Machine Learning for Security and the Internet of Things: The Good, the Bad, and the Ugly
暂无分享,去创建一个
Weixian Liao | Weichao Gao | Wei Yu | Fan Liang | William Grant Hatcher | Wei Yu | Fan Liang | Weichao Gao | Weixian Liao | W. G. Hatcher
[1] Qingyu Yang,et al. Defending Against Data Integrity Attacks in Smart Grid: A Deep Reinforcement Learning-Based Approach , 2019, IEEE Access.
[2] Giorgio Giacinto,et al. A Pattern Recognition System for Malicious PDF Files Detection , 2012, MLDM.
[3] Nada Golmie,et al. A Survey on Industrial Internet of Things: A Cyber-Physical Systems Perspective , 2018, IEEE Access.
[4] Fernando Pérez-Cruz,et al. PassGAN: A Deep Learning Approach for Password Guessing , 2017, ACNS.
[5] Wei Yu,et al. On effective data aggregation techniques in Host-based Intrusion Detection in MANET , 2013, CCNC.
[6] Wei Yu,et al. On behavior-based detection of malware on Android platform , 2013, 2013 IEEE Global Communications Conference (GLOBECOM).
[7] Nada Golmie,et al. On Effectiveness of Smart Grid Applications Using Co-Simulation , 2015, 2015 24th International Conference on Computer Communication and Networks (ICCCN).
[8] Nasir D. Memon,et al. Internet-scale Probing of CPS: Inference, Characterization and Orchestration Analysis , 2017, NDSS.
[9] Fabio Roli,et al. Evasion Attacks against Machine Learning at Test Time , 2013, ECML/PKDD.
[10] Yonghui Song,et al. A New Deep-Q-Learning-Based Transmission Scheduling Mechanism for the Cognitive Internet of Things , 2018, IEEE Internet of Things Journal.
[11] Salvatore J. Stolfo,et al. Anomalous Payload-Based Worm Detection and Signature Generation , 2005, RAID.
[12] Bin Song,et al. A Fast Feature Fusion Algorithm in Image Classification for Cyber Physical Systems , 2017, IEEE Access.
[13] Ying Tan,et al. Generating Adversarial Malware Examples for Black-Box Attacks Based on GAN , 2017, DMBD.
[14] Dawn Song,et al. Robust Physical-World Attacks on Deep Learning Models , 2017, 1707.08945.
[15] Yi Liang,et al. Deep Learning Based Inference of Private Information Using Embedded Sensors in Smart Devices , 2018, IEEE Network.
[16] Elie Bursztein,et al. I am a legend: Hacking hearthstone using statistical learning methods , 2016, 2016 IEEE Conference on Computational Intelligence and Games (CIG).
[17] Blaine Nelson,et al. The security of machine learning , 2010, Machine Learning.
[18] Jin Wei,et al. Real-Time Detection of False Data Injection Attacks in Smart Grid: A Deep Learning-Based Intelligent Mechanism , 2017, IEEE Transactions on Smart Grid.
[19] Ling Liu,et al. A Comparative Measurement Study of Deep Learning as a Service Framework , 2018, IEEE Transactions on Services Computing.
[20] Ajmal Mian,et al. Threat of Adversarial Attacks on Deep Learning in Computer Vision: A Survey , 2018, IEEE Access.
[21] Robert C. Qiu,et al. Q-learning based bidding algorithm for spectrum auction in cognitive radio , 2011, 2011 Proceedings of IEEE Southeastcon.
[22] Rocco A. Servedio,et al. Smooth boosting and learning with malicious noise , 2003 .
[23] Fabrizio Sebastiani,et al. Machine learning in automated text categorization , 2001, CSUR.
[24] Ashish Sureka,et al. Open Source Social Media Analytics for Intelligence and Security Informatics Applications , 2015, BDA.
[25] Guobin Xu,et al. A Cloud Computing Based Network Monitoring and Threat Detection System for Critical Infrastructures , 2016, Big Data Res..
