TAElog: A Novel Transformer AutoEncoder-Based Log Anomaly Detection Method

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:International Conference on Information Security and Cryptology (19. : 2023 : Hangzhou) Information security and cryptology ; Part 2
1. Verfasser: Zhao, Changzhi (VerfasserIn)
Weitere Verfasser: Huang, Kezhen (VerfasserIn), Wu, Di (VerfasserIn), Han, Xueying (VerfasserIn), Du, Dan (VerfasserIn), Zhou, Yutian (VerfasserIn), Lu, Zhigang (VerfasserIn), Liu, Yuling (VerfasserIn)
Pages:2
Format: UnknownFormat
Sprache:eng
Veröffentlicht: 2024
Schlagworte:
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
Titel Jahr Verfasser
Text Laundering: Mitigating Malicious Features Through Knowledge Distillation of Large Foundation Models 2024 Jiang, Yi
An Android Malware Detection Method Using Better API Contextual Information 2024 Yang, Hongyu
EVFLR: Efficient Vertical Federated Logistic Regression Based on Batch Operations 2024 Chen, Dong
TIA: Token Importance Transferable Attack on Vision Transformers 2024 Fu, Tingchao
Differential-Linear Cryptanalysis of Round-Reduced SPARX-64/128 2024 Xu, Zhichao
Automatic Search of Linear Structure: Applications to Keccak and Ascon 2024 Li, Huina
Quantum Attacks: A View of Data Complexity on Offline Simon’s Algorithm 2024 Yu, Bo
Differential Privacy Enhanced Dynamic Searchable Symmetric Encryption for Cloud Environments 2024 Tu, Peiyi
Clustered Federated Learning with Inference Hash Codes Based Local Sensitive Hashing 2024 Tan, Zhou
Hardware Acceleration of NTT-Based Polynomial Multiplication in CRYSTALS-Kyber 2024 Yang, Hang
FaBFT: Flexible Asynchronous BFT Protocol Using DAG 2024 Song, Yu
An Efficient Privacy-Preserving Scheme for Weak Password Collection in Internet of Things 2024 Jiang, Changsong
Partial Key Exposure Attack on Common Prime RSA 2024 Zheng, Mengce
An Efficient Autonomous Path Proxy Re-encryption Without Pairing for Cloud-Assisted mHealth 2024 Chen, Linghui
TAElog: A Novel Transformer AutoEncoder-Based Log Anomaly Detection Method 2024 Zhao, Changzhi
V-Curve25519: Efficient Implementation of Curve25519 on RISC-V Architecture 2024 Gao, Qingguan
Improved Herrmann-May’s Attack with Merging Variables and Lower LLL Bound 2024 Cheng, Qingfeng
Non-malleable Codes from Leakage Resilient Cryptographic Primitives 2024 Ghosal, Anit Kumar
Real-Time Symbolic Reasoning Framework for Cryptojacking Detection Based on Netflow-Plus Analysis 2024 Yang, Zhen
A Practical Multi-candidate Voting Protocol on Quantum Blockchain Adapted for Various Tally Principles 2024 Sun, Xin
Alle Artikel auflisten