Automation for information security using machine learning
暂无分享,去创建一个
[1] Lakshminarayanan Subramanian,et al. The Fake vs Real Goods Problem: Microscopy and Machine Learning to the Rescue , 2017, KDD.
[2] Geoffrey E. Hinton,et al. ImageNet classification with deep convolutional neural networks , 2012, Commun. ACM.
[3] Yoshua Bengio,et al. Gated Feedback Recurrent Neural Networks , 2015, ICML.
[4] Jerry den Hartog,et al. Cross-Domain Attribute Conversion for Authentication and Authorization , 2015, 2015 10th International Conference on Availability, Reliability and Security.
[5] Wei Wang,et al. The robustness of hollow CAPTCHAs , 2013, CCS.
[6] Thirimachos Bourlai,et al. Gender and ethnicity classification using deep learning in heterogeneous face recognition , 2016, 2016 International Conference on Biometrics (ICB).
[7] Yuan Yu,et al. TensorFlow: A system for large-scale machine learning , 2016, OSDI.
[8] Andrew Zisserman,et al. Very Deep Convolutional Networks for Large-Scale Image Recognition , 2014, ICLR.
[9] C. Stoll. The Cuckoo's Egg : Tracking a Spy Through the Maze of Computer Espionage , 1990 .
[10] Hua Liu,et al. Watch Me, but Don't Touch Me! Contactless Control Flow Monitoring via Electromagnetic Emanations , 2017, CCS.
[11] Jeffrey Pennington,et al. GloVe: Global Vectors for Word Representation , 2014, EMNLP.
[12] Yoshua Bengio,et al. A Neural Probabilistic Language Model , 2003, J. Mach. Learn. Res..
[13] Yongfeng Huang,et al. RNN-SM: Fast Steganalysis of VoIP Streams Using Recurrent Neural Network , 2018, IEEE Transactions on Information Forensics and Security.
[14] Elena Paslaru Bontas Simperl,et al. An Experiment in Comparing Human-Computation Techniques , 2012, IEEE Internet Computing.
[15] Kuldip K. Paliwal,et al. Bidirectional recurrent neural networks , 1997, IEEE Trans. Signal Process..
[16] Moritz Marc Beller,et al. An Empirical Evaluation of Feedback-Driven Software Development , 2018 .
[17] W. Lueks,et al. Security and Privacy via Cryptography Having your cake and eating it too , 2017 .
[18] Y Yaping Luo,et al. From conceptual models to safety assurance : applying model-based techniques to support safety assurance , 2016 .
[19] Yu Zhang,et al. Automatic Mobile Application Traffic Identification by Convolutional Neural Networks , 2016, 2016 IEEE Trustcom/BigDataSE/ISPA.
[20] Shiho Moriai,et al. Privacy-Preserving Deep Learning via Additively Homomorphic Encryption , 2018, IEEE Transactions on Information Forensics and Security.
[21] Yoshua Bengio,et al. Empirical Evaluation of Gated Recurrent Neural Networks on Sequence Modeling , 2014, ArXiv.
[22] Neil C. Rowe. Automatic Detection of Fake File Systems , 2005 .
[23] Anil K. Jain,et al. Face retriever: Pre-filtering the gallery via deep neural net , 2015, 2015 International Conference on Biometrics (ICB).
[24] Cornelia Caragea,et al. Content-Driven Detection of Cyberbullying on the Instagram Social Network , 2016, IJCAI.
[25] Maarten Versteegh,et al. Learning Text Similarity with Siamese Recurrent Networks , 2016, Rep4NLP@ACL.
[26] Jürgen Schmidhuber,et al. Stacked Convolutional Auto-Encoders for Hierarchical Feature Extraction , 2011, ICANN.
[27] Jeff Yan,et al. A security analysis of automated chinese turing tests , 2016, ACSAC.
[28] Thomas M. Cover,et al. Elements of Information Theory , 2005 .
