Comparative Study of CNN and RNN for Deep Learning Based Intrusion Detection System
暂无分享,去创建一个
Qiang Liu | Qian Li | Jun Long | Erxue Min | Jianjing Cui
[1] Yoshua Bengio,et al. On the Properties of Neural Machine Translation: Encoder–Decoder Approaches , 2014, SSST@EMNLP.
[2] Geoffrey Zweig,et al. Linguistic Regularities in Continuous Space Word Representations , 2013, NAACL.
[3] Mansour Sheikhan,et al. Intrusion detection using reduced-size RNN based on feature grouping , 2010, Neural Computing and Applications.
[4] Pablo Torres,et al. An analysis of Recurrent Neural Networks for Botnet detection behavior , 2016, 2016 IEEE Biennial Congress of Argentina (ARGENCON).
[5] Xiaolin Li,et al. DeepDefense: Identifying DDoS Attack via Deep Learning , 2017, 2017 IEEE International Conference on Smart Computing (SMARTCOMP).
[6] Jürgen Schmidhuber,et al. Long Short-Term Memory , 1997, Neural Computation.
[7] Ming Zhu,et al. Malware traffic classification using convolutional neural network for representation learning , 2017, 2017 International Conference on Information Networking (ICOIN).
[8] Jie Shan,et al. Research on Intrusion Detection Algorithm Based on BP Neural Network , 2015 .
[9] Jianping Yin,et al. Distributed and asynchronous Stochastic Gradient Descent with variance reduction , 2017, Neurocomputing.
[10] Yuefei Zhu,et al. A Deep Learning Approach for Intrusion Detection Using Recurrent Neural Networks , 2017, IEEE Access.
[11] Jeffrey L. Elman,et al. Finding Structure in Time , 1990, Cogn. Sci..
[12] Ali A. Ghorbani,et al. Toward developing a systematic approach to generate benchmark datasets for intrusion detection , 2012, Comput. Secur..
[13] Lei Wang,et al. An Adaptive Approach to Learning Optimal Neighborhood Kernels , 2013, IEEE Transactions on Cybernetics.
[14] Dumitru Erhan,et al. Going deeper with convolutions , 2014, 2015 IEEE Conference on Computer Vision and Pattern Recognition (CVPR).
[15] Geoffrey E. Hinton,et al. ImageNet classification with deep convolutional neural networks , 2012, Commun. ACM.
[16] Yoshua Bengio,et al. Gradient-based learning applied to document recognition , 1998, Proc. IEEE.
[17] Satish R. Kolhe,et al. Survey on Intrusion Detection System using Machine Learning Techniques , 2013 .
[18] Antonio Pescapè,et al. Issues and future directions in traffic classification , 2012, IEEE Network.