[26] Xinyu Yang,et al. A Novel Dynamic En-Route Decision Real-Time Route Guidance Scheme in Intelligent Transportation Systems , 2015, 2015 IEEE 35th International Conference on Distributed Computing Systems.
[27] Peng Jiang,et al. Virtual MAC Spoofing Detection through Deep Learning , 2018, 2018 IEEE International Conference on Communications (ICC).
[28] Xinyu Yang,et al. On data integrity attacks against optimal power flow in power grid systems , 2017, 2017 14th IEEE Annual Consumer Communications & Networking Conference (CCNC).
[29] Alexander Hofmann,et al. On the versatility of radial basis function neural networks: A case study in the field of intrusion detection , 2010, Inf. Sci..
[30] Xinyu Yang,et al. A Gaussian-Mixture Model Based Detection Scheme against Data Integrity Attacks in the Smart Grid , 2016, 2016 25th International Conference on Computer Communication and Networks (ICCCN).
[31] Mansoor Alam,et al. A Deep Learning Approach for Network Intrusion Detection System , 2016, EAI Endorsed Trans. Security Safety.
[32] Chao Gao,et al. Security Vulnerabilities of Internet of Things: A Case Study of the Smart Plug System , 2017, IEEE Internet of Things Journal.
[33] Daniel Marquardt,et al. Noise power spectral density estimation for binaural noise reduction exploiting direction of arrival estimates , 2017, 2017 IEEE Workshop on Applications of Signal Processing to Audio and Acoustics (WASPAA).
[34] Mohsen Guizani,et al. Achieving Data Utility-Privacy Tradeoff in Internet of Medical Things: A Machine Learning Approach , 2019, Future Gener. Comput. Syst..
[35] James P. Peerenboom,et al. Identifying, understanding, and analyzing critical infrastructure interdependencies , 2001 .
[36] Yuval Elovici,et al. CT-GAN: Malicious Tampering of 3D Medical Imagery using Deep Learning , 2019, USENIX Security Symposium.
[37] Shitong Wang,et al. Fuzzy DBN with rule-based knowledge representation and high interpretability , 2017, 2017 12th International Conference on Intelligent Systems and Knowledge Engineering (ISKE).
[38] Howon Kim,et al. Long Short Term Memory Recurrent Neural Network Classifier for Intrusion Detection , 2016, 2016 International Conference on Platform Technology and Service (PlatCon).
[39] Boleslaw K. Szymanski,et al. NETWORK-BASED INTRUSION DETECTION USING NEURAL NETWORKS , 2002 .
[40] Xing Liu,et al. Secure Internet of Things (IoT)-Based Smart-World Critical Infrastructures: Survey, Case Study and Research Opportunities , 2019, IEEE Access.
[41] Wei Yu,et al. Tuning Deep Learning Performance for Android Malware Detection , 2018, 2018 19th IEEE/ACIS International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing (SNPD).
[42] Kenneth A. Loparo,et al. Cascading Failure Attacks in the Power System: A Stochastic Game Perspective , 2017, IEEE Internet of Things Journal.
[43] Pan Li,et al. Efficient Secure Outsourcing of Large-Scale Convex Separable Programming for Big Data , 2019, IEEE Transactions on Big Data.
[44] Kilian Q. Weinberger,et al. Marginalized Denoising Autoencoders for Domain Adaptation , 2012, ICML.
[45] Shengwei Tian,et al. Deep Learning in Drebin: Android malware Image Texture Median Filter Analysis and Detection , 2019, KSII Transactions on Internet and Information Systems.
[46] Jinfeng Yi,et al. ZOO: Zeroth Order Optimization Based Black-box Attacks to Deep Neural Networks without Training Substitute Models , 2017, AISec@CCS.
[47] Somesh Jha,et al. Model Inversion Attacks that Exploit Confidence Information and Basic Countermeasures , 2015, CCS.
[48] Junhong Xu,et al. Survey on Prediction Algorithms in Smart Homes , 2017, IEEE Internet of Things Journal.