[29] Vitaly Shmatikov,et al. Beauty and the Burst: Remote Identification of Encrypted Video Streams , 2017, USENIX Security Symposium.
[30] Prateek Saxena,et al. Auror: defending against poisoning attacks in collaborative deep learning systems , 2016, ACSAC.
[31] Zhi-Hua Zhou,et al. A brief introduction to weakly supervised learning , 2018 .
[32] Yoshua Bengio,et al. Learning long-term dependencies with gradient descent is difficult , 1994, IEEE Trans. Neural Networks.
[33] Razvan Pascanu,et al. On the difficulty of training recurrent neural networks , 2012, ICML.
[34] Jaideep Srivastava,et al. A Comparative Study of Anomaly Detection Schemes in Network Intrusion Detection , 2003, SDM.
[35] Mitsugu Iwamoto,et al. Deep-Learning-Based Security Evaluation on Authentication Systems Using Arbiter PUF and Its Variants , 2016, IWSEC.
[36] Jason Weston,et al. Natural Language Processing (Almost) from Scratch , 2011, J. Mach. Learn. Res..
[37] Bin Li,et al. Detection of Double Compressed AMR Audio Using Stacked Autoencoder , 2017, IEEE Transactions on Information Forensics and Security.
[38] Yoshua Bengio,et al. Show, Attend and Tell: Neural Image Caption Generation with Visual Attention , 2015, ICML.
[39] Dieter Fensel,et al. Knowledge Modeling of On-line Value Management , 2012, ESWC.
[40] Jeffrey Dean,et al. Efficient Estimation of Word Representations in Vector Space , 2013, ICLR.
[41] Frank Harary,et al. Graph Theory , 2016 .
[42] Nir Ailon,et al. Deep Metric Learning Using Triplet Network , 2014, SIMBAD.
[43] U Ulyana Tikhonova,et al. Engineering the dynamic semantics of domain specific languages , 2017 .
[44] Umut Topkara,et al. A Secure Mobile Authentication Alternative to Biometrics , 2017, ACSAC.
[45] Jian Sun,et al. Deep Residual Learning for Image Recognition , 2015, 2016 IEEE Conference on Computer Vision and Pattern Recognition (CVPR).
[46] Robert Tibshirani,et al. Estimating the number of clusters in a data set via the gap statistic , 2000 .
[47] Salvatore J. Stolfo,et al. Lost in Translation: Improving Decoy Documents via Automated Translation , 2012, 2012 IEEE Symposium on Security and Privacy Workshops.
[48] Michael I. Jordan,et al. Distance Metric Learning with Application to Clustering with Side-Information , 2002, NIPS.
[49] David Menotti,et al. Learning Deep Off-the-Person Heart Biometrics Representations , 2017, IEEE Transactions on Information Forensics and Security.
[50] Minh Hai Nguyen,et al. Auto-detection of sophisticated malware using lazy-binding control flow graph and deep learning , 2018, Comput. Secur..
[51] Gregory R. Koch,et al. Siamese Neural Networks for One-Shot Image Recognition , 2015 .
[52] Paolo Bestagini,et al. Data-Driven Feature Characterization Techniques for Laser Printer Attribution , 2017, IEEE Transactions on Information Forensics and Security.
[53] Ben Y. Zhao,et al. Automated Crowdturfing Attacks and Defenses in Online Review Systems , 2017, CCS.
[54] Saeed Darabi,et al. Verification of Program Parallelization , 2018 .
[55] Ali Farhadi,et al. Unsupervised Deep Embedding for Clustering Analysis , 2015, ICML.
[56] James Philbin,et al. FaceNet: A unified embedding for face recognition and clustering , 2015, 2015 IEEE Conference on Computer Vision and Pattern Recognition (CVPR).
[57] Martin Steinebach,et al. Forensic Image Inspection Assisted by Deep Learning , 2017, ARES.
[58] Hung Q. Ngo,et al. A Data-Centric Approach to Insider Attack Detection in Database Systems , 2010, RAID.
