Variational LSTM Enhanced Anomaly Detection for Industrial Big Data
暂无分享,去创建一个
Jianhua Ma | Xiaokang Zhou | Wei Liang | Qun Jin | Yiyong Hu | Qun Jin | Jianhua Ma | Xiaokang Zhou | Wei Liang | Yiyong Hu
[1] Pascal Vincent,et al. Stacked Denoising Autoencoders: Learning Useful Representations in a Deep Network with a Local Denoising Criterion , 2010, J. Mach. Learn. Res..
[2] Pascal Vincent,et al. Representation Learning: A Review and New Perspectives , 2012, IEEE Transactions on Pattern Analysis and Machine Intelligence.
[3] Diederik P. Kingma,et al. Stochastic Gradient VB and the Variational Auto-Encoder , 2013 .
[4] Hon Sun Chiu,et al. Real Time Intrusion and Wormhole Attack Detection in Internet of Things , 2015 .
[5] Jill Slay,et al. The evaluation of Network Anomaly Detection Systems: Statistical analysis of the UNSW-NB15 data set and the comparison with the KDD99 data set , 2016, Inf. Secur. J. A Glob. Perspect..
[6] Christian Diedrich,et al. Accelerated deep neural networks for enhanced Intrusion Detection System , 2016, 2016 IEEE 21st International Conference on Emerging Technologies and Factory Automation (ETFA).
[7] Robert X. Gao,et al. Deep Learning and Its Applications to Machine Health Monitoring: A Survey , 2016, ArXiv.
[8] Yang Yu,et al. A Hybrid Spectral Clustering and Deep Neural Network Ensemble Algorithm for Intrusion Detection in Sensor Networks , 2016, Sensors.
[9] Lalu Banoth,et al. A Survey of Data Mining and Machine Learning Methods for Cyber Security Intrusion Detection , 2017 .
[10] Elisa Bertino,et al. Kalis — A System for Knowledge-Driven Adaptable Intrusion Detection for the Internet of Things , 2017, 2017 IEEE 37th International Conference on Distributed Computing Systems (ICDCS).
[11] Nick Feamster,et al. Machine Learning DDoS Detection for Consumer Internet of Things Devices , 2018, 2018 IEEE Security and Privacy Workshops (SPW).
[12] Qi Shi,et al. A Deep Learning Approach to Network Intrusion Detection , 2018, IEEE Transactions on Emerging Topics in Computational Intelligence.
[13] Po Yang,et al. Examining sensor-based physical activity recognition and monitoring for healthcare using Internet of Things: A systematic review , 2018, Journal of Biomedical Informatics.
[14] Qingju Wang,et al. When Intrusion Detection Meets Blockchain Technology: A Review , 2018, IEEE Access.
[15] Yiqiang Sheng,et al. HAST-IDS: Learning Hierarchical Spatial-Temporal Features Using Deep Neural Networks to Improve Intrusion Detection , 2018, IEEE Access.
[16] Erol Gelenbe,et al. Deep Learning with Dense Random Neural Network for Detecting Attacks against IoT-connected Home Environments , 2018, FNC/MobiSPC.
[17] Pete Burnap,et al. A Supervised Intrusion Detection System for Smart Home IoT Devices , 2019, IEEE Internet of Things Journal.
[18] Bo Zhou,et al. A Hybrid Hierarchical Framework for Gym Physical Activity Recognition and Measurement Using Wearable Sensors , 2019, IEEE Internet of Things Journal.
[19] Zhifeng Zhao,et al. AI-Based Two-Stage Intrusion Detection for Software Defined IoT Networks , 2018, IEEE Internet of Things Journal.
[20] Lei Chen,et al. Time-Related Network Intrusion Detection Model: A Deep Learning Method , 2019, 2019 IEEE Global Communications Conference (GLOBECOM).
[21] Yuan Zuo,et al. Learning-based network path planning for traffic engineering , 2019, Future Gener. Comput. Syst..
[22] Yanxia Sun,et al. A Deep Long Short-Term Memory based classifier for Wireless Intrusion Detection System , 2020, ICT Express.
[23] Xiaojiang Du,et al. A Distributed Deep Learning System for Web Attack Detection on Edge Devices , 2020, IEEE Transactions on Industrial Informatics.
[24] Yun Yang,et al. An overview of data fusion techniques for Internet of Things enabled physical activity recognition and measure , 2020, Inf. Fusion.
[25] Yulei Wu,et al. An Intelligent Anomaly Detection Scheme for Micro-Services Architectures With Temporal and Spatial Data Analysis , 2020, IEEE Transactions on Cognitive Communications and Networking.
[26] Geyong Min,et al. Time Series Anomaly Detection for Trustworthy Services in Cloud Computing Systems , 2017, IEEE Transactions on Big Data.