Intrusion Detection of UAVs Based on the Deep Belief Network Optimized by PSO
暂无分享,去创建一个
Zhen Zuo | Xiaojun Guo | Xiaoyong Sun | Shaojing Su | Xiaopeng Tan | Zhen Zuo | Xiaoyong Sun | Shaojing Su | Xiaopeng Tan | Xiaojun Guo
[1] Timo D. Hämäläinen,et al. Assessment of Deep Learning Methodology for Self-Organizing 5G Networks , 2019, Applied Sciences.
[2] Naima Iltaf,et al. CATSWoTS: Context Aware Trustworthy Social Web of Things System , 2019, Sensors.
[3] Mohamed Touahria,et al. Feature selection for intrusion detection using new multi-objective estimation of distribution algorithms , 2019, Applied Intelligence.
[4] Xigang Yuan,et al. An improved PSO algorithm for solving non-convex NLP/MINLP problems with equality constraints , 2007, Computers and Chemical Engineering.
[5] Feng Qu,et al. An Intrusion Detection Model Based on Deep Belief Network , 2017, ICNCC.
[6] Jeongtae Kim,et al. Machine Learning-Based Fast Banknote Serial Number Recognition Using Knowledge Distillation and Bayesian Optimization , 2019, Sensors.
[7] Ran Wang,et al. Noniterative Deep Learning: Incorporating Restricted Boltzmann Machine Into Multilayer Random Weight Neural Networks , 2019, IEEE Transactions on Systems, Man, and Cybernetics: Systems.
[8] Yiqiang Sheng,et al. HAST-IDS: Learning Hierarchical Spatial-Temporal Features Using Deep Neural Networks to Improve Intrusion Detection , 2018, IEEE Access.
[9] Salah El Hadaj,et al. Performance evaluation of intrusion detection based on machine learning using Apache Spark , 2018 .
[10] Said Fathy El-Zoghdy,et al. A Neural Network-Based Learning Algorithm for Intrusion Detection Systems , 2017, Wirel. Pers. Commun..
[11] Kashif Ishaque,et al. An Improved Particle Swarm Optimization (PSO)–Based MPPT for PV With Reduced Steady-State Oscillation , 2012, IEEE Transactions on Power Electronics.
[12] Gurveen Vaseer,et al. Novel Intrusion Detection and Prevention for Mobile Ad Hoc Networks: A Single- and Multiattack Case Study , 2019, IEEE Consumer Electronics Magazine.
[13] Yizhi Ren,et al. Heuristic Approaches for Enhancing the Privacy of the Leader in IoT Networks , 2019, Sensors.
[14] Yee Whye Teh,et al. A Fast Learning Algorithm for Deep Belief Nets , 2006, Neural Computation.
[15] Khaled Salah,et al. COLIDE: a collaborative intrusion detection framework for Internet of Things , 2019, IET Networks.
[16] Zuherman Rustam,et al. Comparison between Support Vector Machine and Fuzzy C-Means as Classifier for Intrusion Detection System , 2018, Journal of Physics: Conference Series.
[17] Bharti Suri,et al. On the Effectiveness of Using Elitist Genetic Algorithm in Mutation Testing , 2019, Symmetry.
[18] Md. Rezaul Karim,et al. A Scalable and Hybrid Intrusion Detection System Based on the Convolutional-LSTM Network , 2019, Symmetry.
[19] Mamun Bin Ibne Reaz,et al. A novel SVM-kNN-PSO ensemble method for intrusion detection system , 2016, Appl. Soft Comput..
[20] Xiaohu You,et al. Gibbs-Sampling-Based CRE Bias Optimization Algorithm for Ultradense Networks , 2017, IEEE Transactions on Vehicular Technology.
[21] Biju Issac,et al. Performance Comparison of Intrusion Detection Systems and Application of Machine Learning to Snort System , 2017, Future Gener. Comput. Syst..