[59] Hrishikesh Salunkhe. Modeling and buffer analysis of real-time streaming radio applications scheduled on heterogeneous multiprocessors , 2017 .
[60] Guigang Zhang,et al. Deep Learning , 2016, Int. J. Semantic Comput..
[61] Jimmy Ba,et al. Adam: A Method for Stochastic Optimization , 2014, ICLR.
[62] David Menotti,et al. Deep Representations for Iris, Face, and Fingerprint Spoofing Detection , 2014, IEEE Transactions on Information Forensics and Security.
[63] Vlado Menkovski,et al. The Role of Deep Learning in Improving Healthcare , 2019, Data Science for Healthcare.
[64] Nitish Srivastava,et al. Dropout: a simple way to prevent neural networks from overfitting , 2014, J. Mach. Learn. Res..
[65] Risto Vaarandi,et al. LogCluster - A data clustering and pattern mining algorithm for event logs , 2015, 2015 11th International Conference on Network and Service Management (CNSM).
[66] Christopher Krügel,et al. Meerkat: Detecting Website Defacements through Image-based Object Recognition , 2015, USENIX Security Symposium.
[67] P. Rousseeuw. Silhouettes: a graphical aid to the interpretation and validation of cluster analysis , 1987 .
[68] Geoffrey E. Hinton,et al. Speech recognition with deep recurrent neural networks , 2013, 2013 IEEE International Conference on Acoustics, Speech and Signal Processing.
[69] Malek Ben Salem,et al. A Survey of Insider Attack Detection Research , 2008, Insider Attack and Cyber Security.
[70] Marcus Gerhold,et al. Choice and chance : model-based testing of stochastic behaviour , 2018 .
[71] A. Krasnova. Smart invaders of private matters: Privacy of communication on the Internet and in the Internet of Things (IoT) , 2017 .
[72] Tian Zhang,et al. BIRCH: an efficient data clustering method for very large databases , 1996, SIGMOD '96.
[73] Yoshua Bengio,et al. Extracting and composing robust features with denoising autoencoders , 2008, ICML '08.
[74] Tieniu Tan,et al. Transferring deep representation for NIR-VIS heterogeneous face recognition , 2016, 2016 International Conference on Biometrics (ICB).
[75] Elie Bienenstock,et al. Neural Networks and the Bias/Variance Dilemma , 1992, Neural Computation.
[76] Lei Zheng,et al. SEVEN: Deep Semi-supervised Verification Networks , 2017, IJCAI.
[77] Jiwu Huang,et al. Large-Scale JPEG Image Steganalysis Using Hybrid Deep-Learning Framework , 2016, IEEE Transactions on Information Forensics and Security.
[78] Tom van Dijk,et al. Sylvan: multi-core decision diagrams , 2015, TACAS.
[79] Yang Zhong,et al. Face attribute prediction using off-the-shelf CNN features , 2016, 2016 International Conference on Biometrics (ICB).
[80] Jürgen Schmidhuber,et al. Multi-column deep neural networks for image classification , 2012, 2012 IEEE Conference on Computer Vision and Pattern Recognition.
[81] Yann LeCun,et al. Signature Verification Using A "Siamese" Time Delay Neural Network , 1993, Int. J. Pattern Recognit. Artif. Intell..
[82] Michael I. Jordan,et al. Detecting large-scale system problems by mining console logs , 2009, SOSP '09.
[83] Thomas G. Dietterich. What is machine learning? , 2020, Archives of Disease in Childhood.
[84] Yuhan Zhang,et al. Mobile Phone Clustering From Speech Recordings Using Deep Representation and Spectral Clustering , 2018, IEEE Transactions on Information Forensics and Security.
[85] Hao Chen,et al. MagNet: A Two-Pronged Defense against Adversarial Examples , 2017, CCS.
[86] Vlado Menkovski,et al. Deep Metric Learning for Sequential Data Using Approximate Information , 2018, MLDM.
[87] A Aminah Zawedde,et al. Modeling the dynamics of requirements process improvement , 2016 .