[49] Wei Yu,et al. A cloud computing based architecture for cyber security situation awareness , 2013, 2013 IEEE Conference on Communications and Network Security (CNS).
[50] Wei Yu,et al. Search Engine for the Internet of Things: Lessons From Web Search, Vision, and Opportunities , 2019, IEEE Access.
[51] Aloysius K. Mok,et al. Advanced Allergy Attacks: Does a Corpus Really Help? , 2007, RAID.
[52] Nada Golmie,et al. A Deep Learning-Based Weather Forecast System for Data Volume and Recency Analysis , 2019, 2019 International Conference on Computing, Networking and Communications (ICNC).
[53] Blaine Nelson,et al. Exploiting Machine Learning to Subvert Your Spam Filter , 2008, LEET.
[54] Elizabeth Gibney,et al. Google AI algorithm masters ancient game of Go , 2016, Nature.
[55] Fan Zhang,et al. Stealing Machine Learning Models via Prediction APIs , 2016, USENIX Security Symposium.
[56] Jun Zhu,et al. Boosting Adversarial Attacks with Momentum , 2017, 2018 IEEE/CVF Conference on Computer Vision and Pattern Recognition.
[57] Zhu Han,et al. Machine Learning Paradigms for Next-Generation Wireless Networks , 2017, IEEE Wireless Communications.
[58] Wei Yu,et al. Towards Differential Privacy-Based Online Double Auction for Smart Grid , 2020, IEEE Transactions on Information Forensics and Security.
[59] Christian Doerr,et al. Inadvertently Making Cyber Criminals Rich: A Comprehensive Study of Cryptojacking Campaigns at Internet Scale , 2019, USENIX Security Symposium.
[60] Nei Kato,et al. The Deep Learning Vision for Heterogeneous Network Traffic Control: Proposal, Challenges, and Future Perspective , 2017, IEEE Wireless Communications.
[61] Xinyu Yang,et al. On Optimal PMU Placement-Based Defense Against Data Integrity Attacks in Smart Grid , 2017, IEEE Transactions on Information Forensics and Security.
[62] Zhenlong Yuan,et al. Droid-Sec: deep learning in android malware detection , 2015, SIGCOMM 2015.
[63] Xinyu Yang,et al. On Data Integrity Attacks Against Real-Time Pricing in Energy-Based Cyber-Physical Systems , 2017, IEEE Transactions on Parallel and Distributed Systems.
[64] Hanqing Guo,et al. Indoor Multi-Sensory Self-Supervised Autonomous Mobile Robotic Navigation , 2018, 2018 IEEE International Conference on Industrial Internet (ICII).
[65] Chun-Hung Richard Lin,et al. Intrusion detection system: A comprehensive review , 2013, J. Netw. Comput. Appl..
[66] Xinyu Yang,et al. A Survey on Internet of Things: Architecture, Enabling Technologies, Security and Privacy, and Applications , 2017, IEEE Internet of Things Journal.
[67] Calton Pu,et al. Differentially Private Model Publishing for Deep Learning , 2019, 2019 IEEE Symposium on Security and Privacy (SP).
[68] Wei Yu,et al. On False Data-Injection Attacks against Power System State Estimation: Modeling and Countermeasures , 2014, IEEE Transactions on Parallel and Distributed Systems.
[69] Pan He,et al. Adversarial Examples: Attacks and Defenses for Deep Learning , 2017, IEEE Transactions on Neural Networks and Learning Systems.
[70] Peng Ning,et al. False data injection attacks against state estimation in electric power grids , 2011, TSEC.
[71] Giorgio Giacinto,et al. HMM-Web: A Framework for the Detection of Attacks Against Web Applications , 2009, 2009 IEEE International Conference on Communications.
[72] Daniel Cremers,et al. CAPTCHA Recognition with Active Deep Learning , 2015 .
[73] Guobin Xu,et al. Towards Online Deep Learning-Based Energy Forecasting , 2019, 2019 28th International Conference on Computer Communication and Networks (ICCCN).