[22] Paul D. Yoo,et al. From Intrusion Detection to Attacker Attribution: A Comprehensive Survey of Unsupervised Methods , 2018, IEEE Communications Surveys & Tutorials.
[23] Lixiang Li,et al. Nearest neighbors based density peaks approach to intrusion detection , 2018 .
[24] Kangfeng Zheng,et al. Improving the Classification Effectiveness of Intrusion Detection by Using Improved Conditional Variational AutoEncoder and Deep Neural Network , 2019, Sensors.
[25] Yang Yu,et al. A Hybrid Spectral Clustering and Deep Neural Network Ensemble Algorithm for Intrusion Detection in Sensor Networks , 2016, Sensors.
[26] Xuemei Sun,et al. Server Consolidation Based on Culture Multiple-Ant-Colony Algorithm in Cloud Computing , 2019, Sensors.
[27] Qichao Zhang,et al. Securing ICN-Based UAV Ad Hoc Networks with Blockchain , 2019, IEEE Communications Magazine.
[28] Ren-Hung Hwang,et al. An LSTM-Based Deep Learning Approach for Classifying Malicious Traffic at the Packet Level , 2019, Applied Sciences.
[29] Fadi Al-Turjman,et al. An overview of security and privacy in smart cities' IoT communications , 2019, Trans. Emerg. Telecommun. Technol..
[30] Dunwei Gong,et al. A Set-Based Genetic Algorithm for Interval Many-Objective Optimization Problems , 2018, IEEE Transactions on Evolutionary Computation.
[31] Jimmy Ming-Tai Wu,et al. A Sanitization Approach to Secure Shared Data in an IoT Environment , 2019, IEEE Access.
[32] Ying Zhang,et al. Intrusion Detection for IoT Based on Improved Genetic Algorithm and Deep Belief Network , 2019, IEEE Access.
[33] Saru Kumari,et al. Cryptanalysis and Improvement of a Privacy-Preserving Three-Factor Authentication Protocol for Wireless Sensor Networks , 2019, Sensors.
[34] Yuefei Zhu,et al. A Deep Learning Approach for Intrusion Detection Using Recurrent Neural Networks , 2017, IEEE Access.
[35] Cao Chunxiang,et al. Spectral characteristics and species identification of rhododendrons using a discriminative restricted Boltzmann machine , 2017 .
[36] Zahid Akhtar,et al. KDD Cup 99 Data Sets: A Perspective on the Role of Data Sets in Network Intrusion Detection Research , 2019, Computer.
[37] Akhan Akbulut,et al. Empirical study on multiclass classification‐based network intrusion detection , 2019, Comput. Intell..
[38] Tie Li,et al. Research and application of intelligent intrusion detection system with accuracy analysis methodology , 2018 .
[39] Kusum Deep,et al. A Hybrid Harmony search and Simulated Annealing algorithm for continuous optimization , 2018, Inf. Sci..
[40] Xiaojie Liu,et al. Ant-colony algorithm with a strengthened negative-feedback mechanism for constraint-satisfaction problems , 2017, Inf. Sci..
[41] Seyed Mojtaba Hosseini Bamakan,et al. A New Intrusion Detection Approach Using PSO based Multiple Criteria Linear Programming , 2015, ITQM.
[42] Jun Gao,et al. Online Adaboost-Based Parameterized Methods for Dynamic Distributed Network Intrusion Detection , 2014, IEEE Transactions on Cybernetics.
[43] Weizhi Meng,et al. Intrusion Detection in the Era of IoT: Building Trust via Traffic Filtering and Sampling , 2018, Computer.
[44] Jie Gu,et al. An effective intrusion detection framework based on SVM with feature augmentation , 2017, Knowl. Based Syst..
[45] Jiankun Hu,et al. A novel statistical technique for intrusion detection systems , 2018, Future Gener. Comput. Syst..
[46] Derrick Wing Kwan Ng,et al. Physical Layer Security in UAV Systems: Challenges and Opportunities , 2019, IEEE Wireless Communications.