Posts by Collection

publications

Feature Selection for Network Intrusion Detection

Published in KDD'25, 2009

The contents above will be part of a list of publications, if the user clicks the link for the publication than the contents of section will be rendered as a full page, allowing you to provide more information about the paper for the reader. When publications are displayed as a single page, the contents of the above “citation” field will automatically be included below this section in a smaller font.

Partial Information Decomposition for Data Interpretability and Feature Selection

Published in AISTATS'25, 2010

The contents above will be part of a list of publications, if the user clicks the link for the publication than the contents of section will be rendered as a full page, allowing you to provide more information about the paper for the reader. When publications are displayed as a single page, the contents of the above “citation” field will automatically be included below this section in a smaller font.

Mutual Information Preserving Neural Network Pruning

Published in , 2015

The contents above will be part of a list of publications, if the user clicks the link for the publication than the contents of section will be rendered as a full page, allowing you to provide more information about the paper for the reader. When publications are displayed as a single page, the contents of the above “citation” field will automatically be included below this section in a smaller font.

Information-theoretic State Variable Selection for Reinforcement Learning

Published in , 2024

The contents above will be part of a list of publications, if the user clicks the link for the publication than the contents of section will be rendered as a full page, allowing you to provide more information about the paper for the reader. When publications are displayed as a single page, the contents of the above “citation” field will automatically be included below this section in a smaller font.

talks

Feature Selection for Network Intrusion Detection: An Information-Theoretic Approach

Published:

I will present my research on information-theoretic feature selection for network intrusion detection systems. This work introduces novel methods to identify minimal yet maximally discriminative features in cybersecurity datasets, significantly reducing computational overhead while maintaining state-of-the-art detection accuracy. The talk will include: