based Obfuscator and Metamorphic Malware Swarm Generator
Sewak, Mohit, Sahay, Sanjay K., Rathore, Hemant
Published in 2021 International Joint Conference on Neural Networks (IJCNN) (18.07.2021)
Published in 2021 International Joint Conference on Neural Networks (IJCNN) (18.07.2021)
Get full text
Conference Proceeding
DRo: A data-scarce mechanism to revolutionize the performance of DL-based Security Systems
Sewak, Mohit, Sahay, Sanjay K., Rathore, Hemant
Published in 2021 IEEE 46th Conference on Local Computer Networks (LCN) (04.10.2021)
Published in 2021 IEEE 46th Conference on Local Computer Networks (LCN) (04.10.2021)
Get full text
Conference Proceeding
Assessment of the Relative Importance of different hyper-parameters of LSTM for an IDS
Sewak, Mohit, Sahay, Sanjay K., Rathore, Hemant
Published in 2020 IEEE REGION 10 CONFERENCE (TENCON) (16.11.2020)
Published in 2020 IEEE REGION 10 CONFERENCE (TENCON) (16.11.2020)
Get full text
Conference Proceeding
X-Swarm: Adversarial DRL for Metamorphic Malware Swarm Generation
Sewak, Mohit, Sahay, Sanjay K., Rathore, Hemant
Published in 2022 IEEE International Conference on Pervasive Computing and Communications Workshops and other Affiliated Events (PerCom Workshops) (21.03.2022)
Published in 2022 IEEE International Conference on Pervasive Computing and Communications Workshops and other Affiliated Events (PerCom Workshops) (21.03.2022)
Get full text
Conference Proceeding
Towards Robust Android Malware Detection Models using Adversarial Learning
Rathore, Hemant, Sahay, Sanjay K.
Published in 2021 IEEE International Conference on Pervasive Computing and Communications Workshops and other Affiliated Events (PerCom Workshops) (22.03.2021)
Published in 2021 IEEE International Conference on Pervasive Computing and Communications Workshops and other Affiliated Events (PerCom Workshops) (22.03.2021)
Get full text
Conference Proceeding
Identification of Adversarial Android Intents using Reinforcement Learning
Rathore, Hemant, Nikam, Piyush, Sahay, Sanjay K., Sewak, Mohit
Published in 2021 International Joint Conference on Neural Networks (IJCNN) (18.07.2021)
Published in 2021 International Joint Conference on Neural Networks (IJCNN) (18.07.2021)
Get full text
Conference Proceeding