[88] Yann LeCun,et al. Learning a similarity metric discriminatively, with application to face verification , 2005, 2005 IEEE Computer Society Conference on Computer Vision and Pattern Recognition (CVPR'05).
[89] Richa Singh,et al. Detecting Facial Retouching Using Supervised Deep Learning , 2016, IEEE Transactions on Information Forensics and Security.
[90] Alex Graves,et al. Generating Sequences With Recurrent Neural Networks , 2013, ArXiv.
[91] Elena Paslaru Bontas Simperl,et al. Combining human and computation intelligence: the case of data interlinking tools , 2012, Int. J. Metadata Semant. Ontologies.
[92] Sergey Ioffe,et al. Batch Normalization: Accelerating Deep Network Training by Reducing Internal Covariate Shift , 2015, ICML.
[93] Mounim A. El-Yacoubi,et al. Deep Representation-Based Feature Extraction and Recovering for Finger-Vein Verification , 2017, IEEE Transactions on Information Forensics and Security.
[94] Vlado Menkovski,et al. Unsupervised Signature Extraction from Forensic Logs , 2017, ECML/PKDD.
[95] Yasushi Makihara,et al. GEINet: View-invariant gait recognition using a convolutional neural network , 2016, 2016 International Conference on Biometrics (ICB).
[96] Himanshu S. Bhatt,et al. Domain Specific Learning for Newborn Face Recognition , 2016, IEEE Transactions on Information Forensics and Security.
[97] Quirijn W. Bouts,et al. Geographic graph construction and visualization , 2017 .
[98] Kevin W. Bowyer,et al. Recognition of Image-Orientation-Based Iris Spoofing , 2017, IEEE Transactions on Information Forensics and Security.
[99] Ben Whitham. AUTOMATING THE GENERATION OF FAKE DOCUMENTS TO DETECT NETWORKINTRUDERS , 2013 .
[100] Chris Dyer,et al. On the State of the Art of Evaluation in Neural Language Models , 2017, ICLR.
[101] Yoshua Bengio,et al. Generative Adversarial Nets , 2014, NIPS.
[102] Dieter Fensel,et al. Effective and Efficient On-Line Communication , 2012, 2012 23rd International Workshop on Database and Expert Systems Applications.
[103] Paul J. Werbos,et al. Backpropagation Through Time: What It Does and How to Do It , 1990, Proc. IEEE.
[104] Mahmoud Talebi,et al. Scalable performance analysis of wireless sensor networks , 2018 .
[105] Kwangjo Kim,et al. Deep Abstraction and Weighted Feature Selection for Wi-Fi Impersonation Detection , 2018, IEEE Transactions on Information Forensics and Security.
[106] William C. Barker. Guideline for Identifying an Information System as a National Security System , 2003 .
[107] Baris Ege. Physical Security Analysis of Embedded Devices , 2016 .
[108] Joan Bruna,et al. Intriguing properties of neural networks , 2013, ICLR.
[109] Samy Bengio,et al. Show and tell: A neural image caption generator , 2014, 2015 IEEE Conference on Computer Vision and Pattern Recognition (CVPR).
[110] Rama Chellappa,et al. Attributes for Improved Attributes: A Multi-Task Network Utilizing Implicit and Explicit Relationships for Facial Attribute Classification , 2017, AAAI.
[111] M. Alizadeh. Auditing of user behavior: identification, analysis and understanding of deviations , 2018 .
[112] Jian Li,et al. An Evaluation Study on Log Parsing and Its Use in Log Mining , 2016, 2016 46th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN).
[113] Le Song,et al. Discriminative Embeddings of Latent Variable Models for Structured Data , 2016, ICML.
[114] Takashi Nishide,et al. Network Intrusion Detection Based on Semi-supervised Variational Auto-Encoder , 2017, ESORICS.
[115] Richa Singh,et al. Composite sketch recognition via deep network - a transfer learning approach , 2015, 2015 International Conference on Biometrics (ICB).
