Trustworthy Network Anomaly Detection Based on an Adaptive Learning Rate and Momentum in IIoT
暂无分享,去创建一个
Xiaofei Xing | Baojiang Cui | Zihao Guo | Yang Xu | Xiaodan Yan | Taibiao Guo | Xiaofei Xing | Xiaodan Yan | Baojiang Cui | Yang Xu | Zihao Guo | T. Guo | X. Xing
[1] Christian Esposito,et al. Securing Collaborative Deep Learning in Industrial Applications Within Adversarial Scenarios , 2018, IEEE Transactions on Industrial Informatics.
[2] Shigeru Katagiri,et al. Confusion-Matrix-Based Kernel Logistic Regression for Imbalanced Data Classification , 2017, IEEE Transactions on Knowledge and Data Engineering.
[3] Baojiang Cui,et al. A Method of Information Protection for Collaborative Deep Learning under GAN Model Attack , 2019, IEEE/ACM Transactions on Computational Biology and Bioinformatics.
[4] Xinyu Yang,et al. A Survey on Internet of Things: Architecture, Enabling Technologies, Security and Privacy, and Applications , 2017, IEEE Internet of Things Journal.
[5] Tao Zhang,et al. Fog and IoT: An Overview of Research Opportunities , 2016, IEEE Internet of Things Journal.
[6] Banu Diri,et al. Machine learning based phishing detection from URLs , 2019, Expert Syst. Appl..
[7] Andrew W. Moore,et al. Bayesian Neural Networks for Internet Traffic Classification , 2007, IEEE Transactions on Neural Networks.
[8] Melody Moh,et al. Collaborative Ensemble-Learning Based Intrusion Detection Systems for Clouds , 2016, 2016 International Conference on Collaboration Technologies and Systems (CTS).
[9] Cheng Zhang,et al. Blockchain Empowered Arbitrable Data Auditing Scheme for Network Storage as a Service , 2020, IEEE Transactions on Services Computing.
[10] Yang Xu,et al. An adaptive and configurable protection framework against android privilege escalation threats , 2019, Future Gener. Comput. Syst..
[11] Radu Dogaru,et al. A comparison of several classifiers for eye detection on emotion expressing faces , 2013, 2013 4th International Symposium on Electrical and Electronics Engineering (ISEEE).
[12] Yang Xu,et al. A Blockchain-Based Nonrepudiation Network Computing Service Scheme for Industrial IoT , 2019, IEEE Transactions on Industrial Informatics.
[13] Latifur Khan,et al. A Machine Learning Approach to Android Malware Detection , 2012, 2012 European Intelligence and Security Informatics Conference.
[14] Baojiang Cui,et al. Hinge Classification Algorithm Based on Asynchronous Gradient Descent , 2017, BWCCA.
[15] Yang Xu,et al. Towards Secure Network Computing Services for Lightweight Clients Using Blockchain , 2018, Wirel. Commun. Mob. Comput..
[16] Lalu Banoth,et al. A Survey of Data Mining and Machine Learning Methods for Cyber Security Intrusion Detection , 2017 .
[17] Blaine Nelson,et al. Support Vector Machines Under Adversarial Label Noise , 2011, ACML.
[18] Quoc V. Le,et al. Sequence to Sequence Learning with Neural Networks , 2014, NIPS.
[19] Jie Wu,et al. Dependable Structural Health Monitoring Using Wireless Sensor Networks , 2015, IEEE Transactions on Dependable and Secure Computing.
[20] Jian Ma,et al. A new approach to intrusion detection using Artificial Neural Networks and fuzzy clustering , 2010, Expert Syst. Appl..
[21] Lovekesh Vig,et al. Long Short Term Memory Networks for Anomaly Detection in Time Series , 2015, ESANN.
[22] Jun Zhang,et al. Network Traffic Classification Using Correlation Information , 2013, IEEE Transactions on Parallel and Distributed Systems.
[23] Geoffrey E. Hinton,et al. Large scale distributed neural network training through online distillation , 2018, ICLR.
[24] Marc'Aurelio Ranzato,et al. Large Scale Distributed Deep Networks , 2012, NIPS.
[25] Sebastian Zander,et al. A preliminary performance comparison of five machine learning algorithms for practical IP traffic flow classification , 2006, CCRV.
[26] Andrzej J. Kasinski,et al. Supervised Learning in Spiking Neural Networks with ReSuMe: Sequence Learning, Classification, and Spike Shifting , 2010, Neural Computation.
[27] Viktor K. Prasanna,et al. Accelerating Decision Tree Based Traffic Classification on FPGA and Multicore Platforms , 2017, IEEE Transactions on Parallel and Distributed Systems.
[28] Jie Wu,et al. Sensing and Decision Making in Cyber-Physical Systems: The Case of Structural Event Monitoring , 2016, IEEE Transactions on Industrial Informatics.
[29] Fadi A. Thabtah,et al. Phishing detection: A recent intelligent machine learning comparison based on models content and features , 2017, 2017 IEEE International Conference on Intelligence and Security Informatics (ISI).