A Novel Semi-Supervised Learning Approach for Network Intrusion Detection on Cloud-Based Robotic System
暂无分享,去创建一个
Ying Gao | Yu Liu | Hongrui Wu | Yaqia Jin | Juequan Chen | Ying Gao | Hongrui Wu | Yu Liu | Yaqia Jin | Juequan Chen
[1] Miguel Nicolau,et al. A Hybrid Autoencoder and Density Estimation Model for Anomaly Detection , 2016, PPSN.
[2] Francisco Herrera,et al. Learning the membership function contexts for mining fuzzy association rules by using genetic algorithms , 2009, Fuzzy Sets Syst..
[3] Yinhui Li,et al. An efficient intrusion detection system based on support vector machines and gradually feature removal method , 2012, Expert Syst. Appl..
[4] Seyed Mojtaba Hosseini Bamakan,et al. Ramp loss K-Support Vector Classification-Regression; a robust and sparse multi-class approach to the intrusion detection problem , 2017, Knowl. Based Syst..
[5] Witold Pedrycz,et al. A Study on Relationship Between Generalization Abilities and Fuzziness of Base Classifiers in Ensemble Learning , 2015, IEEE Transactions on Fuzzy Systems.
[6] MengChu Zhou,et al. A Cooperative Quality-Aware Service Access System for Social Internet of Vehicles , 2018, IEEE Internet of Things Journal.
[7] Friedhelm Schwenker,et al. Semi-supervised Learning , 2013, Handbook on Neural Information Processing.
[8] Leo Breiman,et al. Random Forests , 2001, Machine Learning.
[9] Xiaojin Zhu,et al. Introduction to Semi-Supervised Learning , 2009, Synthesis Lectures on Artificial Intelligence and Machine Learning.
[10] Gunnar Rätsch,et al. Kernel PCA and De-Noising in Feature Spaces , 1998, NIPS.
[11] MengChu Zhou,et al. Emotion-Aware Cognitive System in Multi-Channel Cognitive Radio Ad Hoc Networks , 2018, IEEE Communications Magazine.
[12] Dorothy E. Denning,et al. An Intrusion-Detection Model , 1986, 1986 IEEE Symposium on Security and Privacy.
[13] Ali A. Ghorbani,et al. A detailed analysis of the KDD CUP 99 data set , 2009, 2009 IEEE Symposium on Computational Intelligence for Security and Defense Applications.
[14] Leo Breiman,et al. Classification and Regression Trees , 1984 .
[15] Jun Cheng,et al. Mobile Cyber Physical Systems: Current Challenges and Future Networking Applications , 2018, IEEE Access.
[16] Mohammad Zulkernine,et al. Random-Forests-Based Network Intrusion Detection Systems , 2008, IEEE Transactions on Systems, Man, and Cybernetics, Part C (Applications and Reviews).
[17] Geoffrey E. Hinton,et al. Learning representations by back-propagating errors , 1986, Nature.
[18] Avrim Blum,et al. The Bottleneck , 2021, Monopsony Capitalism.
[19] Irena Koprinska,et al. Co-training using RBF Nets and Different Feature Splits , 2006, The 2006 IEEE International Joint Conference on Neural Network Proceedings.
[20] Rayid Ghani,et al. Analyzing the effectiveness and applicability of co-training , 2000, CIKM '00.
[21] Mohiuddin Ahmed,et al. Novel Approach for Network Traffic Pattern Analysis using Clustering-based Collective Anomaly Detection , 2015, Annals of Data Science.
[22] Yu-Lin He,et al. Fuzziness based semi-supervised learning approach for intrusion detection system , 2017, Inf. Sci..
[23] Qi Shi,et al. A Deep Learning Approach to Network Intrusion Detection , 2018, IEEE Transactions on Emerging Topics in Computational Intelligence.
[24] Tetsuo Kinoshita,et al. Four Decades of Data Mining in Network and Systems Management , 2015, IEEE Transactions on Knowledge and Data Engineering.
[25] Neamat El Gayar,et al. New Feature Splitting Criteria for Co-training Using Genetic Algorithm Optimization , 2010, MCS.
[26] Radford M. Neal. Pattern Recognition and Machine Learning , 2007, Technometrics.
[27] Bin Wang,et al. Semi-supervised Self-training for Sentence Subjectivity Classification , 2008, Canadian Conference on AI.
[28] Mounir Ghogho,et al. Deep learning approach for Network Intrusion Detection in Software Defined Networking , 2016, 2016 International Conference on Wireless Networks and Mobile Communications (WINCOM).
[29] Rebecca Hwa,et al. Co-training for Predicting Emotions with Spoken Dialogue Data , 2004, ACL.
[30] Karim Afdel,et al. Semi-supervised machine learning approach for DDoS detection , 2018, Applied Intelligence.
[31] Victor C. M. Leung,et al. Multidimensional context-aware social network architecture for mobile crowdsensing , 2014, IEEE Communications Magazine.
[32] Nasser M. Nasrabadi,et al. Pattern Recognition and Machine Learning , 2006, Technometrics.
[33] Michelangelo Ceci,et al. Semi-supervised trees for multi-target regression , 2018, Inf. Sci..
[34] Settimo Termini,et al. A Definition of a Nonprobabilistic Entropy in the Setting of Fuzzy Sets Theory , 1972, Inf. Control..
[35] Xizhao Wang,et al. Fuzziness based sample categorization for classifier performance improvement , 2015, J. Intell. Fuzzy Syst..
[36] Hamideh Afsarmanesh,et al. Semi-supervised self-training for decision tree classifiers , 2017, Int. J. Mach. Learn. Cybern..
[37] Jr. W.A. Chren,et al. One-hot residue coding for low delay-power product CMOS design , 1998 .
[38] Shingo Mabu,et al. An efficient class association rule-pruning method for unified intrusion detection system using genetic algorithm , 2013 .
[39] Udo W. Pooch,et al. Cooperating security managers: a peer-based intrusion detection system , 1996, IEEE Netw..
[40] Hisao Ishibuchi,et al. Parallel Distributed Hybrid Fuzzy GBML Models With Rule Set Migration and Training Data Rotation , 2013, IEEE Transactions on Fuzzy Systems.
[41] Wolfgang Banzhaf,et al. The use of computational intelligence in intrusion detection systems: A review , 2010, Appl. Soft Comput..
[42] Martial Hebert,et al. Semi-Supervised Self-Training of Object Detection Models , 2005, 2005 Seventh IEEE Workshops on Applications of Computer Vision (WACV/MOTION'05) - Volume 1.