Mobile device-centric approach for identifying problem spot in network using deep learning
暂无分享,去创建一个
[1] Hwangnam Kim,et al. Devising Mobile Sensing and Actuation Infrastructure with Drones , 2018, Sensors.
[2] Yoshua Bengio,et al. Understanding the difficulty of training deep feedforward neural networks , 2010, AISTATS.
[3] Yuan Yu,et al. TensorFlow: A system for large-scale machine learning , 2016, OSDI.
[4] Zhenlong Yuan,et al. Droid-Sec: deep learning in android malware detection , 2015, SIGCOMM 2015.
[5] Mounir Ghogho,et al. Deep learning approach for Network Intrusion Detection in Software Defined Networking , 2016, 2016 International Conference on Wireless Networks and Mobile Communications (WINCOM).
[6] Jimmy Ba,et al. Adam: A Method for Stochastic Optimization , 2014, ICLR.
[7] Nitish Srivastava,et al. Dropout: a simple way to prevent neural networks from overfitting , 2014, J. Mach. Learn. Res..
[8] Vrizlynn L. L. Thing,et al. IEEE 802.11 Network Anomaly Detection and Attack Classification: A Deep Learning Approach , 2017, 2017 IEEE Wireless Communications and Networking Conference (WCNC).
[9] Ed Warnicke,et al. Wireshark User’s Guide - For Wireshark 2.1 , 2016 .
[10] Christian Diedrich,et al. Accelerated deep neural networks for enhanced Intrusion Detection System , 2016, 2016 IEEE 21st International Conference on Emerging Technologies and Factory Automation (ETFA).
[11] Hwangnam Kim,et al. Designing interference‐aware network selection protocol for WLAN mobile devices , 2017, Trans. Emerg. Telecommun. Technol..
[12] Mansoor Alam,et al. A Deep Learning Approach for Network Intrusion Detection System , 2016, EAI Endorsed Trans. Security Safety.
[13] Kymie M. C. Tan,et al. Detection and classification of TCP/IP network services , 1997, Proceedings 13th Annual Computer Security Applications Conference.
[14] Jiri Matas,et al. All you need is a good init , 2015, ICLR.
[15] Satyajit Yadav,et al. Detection of Application Layer DDoS attack by feature learning using Stacked AutoEncoder , 2016, 2016 International Conference on Computational Techniques in Information and Communication Technologies (ICCTICT).
[16] Behnaz Arzani,et al. Taking the Blame Game out of Data Centers Operations with NetPoirot , 2016, SIGCOMM.
[17] Luciana S. Buriol,et al. How physical network topologies affect virtual network embedding quality: A characterization study based on ISP and datacenter networks , 2016, J. Netw. Comput. Appl..
[18] Hwangnam Kim,et al. AVSS: Airborne Video Surveillance System , 2018, Sensors.
[19] Eryk Dutkiewicz,et al. Cyberattack detection in mobile cloud computing: A deep learning approach , 2017, 2018 IEEE Wireless Communications and Networking Conference (WCNC).
[20] Xue Wang,et al. Comparison deep learning method to traditional methods using for network intrusion detection , 2016, 2016 8th IEEE International Conference on Communication Software and Networks (ICCSN).
[21] Yuefei Zhu,et al. A Deep Learning Approach for Intrusion Detection Using Recurrent Neural Networks , 2017, IEEE Access.
[22] Jian Sun,et al. Delving Deep into Rectifiers: Surpassing Human-Level Performance on ImageNet Classification , 2015, 2015 IEEE International Conference on Computer Vision (ICCV).
[23] Yuhong Wang,et al. Transmission Line Fault Identification Based on BP Neural Network , 2019, 2019 IEEE Innovative Smart Grid Technologies - Asia (ISGT Asia).
[24] Tara N. Sainath,et al. Improving deep neural networks for LVCSR using rectified linear units and dropout , 2013, 2013 IEEE International Conference on Acoustics, Speech and Signal Processing.
[25] Zhitang Chen,et al. Online flow size prediction for improved network routing , 2016, 2016 IEEE 24th International Conference on Network Protocols (ICNP).
[26] Prajakta Kulkarni,et al. mPHASiS: Mobile patient healthcare and sensor information system , 2011, J. Netw. Comput. Appl..
[27] Hwangnam Kim,et al. Drone Detection and Identification System using Artificial Intelligence , 2018, 2018 International Conference on Information and Communication Technology Convergence (ICTC).
[28] Namita Tiwari,et al. Survey Of DDoS Attacks Based On TCP / IP Protocol Vulnerabilities , 2016 .
[29] Luca Salgarelli,et al. Support Vector Machines for TCP traffic classification , 2009, Comput. Networks.
[30] George F. Riley,et al. The ns-3 Network Simulator , 2010, Modeling and Tools for Network Simulation.
[31] Hwangnam Kim,et al. Energy-Efficient Topology Control for UAV Networks , 2019 .
[32] Insoo Sohn,et al. Robustness enhancement of complex networks via No-Regret learning , 2019, ICT Express.