[74] Blase Ur,et al. Fast, Lean, and Accurate: Modeling Password Guessability Using Neural Networks , 2016, USENIX Annual Technical Conference.
[75] Ursula Challita,et al. Artificial Neural Networks-Based Machine Learning for Wireless Networks: A Tutorial , 2017, IEEE Communications Surveys & Tutorials.
[76] Yifan Guo,et al. Multidimensional Time Series Anomaly Detection: A GRU-based Gaussian Mixture Variational Autoencoder Approach , 2018, ACML.
[77] Jaime Lloret,et al. Network Traffic Classifier With Convolutional and Recurrent Neural Networks for Internet of Things , 2017, IEEE Access.
[78] Jay Lee,et al. Cyber-physical Systems Architecture for Self-Aware Machines in Industry 4.0 Environment , 2015 .
[79] Reza Shokri,et al. Comprehensive Privacy Analysis of Deep Learning: Stand-alone and Federated Learning under Passive and Active White-box Inference Attacks , 2018, ArXiv.
[80] Ling Liu,et al. Adversarial Examples in Deep Learning: Characterization and Divergence , 2018, ArXiv.
[81] Nhien-An Le-Khac,et al. Collective Anomaly Detection Based on Long Short-Term Memory Recurrent Neural Networks , 2016, FDSE.
[82] James Newsome,et al. Paragraph: Thwarting Signature Learning by Training Maliciously , 2006, RAID.
[83] Elisa Bertino,et al. Big Data - Security and Privacy , 2015, 2015 IEEE International Congress on Big Data.
[84] Yevgeniy Vorobeychik,et al. Adversarial Regression for Detecting Attacks in Cyber-Physical Systems , 2018, IJCAI.
[85] Calin Belta,et al. Anomaly detection in cyber-physical systems: A formal methods approach , 2014, 53rd IEEE Conference on Decision and Control.
[86] Yong Wang,et al. Learning Traffic as Images: A Deep Convolutional Neural Network for Large-Scale Transportation Network Speed Prediction , 2017, Sensors.
[87] Wenying Wen,et al. Security analysis of a color image encryption scheme based on skew tent map and hyper chaotic system of 6th-order CNN against chosen-plaintext attack , 2015, Multimedia Tools and Applications.
[88] Robert C. Atkinson,et al. Threat analysis of IoT networks using artificial neural network intrusion detection system , 2016, 2016 International Symposium on Networks, Computers and Communications (ISNCC).
[89] Lin Chen,et al. Image registration based on SOFM neural network clustering , 2017, 2017 36th Chinese Control Conference (CCC).
[90] Wei Xiang,et al. Internet of Things for Smart Healthcare: Technologies, Challenges, and Opportunities , 2017, IEEE Access.
[91] Sheng Chen,et al. Application of Deep Belief Networks for opcode based malware detection , 2016, 2016 International Joint Conference on Neural Networks (IJCNN).
[92] Wei Yu,et al. On false data injection attacks against Kalman filtering in power system dynamic state estimation , 2016, Secur. Commun. Networks.
[93] Giovanni Vigna,et al. Feature Omission Vulnerabilities: Thwarting Signature Generation for Polymorphic Worms , 2007, Twenty-Third Annual Computer Security Applications Conference (ACSAC 2007).
[94] Wenke Lee,et al. Misleading worm signature generators using deliberate noise injection , 2006, 2006 IEEE Symposium on Security and Privacy (S&P'06).
[95] Sherali Zeadally,et al. Internet of Vehicles: Architecture, Protocols, and Security , 2018, IEEE Internet of Things Journal.
[96] Xinyu Yang,et al. On False Data Injection Attacks against Distributed Energy Routing in Smart Grid , 2012, 2012 IEEE/ACM Third International Conference on Cyber-Physical Systems.
[97] Saurabh Bagchi,et al. TRIFECTA: Security, Energy Efficiency, and Communication Capacity Comparison for Wireless IoT Devices , 2017, IEEE Internet Computing.
