Siniarski, B. ., Sandeepa, C. ., Wang, S. ., Liyanage, M. ., Ayyildiz, C. ., Yildirim, V. C., … Kountouris, M. . (2024). ROBUST-6G: Smart, Automated, and Reliable Security Service Platform for 6G. In (pp. 384–389). http://doi.org/10.1109/ICUFN61752.2024.10624832 (Original work published 2024)
First name
Shen
Last name
Wang
Siniarski, B. ., Sandeepa, C. ., Wang, S. ., Liyanage, M. ., Ayyildiz, C. ., Yildirim, V. C., … Kountouris, M. . (2024). ROBUST-6G: Smart, Automated, and Reliable Security Service Platform for 6G. In (pp. 384–389). http://doi.org/10.1109/ICUFN61752.2024.10624832 (Original work published 2024)
Senevirathna, T. ., Siniarski, B. ., Liyanage, M. ., & Wang, S. . (2024). Deceiving Post-Hoc Explainable AI (XAI) Methods in Network Intrusion Detection. In (pp. 107–112). http://doi.org/10.1109/CCNC51664.2024.10454633 (Original work published 2024)
Senevirathna, T. ., Siniarski, B. ., Liyanage, M. ., & Wang, S. . (2024). Deceiving Post-Hoc Explainable AI (XAI) Methods in Network Intrusion Detection. In (p. 107—112). http://doi.org/10.1109/CCNC51664.2024.10454633 (Original work published 2024)
Senevirathna, T. ., Siniarski, B. ., Liyanage, M. ., & Wang, S. . (2024). Deceiving Post-Hoc Explainable AI (XAI) Methods in Network Intrusion Detection. In (p. 107—112). http://doi.org/10.1109/CCNC51664.2024.10454633 (Original work published 2024)