Login / Signup

Deceiving Post-Hoc Explainable AI (XAI) Methods in Network Intrusion Detection.

Thulitha SenevirathnaBartlomiej SiniarskiMadhusanka LiyanageShen Wang
Published in: CCNC (2024)
Keyphrases
  • network intrusion detection
  • post hoc
  • databases
  • data sets
  • data mining
  • object recognition
  • computational intelligence
  • intrusion detection
  • network intrusion