[98] Fei-Yue Wang,et al. Traffic Flow Prediction With Big Data: A Deep Learning Approach , 2015, IEEE Transactions on Intelligent Transportation Systems.
[99] Hassan Aljifri,et al. IP Traceback using header compression , 2003, Comput. Secur..
[100] Xinyu Yang,et al. Towards Multistep Electricity Prices in Smart Grid Electricity Markets , 2016, IEEE Transactions on Parallel and Distributed Systems.
[101] Yuefei Zhu,et al. A Deep Learning Approach for Intrusion Detection Using Recurrent Neural Networks , 2017, IEEE Access.
[102] Xiaoqing Ding,et al. Discriminative Dimensionality Reduction for Multi-Dimensional Sequences , 2018, IEEE Transactions on Pattern Analysis and Machine Intelligence.
[103] Mohsen Guizani,et al. Deep Learning for IoT Big Data and Streaming Analytics: A Survey , 2017, IEEE Communications Surveys & Tutorials.
[104] Andrew Kusiak,et al. Smart manufacturing , 2018, Int. J. Prod. Res..
[105] Nada Golmie,et al. Toward Edge-Based Deep Learning in Industrial Internet of Things , 2020, IEEE Internet of Things Journal.
[106] Guigang Zhang,et al. Deep Learning , 2016, Int. J. Semantic Comput..
[107] Yang Xiang,et al. A survey on security control and attack detection for industrial cyber-physical systems , 2018, Neurocomputing.
[108] Soummya Kar,et al. Optimal Attack Strategies Subject to Detection Constraints Against Cyber-Physical Systems , 2016, IEEE Transactions on Control of Network Systems.
[109] Goichiro Hanaoka,et al. Model Inversion Attacks for Online Prediction Systems: Without Knowledge of Non-Sensitive Attributes , 2018, IEICE Trans. Inf. Syst..
[110] Xinyu Yang,et al. A Novel En-Route Filtering Scheme Against False Data Injection Attacks in Cyber-Physical Networked Systems , 2012, IEEE Transactions on Computers.
[111] Khattab M. Ali Alheeti,et al. An intrusion detection system against malicious attacks on the communication network of driverless cars , 2015, 2015 12th Annual IEEE Consumer Communications and Networking Conference (CCNC).
[112] Chih-Fong Tsai,et al. CANN: An intrusion detection system based on combining cluster centers and nearest neighbors , 2015, Knowl. Based Syst..
[113] Arun Viswanathan,et al. A Master Attack Methodology for an AI-Based Automated Attack Planner for Smart Cities , 2018, IEEE Access.
[114] Jiangchuan Liu,et al. When deep learning meets edge computing , 2017, 2017 IEEE 25th International Conference on Network Protocols (ICNP).
[115] Ahmad-Reza Sadeghi,et al. IoT SENTINEL: Automated Device-Type Identification for Security Enforcement in IoT , 2016, 2017 IEEE 37th International Conference on Distributed Computing Systems (ICDCS).
[116] Ying Cui,et al. 2017 Energy-Efficient Resource Allocation for Cache-Assisted Mobile Edge Computing , 2017 .
[117] Jeffrey F. Naughton,et al. A Methodology for Formalizing Model-Inversion Attacks , 2016, 2016 IEEE 29th Computer Security Foundations Symposium (CSF).
[118] Cong Wang,et al. GELU-Net: A Globally Encrypted, Locally Unencrypted Deep Neural Network for Privacy-Preserved Learning , 2018, IJCAI.
[119] Fabio Roli,et al. Why Do Adversarial Attacks Transfer? Explaining Transferability of Evasion and Poisoning Attacks , 2018, USENIX Security Symposium.
[120] Huichen Lihuichen. DECISION-BASED ADVERSARIAL ATTACKS: RELIABLE ATTACKS AGAINST BLACK-BOX MACHINE LEARNING MODELS , 2017 .