[116] Yoshua Bengio,et al. On Using Very Large Target Vocabulary for Neural Machine Translation , 2014, ACL.
[117] Quoc V. Le,et al. Sequence to Sequence Learning with Neural Networks , 2014, NIPS.
[118] van Ac Allan Hulst,et al. Control synthesis using modal logic and partial bisimilarity : a treatise supported by computer verified proofs , 2016 .
[119] Anil K. Jain,et al. Latent orientation field estimation via convolutional neural network , 2015, 2015 International Conference on Biometrics (ICB).
[120] Vitaly Shmatikov,et al. Privacy-preserving deep learning , 2015, 2015 53rd Annual Allerton Conference on Communication, Control, and Computing (Allerton).
[121] Yoshua Bengio,et al. Neural Machine Translation by Jointly Learning to Align and Translate , 2014, ICLR.
[122] Le Song,et al. Neural Network-based Graph Embedding for Cross-Platform Binary Code Similarity Detection , 2018 .
[123] Patrice Y. Simard,et al. Best practices for convolutional neural networks applied to visual document analysis , 2003, Seventh International Conference on Document Analysis and Recognition, 2003. Proceedings..
[124] Yoshua Bengio,et al. Random Search for Hyper-Parameter Optimization , 2012, J. Mach. Learn. Res..
[125] Julio Hernandez-Castro,et al. No Bot Expects the DeepCAPTCHA! Introducing Immutable Adversarial Examples, With Applications to CAPTCHA Generation , 2017, IEEE Transactions on Information Forensics and Security.
[126] S.M.J. de Putter,et al. Verification of concurrent systems in a model-driven engineering workflow , 2019 .
[127] Ajay Kumar,et al. Accurate Periocular Recognition Under Less Constrained Environment Using Semantics-Assisted Convolutional Neural Network , 2017, IEEE Transactions on Information Forensics and Security.
[128] Ben Whitham. CANARY FILES: GENERATING FAKE FILES TO DETECT CRITICAL DATA LOSS FROM COMPLEX COMPUTER NETWORKS , 2013 .
[129] Dennis Guck,et al. Reliable systems: fault tree analysis via Markov reward automata , 2017 .
[130] Jiebo Luo,et al. Robust Image Sentiment Analysis Using Progressively Trained and Domain Transferred Deep Networks , 2015, AAAI.
[131] Zhenan Sun,et al. Accurate iris segmentation in non-cooperative environments using fully convolutional networks , 2016, 2016 International Conference on Biometrics (ICB).
[132] Graham W. Taylor,et al. Adaptive deconvolutional networks for mid and high level feature learning , 2011, 2011 International Conference on Computer Vision.
[133] Lance Spitzner,et al. Honeypots: catching the insider threat , 2003, 19th Annual Computer Security Applications Conference, 2003. Proceedings..
[134] Gorthi R. K. Sai Subrahmanyam,et al. Exploring the learning capabilities of convolutional neural networks for robust image watermarking , 2017, Comput. Secur..
[135] Yoshua Bengio,et al. Learning Phrase Representations using RNN Encoder–Decoder for Statistical Machine Translation , 2014, EMNLP.
[136] Ananthram Swami,et al. Practical Black-Box Attacks against Machine Learning , 2016, AsiaCCS.
[137] Daisuke Miyamoto,et al. An Evaluation of Machine Learning-Based Methods for Detection of Phishing Sites , 2008, ICONIP.
[138] Ananthram Swami,et al. Distillation as a Defense to Adversarial Perturbations Against Deep Neural Networks , 2015, 2016 IEEE Symposium on Security and Privacy (SP).
[139] Salvatore J. Stolfo,et al. Bait and Snitch: Defending Computer Systems with Decoys , 2013 .
[140] Vlado Menkovski,et al. Towards unsupervised signature extraction of forensic logs , 2017 .
[141] Jürgen Schmidhuber,et al. Deep learning in neural networks: An overview , 2014, Neural Networks.
