1 code implementation • 1 Jun 2025 • Dania Herzalla, Willian T. Lunardi, Martin Andreoni
Graph-based learning has emerged as a transformative approach for modeling complex relationships across diverse domains, yet its potential in wireless security remains largely unexplored.
no code implementations • 9 Jan 2025 • Willian T. Lunardi, Abdulrahman Banabila, Dania Herzalla, Martin Andreoni
We address these limitations by proposing a contrastive pretext task for anomaly detection that enforces three key properties: (1) compact ID clustering to reduce intra-class variance, (2) inlier-outlier separation to enhance inter-class separation, and (3) outlier-outlier separation to maintain diversity among synthetic outliers and prevent representation collapse.
no code implementations • 14 Sep 2023 • Dania Herzalla, Willian T. Lunardi, Martin Andreoni Lopez
The effectiveness of network intrusion detection systems, predominantly based on machine learning, are highly influenced by the dataset they are trained on.
Ranked #1 on
Anomaly Detection
on TII-SSRC-23