Efficient BiSRU Combined With Feature Dimensionality Reduction for Abnormal Traffic Detection
暂无分享,去创建一个
Mi Wen | Jinguo Li | Liangliang Wang | Hongjiao Li | Pengpeng Ding | M. Wen | Jinguo Li | Liangliang Wang | Pengpeng Ding | Hongjiao Li
[1] Tien-Tsin Wong,et al. Perceptual-Aware Sketch Simplification Based on Integrated VGG Layers , 2021, IEEE Transactions on Visualization and Computer Graphics.
[2] Nour Moustafa,et al. UNSW-NB15: a comprehensive data set for network intrusion detection systems (UNSW-NB15 network data set) , 2015, 2015 Military Communications and Information Systems Conference (MilCIS).
[3] Manas Ranjan Patra,et al. NETWORK INTRUSION DETECTION USING NAÏVE BAYES , 2007 .
[4] Sergey Ioffe,et al. Batch Normalization: Accelerating Deep Network Training by Reducing Internal Covariate Shift , 2015, ICML.
[5] Waqar Ahmad,et al. A Comparative Study of Data Mining Algorithms for High Detection Rate in Intrusion Detection System , 2018 .
[6] Qing Li,et al. Research of the processing technology for time complex event based on LSTM , 2018, Cluster Computing.
[7] Yu Zhang,et al. Simple Recurrent Units for Highly Parallelizable Recurrence , 2017, EMNLP.
[8] Joel J. P. C. Rodrigues,et al. A comprehensive survey on network anomaly detection , 2018, Telecommunication Systems.
[9] Xin Liao,et al. Robust Detection of Image Operator Chain With Two-Stream Convolutional Neural Network , 2020, IEEE Journal of Selected Topics in Signal Processing.
[10] Chu Zhang,et al. Cost-sensitive stacked sparse auto-encoder models to detect striped stem borer infestation on rice based on hyperspectral imaging , 2019, Knowl. Based Syst..
[11] Andreas Hotho,et al. A Survey of Network-based Intrusion Detection Data Sets , 2019, Comput. Secur..
[12] Ning Zhang,et al. Investigation on Performance of Neural Networks Using Quadratic Relative Error Cost Function , 2019, IEEE Access.
[13] Syed Hassan Ahmed,et al. A Review of Current Security Issues in Internet of Things , 2019, Recent Trends and Advances in Wireless and IoT-enabled Networks.
[14] Preeti Mishra,et al. VMAnalyzer: Malware Semantic Analysis using Integrated CNN and Bi-Directional LSTM for Detecting VM-level Attacks in Cloud , 2019, 2019 Twelfth International Conference on Contemporary Computing (IC3).
[15] Parul Sahare,et al. Communication technologies and security challenges for internet of things: A comprehensive review , 2019, AEU - International Journal of Electronics and Communications.
[16] Yanfen Gan,et al. Video Object Forgery Detection Algorithm Based on VGG-11 Convolutional Neural Network , 2019, 2019 International Conference on Intelligent Computing, Automation and Systems (ICICAS).
[17] Da Guo,et al. Abnormal Network Traffic Detection Based on Transfer Component Analysis , 2019, 2019 IEEE International Conference on Communications Workshops (ICC Workshops).
[18] Kajal Rai,et al. Decision Tree Based Algorithm for Intrusion Detection , 2016 .
[19] Guy Lapalme,et al. A systematic analysis of performance measures for classification tasks , 2009, Inf. Process. Manag..
[20] Jiajun Zhang,et al. An Empirical Exploration of Skip Connections for Sequential Tagging , 2016, COLING.
[21] Raghavendra Chalapathy University of Sydney,et al. Deep Learning for Anomaly Detection: A Survey , 2019, ArXiv.
[22] Xiangjie Kong,et al. Spatio-Temporal Network Traffic Estimation and Anomaly Detection Based on Convolutional Neural Network in Vehicular Ad-Hoc Networks , 2018, IEEE Access.
[23] Haibo Liu,et al. A Method for Guaranteeing Wireless Communication Based on a Combination of Deep and Shallow Learning , 2019, IEEE Access.
[24] Hon Cheung,et al. A Deep Learning Approach for Intrusion Detection in Internet of Things using Bi-Directional Long Short-Term Memory Recurrent Neural Network , 2018, 2018 28th International Telecommunication Networks and Applications Conference (ITNAC).
[25] Feng Zhou,et al. Longitudinal and Multi-modal Data Learning for Parkinson’s Disease Diagnosis via Stacked Sparse Auto-encoder , 2019, 2019 IEEE 16th International Symposium on Biomedical Imaging (ISBI 2019).
[26] Francisco Argüello,et al. Caffe CNN-based classification of hyperspectral images on GPU , 2018, The Journal of Supercomputing.
[27] Ruiyu Liang,et al. Attention-Based Dense LSTM for Speech Emotion Recognition , 2019, IEICE Trans. Inf. Syst..
[28] Dewan Md. Farid,et al. Combining Naive Bayes and Decision Tree for Adaptive Intrusion Detection , 2010, ArXiv.
[29] Zhigang Chen,et al. Verifiable Keyword-Based Semantic Similarity Search on Social Data Outsourcing , 2019, IEEE Access.
[30] Sunwoo Kim,et al. Signal Classification and Jamming Detection in Wide-Band Radios Using Naïve Bayes Classifier , 2018, IEEE Communications Letters.
[31] Khan Muhammad,et al. Five-category classification of pathological brain images based on deep stacked sparse autoencoder , 2017, Multimedia Tools and Applications.
[32] Li Liu,et al. Latent Relationship Guided Stacked Sparse Autoencoder for Hyperspectral Imagery Classification , 2020, IEEE Transactions on Geoscience and Remote Sensing.
[33] Mohamed Abdel-Nasser,et al. Accurate photovoltaic power forecasting models using deep LSTM-RNN , 2017, Neural Computing and Applications.
[34] K. V. N. Sunitha,et al. Effective discriminant function for intrusion detection using SVM , 2016, 2016 International Conference on Advances in Computing, Communications and Informatics (ICACCI).
[35] Yong Yu,et al. A Review of Recurrent Neural Networks: LSTM Cells and Network Architectures , 2019, Neural Computation.
[36] Yuefei Zhu,et al. A Deep Learning Approach for Intrusion Detection Using Recurrent Neural Networks , 2017, IEEE Access.
[37] Jinfeng Yi,et al. Efficient distance metric learning by adaptive sampling and mini-batch stochastic gradient descent (SGD) , 2013, Machine Learning.
[38] Kamal El-Sankary,et al. Impact of Approximate Multipliers on VGG Deep Learning Network , 2018, IEEE Access.
[39] Mohamed Farouk,et al. A framework for efficient network anomaly intrusion detection with features selection , 2018, 2018 9th International Conference on Information and Communication Systems (ICICS).
[40] Jong Hyuk Park,et al. DTB-IDS: an intrusion detection system based on decision tree using behavior analysis for preventing APT attacks , 2015, The Journal of Supercomputing.
[41] Chen Yang,et al. Anomaly network traffic detection algorithm based on information entropy measurement under the cloud computing environment , 2018, Cluster Computing.
[42] Olivier Déforges,et al. DDSA: A Defense Against Adversarial Attacks Using Deep Denoising Sparse Autoencoder , 2019, IEEE Access.