[142] J. R. Salamanca Tellez,et al. Coequations and Eilenberg–type Correspondences , 2018 .
[143] Elena Simperl,et al. SpotTheLink: A Game-Based Approach to the Alignment of Ontologies , 2012 .
[144] Waheed Ahmad,et al. Green computing: efficient energy management of multiprocessor streaming applications via model checking , 2017 .
[145] Ashish Vaswani,et al. Supertagging With LSTMs , 2016, NAACL.
[146] P. A. Inostroza Valdera. Structuring languages as object-oriented libraries , 2018 .
[147] Ananthram Swami,et al. The Limitations of Deep Learning in Adversarial Settings , 2015, 2016 IEEE European Symposium on Security and Privacy (EuroS&P).
[148] Michael S. Bernstein,et al. ImageNet Large Scale Visual Recognition Challenge , 2014, International Journal of Computer Vision.
[149] Rachel Greenstadt,et al. Source Code Authorship Attribution Using Long Short-Term Memory Based Networks , 2017, ESORICS.
[150] Wil M. P. van der Aalst,et al. Workflow mining: discovering process models from event logs , 2004, IEEE Transactions on Knowledge and Data Engineering.
[151] Xiaogang Wang,et al. Deep Learning Face Representation by Joint Identification-Verification , 2014, NIPS.
[152] Jürgen Schmidhuber,et al. LSTM: A Search Space Odyssey , 2015, IEEE Transactions on Neural Networks and Learning Systems.
[153] Salvatore J. Stolfo,et al. Baiting Inside Attackers Using Decoy Documents , 2009, SecureComm.
[154] Dawn Xiaodong Song,et al. Recognizing Functions in Binaries with Neural Networks , 2015, USENIX Security Symposium.
[155] atherine,et al. Finding the number of clusters in a data set : An information theoretic approach C , 2003 .
[156] Ian Goodfellow,et al. Deep Learning with Differential Privacy , 2016, CCS.
[157] Ben Whitham,et al. Design requirements for generating deceptive content to protect document repositories , 2014 .
[158] Tara N. Sainath,et al. Deep Neural Networks for Acoustic Modeling in Speech Recognition: The Shared Views of Four Research Groups , 2012, IEEE Signal Processing Magazine.
[159] Ali Farhadi,et al. You Only Look Once: Unified, Real-Time Object Detection , 2015, 2016 IEEE Conference on Computer Vision and Pattern Recognition (CVPR).
[160] B. Nordstrom. FINITE MARKOV CHAINS , 2005 .
[161] Risto Vaarandi,et al. A data clustering algorithm for mining patterns from event logs , 2003, Proceedings of the 3rd IEEE Workshop on IP Operations & Management (IPOM 2003) (IEEE Cat. No.03EX764).
[162] Julia Hirschberg,et al. V-Measure: A Conditional Entropy-Based External Cluster Evaluation Measure , 2007, EMNLP.
[163] Jon Stearley,et al. What Supercomputers Say: A Study of Five System Logs , 2007, 37th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN'07).
[164] John Langford,et al. CAPTCHA: Using Hard AI Problems for Security , 2003, EUROCRYPT.
[165] Andrew Y. Ng,et al. Zero-Shot Learning Through Cross-Modal Transfer , 2013, NIPS.
[166] L. Swartjes,et al. Model-based design of baggage handling systems , 2018 .
[167] Richa Singh,et al. Face Verification via Learned Representation on Feature-Rich Video Frames , 2017, IEEE Transactions on Information Forensics and Security.
[168] J. Yuill,et al. Honeyfiles: deceptive files for intrusion detection , 2004, Proceedings from the Fifth Annual IEEE SMC Information Assurance Workshop, 2004..
[169] Am Ana Sutii. Modularity and reuse of domain-specific languages : an exploration with MetaMod , 2017 .
[170] Yin Yang,et al. Functional Mechanism: Regression Analysis under Differential Privacy , 2012, Proc. VLDB Endow..