[121] Erik Blasch,et al. Towards Multimodal Learning for Android Malware Detection , 2019, 2019 International Conference on Computing, Networking and Communications (ICNC).
[122] Hong Li,et al. Image and Attribute Based Convolutional Neural Network Inference Attacks in Social Networks , 2020, IEEE Transactions on Network Science and Engineering.
[123] A. Keromytis,et al. I'm Not a Human: Breaking the Google reCAPTCHA , 2016 .
[124] Dong Yu,et al. Deep Learning and Its Applications to Signal and Information Processing [Exploratory DSP] , 2011, IEEE Signal Processing Magazine.
[125] Kevin Heaslip,et al. CPS: an efficiency-motivated attack against autonomous vehicular transportation , 2013, ACSAC.
[126] Fabio Roli,et al. Wild Patterns: Ten Years After the Rise of Adversarial Machine Learning , 2018, CCS.
[127] Lipo Wang,et al. Deep Learning Applications in Medical Image Analysis , 2018, IEEE Access.
[128] Xinyu Yang,et al. A Survey on the Edge Computing for the Internet of Things , 2018, IEEE Access.
[129] William J. Buchanan,et al. Numerical encoding to Tame SQL injection attacks , 2016, NOMS 2016 - 2016 IEEE/IFIP Network Operations and Management Symposium.
[130] Blaine Nelson,et al. Poisoning Attacks against Support Vector Machines , 2012, ICML.
[131] Nada Golmie,et al. An integrated detection system against false data injection attacks in the Smart Grid , 2015, Secur. Commun. Networks.
[132] Demis Hassabis,et al. A general reinforcement learning algorithm that masters chess, shogi, and Go through self-play , 2018, Science.
[133] Trevor Darrell,et al. Adversarial Discriminative Domain Adaptation , 2017, 2017 IEEE Conference on Computer Vision and Pattern Recognition (CVPR).
[134] Xiaojiang Du,et al. A Distributed Deep Learning System for Web Attack Detection on Edge Devices , 2020, IEEE Transactions on Industrial Informatics.
[135] Georgios Kambourakis,et al. DDoS in the IoT: Mirai and Other Botnets , 2017, Computer.
[136] Ian S. Fischer,et al. Learning to Attack: Adversarial Transformation Networks , 2018, AAAI.
[137] Song Guo,et al. Green Resource Allocation Based on Deep Reinforcement Learning in Content-Centric IoT , 2018, IEEE Transactions on Emerging Topics in Computing.
[138] Shai Ben-David,et al. Understanding Machine Learning: From Theory to Algorithms , 2014 .
[139] Sanming Zhou,et al. Networking for Big Data: A Survey , 2017, IEEE Communications Surveys & Tutorials.
[140] Thomas Eisenbarth,et al. SPOILER: Speculative Load Hazards Boost Rowhammer and Cache Attacks , 2019, USENIX Security Symposium.
[141] Wei Yu,et al. On statistical modeling and forecasting of energy usage in smart grid , 2014, RACS '14.
[142] Oleg Starostenko,et al. Breaking reCAPTCHAs with Unpredictable Collapse: Heuristic Character Segmentation and Recognition , 2012, MCPR.
[143] John A. Stankovic,et al. Research Directions for the Internet of Things , 2014, IEEE Internet of Things Journal.
[144] Honglak Lee,et al. Online Incremental Feature Learning with Denoising Autoencoders , 2012, AISTATS.
[145] Xinwen Fu,et al. Towards Deep Learning-Based Detection Scheme with Raw ECG Signal for Wearable Telehealth Systems , 2019, 2019 28th International Conference on Computer Communication and Networks (ICCCN).
[146] Sancheng Peng,et al. Smartphone Malware and Its Propagation Modeling: A Survey , 2014, IEEE Communications Surveys & Tutorials.
[147] Ben Y. Zhao,et al. Penny Auctions are Predictable: Predicting and Profiling User Behavior on DealDash , 2018, HT.
