暂无分享,去创建一个
M. Shamim Hossain | Zehui Xiong | Jiawen Kang | Sahil Garg | Yi Liu | Jiangtian Nie | Yang Zhang | Yi Liu | Jiawen Kang | Zehui Xiong | Yan Zhang | S. Garg | M. S. Hossain | Jiangtian Nie
[1] Yoshua Bengio,et al. Gradient-based learning applied to document recognition , 1998, Proc. IEEE.
[2] Erland Jonsson,et al. Anomaly-based intrusion detection: privacy concerns and other problems , 2000, Comput. Networks.
[3] Alex Krizhevsky,et al. Learning Multiple Layers of Features from Tiny Images , 2009 .
[4] Justin A. Blanco,et al. Modeling electroencephalography waveforms with semi-supervised deep belief nets: fast classification and anomaly measurement , 2011, Journal of neural engineering.
[5] Alex Graves,et al. Recurrent Models of Visual Attention , 2014, NIPS.
[6] Lovekesh Vig,et al. Long Short Term Memory Networks for Anomaly Detection in Time Series , 2015, ESANN.
[7] Burak Kantarci,et al. Anomaly detection and privacy preservation in cloud-centric Internet of Things , 2015, 2015 IEEE International Conference on Communication Workshop (ICCW).
[8] Yoshua Bengio,et al. Neural Machine Translation by Jointly Learning to Align and Translate , 2014, ICLR.
[9] Peter Richtárik,et al. Federated Learning: Strategies for Improving Communication Efficiency , 2016, ArXiv.
[10] Hai Zhao,et al. Toward Energy-Efficient and Robust Large-Scale WSNs: A Scale-Free Network Approach , 2016, IEEE Journal on Selected Areas in Communications.
[11] Lovekesh Vig,et al. LSTM-based Encoder-Decoder for Multi-sensor Anomaly Detection , 2016, ArXiv.
[12] Christopher Leckie,et al. High-dimensional and large-scale anomaly detection using a linear one-class SVM with deep learning , 2016, Pattern Recognit..
[13] Lukasz Kaiser,et al. Attention is All you Need , 2017, NIPS.
[14] Dan Alistarh,et al. QSGD: Communication-Optimal Stochastic Gradient Descent, with Applications to Training Neural Networks , 2016, 1610.02132.
[15] Georg Langs,et al. Unsupervised Anomaly Detection with Generative Adversarial Networks to Guide Marker Discovery , 2017, IPMI.
[16] Mehdi Bennis,et al. Communication-Efficient On-Device Machine Learning: Federated Distillation and Augmentation under Non-IID Private Data , 2018, ArXiv.
[17] Ji Liu,et al. Gradient Sparsification for Communication-Efficient Distributed Optimization , 2017, NeurIPS.
[18] Tie Luo,et al. Distributed Anomaly Detection Using Autoencoder Neural Networks in WSN for IoT , 2018, 2018 IEEE International Conference on Communications (ICC).
[19] Daniel Rueckert,et al. A generic framework for privacy preserving deep learning , 2018, ArXiv.
[20] Sung-Bae Cho,et al. Web traffic anomaly detection using C-LSTM neural networks , 2018, Expert Syst. Appl..
[21] Sanjiv Kumar,et al. cpSGD: Communication-efficient and differentially-private distributed SGD , 2018, NeurIPS.
[22] William J. Dally,et al. Deep Gradient Compression: Reducing the Communication Bandwidth for Distributed Training , 2017, ICLR.
[23] Yifan Guo,et al. Multidimensional Time Series Anomaly Detection: A GRU-based Gaussian Mixture Variational Autoencoder Approach , 2018, ACML.
[24] Bo Zong,et al. Deep Autoencoding Gaussian Mixture Model for Unsupervised Anomaly Detection , 2018, ICLR.
[25] Bora Caglayan,et al. DeepAD: A Generic Framework Based on Deep Learning for Time Series Anomaly Detection , 2018, PAKDD.
[26] Asifullah Khan,et al. Network anomaly detection using channel boosted and residual learning based deep convolutional neural network , 2019, Appl. Soft Comput..
[27] Samuel Marchal,et al. DÏoT: A Federated Self-learning Anomaly Detection System for IoT , 2018, 2019 IEEE 39th International Conference on Distributed Computing Systems (ICDCS).
[28] Albert Y. Zomaya,et al. A Hybrid Deep Learning-Based Model for Anomaly Detection in Cloud Datacenter Networks , 2019, IEEE Transactions on Network and Service Management.
[29] Raghavendra Chalapathy University of Sydney,et al. Deep Learning for Anomaly Detection: A Survey , 2019, ArXiv.
[30] Yuanguo Bi,et al. Hierarchical Edge Computing: A Novel Multi-Source Multi-Dimensional Data Anomaly Detection Scheme for Industrial Internet of Things , 2019, IEEE Access.
[31] Andreas Dengel,et al. DeepAnT: A Deep Learning Approach for Unsupervised Anomaly Detection in Time Series , 2019, IEEE Access.
[32] Aryan Mokhtari,et al. FedPAQ: A Communication-Efficient Federated Learning Method with Periodic Averaging and Quantization , 2019, AISTATS.
[33] Fangfang Li,et al. Deep hierarchical encoding model for sentence semantic matching , 2020, J. Vis. Commun. Image Represent..
[34] X. Shen,et al. Deep Reinforcement Learning Based Resource Management for Multi-Access Edge Computing in Vehicular Networks , 2020, IEEE Transactions on Network Science and Engineering.
[35] Azzedine Boukerche,et al. A multi-stage anomaly detection scheme for augmenting the security in IoT-enabled applications , 2020, Future Gener. Comput. Syst..
[36] Albert Y. Zomaya,et al. En-ABC: An ensemble artificial bee colony based anomaly detection scheme for cloud environment , 2020, J. Parallel Distributed Comput..
[37] An On-Device Federated Learning Approach for Cooperative Anomaly Detection , 2020, ArXiv.
[38] Syed Hassan Ahmed,et al. Dominant Data Set Selection Algorithms for Electricity Consumption Time-Series Data Analysis Based on Affine Transformation , 2019, IEEE Internet of Things Journal.
[39] Privacy-Preserving Traffic Flow Prediction: A Federated Learning Approach , 2020, IEEE Internet of Things Journal.
[40] Chunxiao Jiang,et al. Scalable and Communication-efficient Decentralized Federated Edge Learning with Multi-blockchain Framework , 2020, BlockSys.
[41] Hiroki Matsutani,et al. A Neural Network-Based On-Device Learning Anomaly Detector for Edge Devices , 2019, IEEE Transactions on Computers.
[42] Yujie Li,et al. Deep Fuzzy Hashing Network for Efficient Image Retrieval , 2021, IEEE Transactions on Fuzzy Systems.
[43] Shielding Collaborative Learning: Mitigating Poisoning Attacks Through Client-Side Detection , 2019, IEEE Transactions on Dependable and Secure Computing.