[171] Jerry den Hartog,et al. Towards Creating Believable Decoy Project Folders for Detecting Data Theft , 2016, DBSec.
[172] Zhenkai Liang,et al. Neural Nets Can Learn Function Type Signatures From Binaries , 2017, USENIX Security Symposium.
[173] Hiroshi Fujinoki,et al. A Survey: Recent Advances and Future Trends in Honeypot Research , 2012 .
[174] Hongxia Jin,et al. Privacy-CNH: A Framework to Detect Photo Privacy with Convolutional Neural Network using Hierarchical Features , 2016, AAAI.
[175] James Bailey,et al. Information Theoretic Measures for Clusterings Comparison: Variants, Properties, Normalization and Correction for Chance , 2010, J. Mach. Learn. Res..
[176] Yang Song,et al. Learning Fine-Grained Image Similarity with Deep Ranking , 2014, 2014 IEEE Conference on Computer Vision and Pattern Recognition.
[177] Jonas Mueller,et al. Siamese Recurrent Architectures for Learning Sentence Similarity , 2016, AAAI.
[178] P. Fiterau-Brostean. Active Model Learning for the Analysis of Network Protocols , 2018 .
[179] Jiangqun Ni,et al. Deep Learning Hierarchical Representations for Image Steganalysis , 2017, IEEE Transactions on Information Forensics and Security.
[180] Shengcai Liao,et al. Multi-label CNN based pedestrian attribute learning for soft biometrics , 2015, 2015 International Conference on Biometrics (ICB).
[181] Qingshan Liu,et al. Image retrieval via probabilistic hypergraph ranking , 2010, 2010 IEEE Computer Society Conference on Computer Vision and Pattern Recognition.
[182] Evangelos E. Milios,et al. A Lightweight Algorithm for Message Type Extraction in System Application Logs , 2012, IEEE Transactions on Knowledge and Data Engineering.
[183] Joachim M. Buhmann,et al. Stability-Based Validation of Clustering Solutions , 2004, Neural Computation.
[184] David Maier,et al. The Complexity of Some Problems on Subsequences and Supersequences , 1978, JACM.
[185] Sarmen Keshishzadeh,et al. Formal analysis and verification of embedded systems for healthcare , 2016 .
[186] Max Welling,et al. Auto-Encoding Variational Bayes , 2013, ICLR.
[187] Masayuki Murata,et al. Malicious URL sequence detection using event de-noising convolutional neural network , 2017, 2017 IEEE International Conference on Communications (ICC).
[188] Ryan M. Eustice,et al. Learning visual feature descriptors for dynamic lighting conditions , 2014, 2014 IEEE/RSJ International Conference on Intelligent Robots and Systems.
[189] Elena Paslaru Bontas Simperl,et al. SeaFish: A Game for Collaborative and Visual Image Annotation and Interlinking , 2011, ESWC.
[190] Julian Fierrez,et al. Facial Soft Biometrics for Recognition in the Wild: Recent Works, Annotation, and COTS Evaluation , 2018, IEEE Transactions on Information Forensics and Security.
[191] Jian Sun,et al. Spatial Pyramid Pooling in Deep Convolutional Networks for Visual Recognition , 2014, IEEE Transactions on Pattern Analysis and Machine Intelligence.
[192] Geoffrey E. Hinton,et al. Outrageously Large Neural Networks: The Sparsely-Gated Mixture-of-Experts Layer , 2017, ICLR.
[193] Nikos Komodakis,et al. Learning to compare image patches via convolutional neural networks , 2015, 2015 IEEE Conference on Computer Vision and Pattern Recognition (CVPR).
[194] A Ali Mehrabi. Data structures for analyzing geometric data , 2017 .
[195] Tieniu Tan,et al. Exploring complementary features for iris recognition on mobile devices , 2016, 2016 International Conference on Biometrics (ICB).
[196] Ionut David. Run-time resource management for component-based systems , 2016 .