[148] Xinyu Yang,et al. Data Integrity Attacks Against Dynamic Route Guidance in Transportation-Based Cyber-Physical Systems: Modeling, Analysis, and Defense , 2018, IEEE Transactions on Vehicular Technology.
[149] Qinru Qiu,et al. A Hierarchical Framework of Cloud Resource Allocation and Power Management Using Deep Reinforcement Learning , 2017, 2017 IEEE 37th International Conference on Distributed Computing Systems (ICDCS).
[150] Vinay Sudhakaran,et al. Estimation of intersection traffic density on decentralized architectures with deep networks , 2017, 2017 International Smart Cities Conference (ISC2).
[151] Michael Backes,et al. Studying the Impact of Managers on Password Strength and Reuse , 2017, USENIX Security Symposium.
[152] Sushanta Karmakar,et al. A Neural Network based system for Intrusion Detection and attack classification , 2016, 2016 Twenty Second National Conference on Communication (NCC).
[153] Roberto Cipolla,et al. SegNet: A Deep Convolutional Encoder-Decoder Architecture for Image Segmentation , 2015, IEEE Transactions on Pattern Analysis and Machine Intelligence.
[154] Guofei Gu,et al. Using an Ensemble of One-Class SVM Classifiers to Harden Payload-based Anomaly Detection Systems , 2006, Sixth International Conference on Data Mining (ICDM'06).
[155] Vitaly Shmatikov,et al. Membership Inference Attacks Against Machine Learning Models , 2016, 2017 IEEE Symposium on Security and Privacy (SP).
[156] Vitaly Shmatikov,et al. Privacy-preserving deep learning , 2015, 2015 53rd Annual Allerton Conference on Communication, Control, and Computing (Allerton).
[157] Ming-Yang Kao,et al. Hamsa: fast signature generation for zero-day polymorphic worms with provable attack resilience , 2006, 2006 IEEE Symposium on Security and Privacy (S&P'06).
[158] Yifan Guo,et al. A Unified Unsupervised Gaussian Mixture Variational Autoencoder for High Dimensional Outlier Detection , 2018, 2018 IEEE International Conference on Big Data (Big Data).
[159] Lei Liu,et al. Combining supervised and unsupervised learning for zero-day malware detection , 2013, 2013 Proceedings IEEE INFOCOM.
[160] Konrad Rieck,et al. Misleading Authorship Attribution of Source Code using Adversarial Learning , 2019, USENIX Security Symposium.
[161] Jessica Staddon,et al. Detecting and correcting malicious data in VANETs , 2004, VANET '04.
[162] Marc Peter Deisenroth,et al. Deep Reinforcement Learning: A Brief Survey , 2017, IEEE Signal Processing Magazine.
[163] Antonio Liotta,et al. Big IoT data mining for real-time energy disaggregation in buildings , 2017, 2016 IEEE International Conference on Systems, Man, and Cybernetics (SMC).
[164] Peng Liu,et al. Towards Large-Scale Hunting for Android Negative-Day Malware , 2019, RAID.
[165] Nada Golmie,et al. Toward Integrating Distributed Energy Resources and Storage Devices in Smart Grid , 2017, IEEE Internet of Things Journal.
[166] Wei Yu,et al. A Survey of Deep Learning: Platforms, Applications and Emerging Research Trends , 2018, IEEE Access.
[167] Ling Huang,et al. ANTIDOTE: understanding and defending against poisoning of anomaly detectors , 2009, IMC '09.
[168] Debdeep Mukhopadhyay,et al. Adversarial Attacks and Defences: A Survey , 2018, ArXiv.
[169] Xinwen Fu,et al. A Survey on Big Data Market: Pricing, Trading and Protection , 2018, IEEE Access.
[170] Abhishek Dubey,et al. Optimal detection of faulty traffic sensors used in route planning , 2017, SCOPE@CPSWeek.
[171] Peter Corcoran,et al. Deep Learning for Consumer Devices and Services: Pushing the limits for machine learning, artificial intelligence, and computer vision. , 2017, IEEE Consumer Electronics Magazine.