[197] Elena Paslaru Bontas Simperl,et al. SpotTheLink: playful alignment of ontologies , 2011, SAC '11.
[198] Noah A. Smith,et al. Transition-Based Dependency Parsing with Stack Long Short-Term Memory , 2015, ACL.
[199] Philip S. Yu,et al. Sequential Keystroke Behavioral Biometrics for Mobile User Identification via Multi-view Deep Learning , 2017, ECML/PKDD.
[200] D. Landman,et al. Reverse engineering source code: Empirical studies of limitations and opportunities , 2017 .
[201] Qiang Fu,et al. Execution Anomaly Detection in Distributed Systems through Unstructured Log Analysis , 2009, 2009 Ninth IEEE International Conference on Data Mining.
[202] Feifei Li,et al. DeepLog: Anomaly Detection and Diagnosis from System Logs through Deep Learning , 2017, CCS.
[203] Wojciech Zaremba,et al. An Empirical Exploration of Recurrent Network Architectures , 2015, ICML.
[204] Dejing Dou,et al. Differential Privacy Preservation for Deep Auto-Encoders: an Application of Human Behavior Prediction , 2016, AAAI.
[205] Angelos D. Keromytis,et al. I am Robot: (Deep) Learning to Break Semantic Image CAPTCHAs , 2016, 2016 IEEE European Symposium on Security and Privacy (EuroS&P).
[206] Quoc V. Le,et al. Semi-supervised Sequence Learning , 2015, NIPS.
[207] Lior Wolf,et al. I know that voice: Identifying the voice actor behind the voice , 2015, 2015 International Conference on Biometrics (ICB).
[208] Jiwen Lu,et al. Single Sample Face Recognition via Learning Deep Supervised Autoencoders , 2015, IEEE Transactions on Information Forensics and Security.
[209] Reuben A. Farrugia,et al. Matching Software-Generated Sketches to Face Photographs With a Very Deep CNN, Morphed Faces, and Transfer Learning , 2018, IEEE Transactions on Information Forensics and Security.
[210] Jürgen Schmidhuber,et al. Long Short-Term Memory , 1997, Neural Computation.
[211] Sarah Cobey,et al. Grants and Awards , 1981, Nursing in critical care.
[212] Michal Aharon,et al. One Graph Is Worth a Thousand Logs: Uncovering Hidden Structures in Massive System Event Logs , 2009, ECML/PKDD.
[213] Eric R. Ziegel,et al. The Elements of Statistical Learning , 2003, Technometrics.
[214] Kurt Hornik,et al. Approximation capabilities of multilayer feedforward networks , 1991, Neural Networks.
[215] Tao Li,et al. LogSig: generating system events from raw textual logs , 2011, CIKM '11.
[216] A. Amighi,et al. Specification and verification of synchronisation classes in Java : A practical approach , 2018 .
[217] Giuseppe Ateniese,et al. Deep Models Under the GAN: Information Leakage from Collaborative Deep Learning , 2017, CCS.
[218] Evangelos E. Milios,et al. Clustering event logs using iterative partitioning , 2009, KDD.
[219] Jian Pei,et al. A brief survey on sequence classification , 2010, SKDD.
[220] Enno Jozef Johannes Ruijters. Zen and the Art of Railway Maintenance: Analysis and Optimization of Maintenance via Fault Trees and Statistical Model Checking , 2018 .
[221] Nikolaos Bezirgiannis. Abstract behavioral specification: unifying modeling and programming , 2018 .
[222] Navdeep Jaitly,et al. Hybrid speech recognition with Deep Bidirectional LSTM , 2013, 2013 IEEE Workshop on Automatic Speech Recognition and Understanding.
[223] Gert Cauwenberghs,et al. A Fast Stochastic Error-Descent Algorithm for Supervised Learning and Optimization , 1992, NIPS.
[224] Milan Petkovic,et al. Towards a neural language model for signature extraction from forensic logs , 2017, 2017 5th International Symposium on Digital Forensic and Security (ISDFS).