On the combination of data augmentation method and gated convolution model for building effective and robust intrusion detection
暂无分享,去创建一个
Jiqiang Liu | Xiaolin Chang | Jinqiang Wang | Yixiang Wang | Shaohua lv | Xiaolin Chang | Jiqiang Liu | Yixiang Wang | Shaohua Lv | Jinqiang Wang
[1] Elisa Bertino,et al. Overcoming the Lack of Labeled Data: Training Intrusion Detection Models Using Transfer Learning , 2019, 2019 IEEE International Conference on Smart Computing (SMARTCOMP).
[2] Stephen V. Stehman,et al. Selecting and interpreting measures of thematic classification accuracy , 1997 .
[3] Lukás Burget,et al. Recurrent neural network based language model , 2010, INTERSPEECH.
[4] David M. W. Powers,et al. Evaluation: from precision, recall and F-measure to ROC, informedness, markedness and correlation , 2011, ArXiv.
[5] Howon Kim,et al. Applying Recurrent Neural Network to Intrusion Detection with Hessian Free Optimization , 2015, WISA.
[6] Quoc V. Le,et al. Sequence to Sequence Learning with Neural Networks , 2014, NIPS.
[7] Taghi M. Khoshgoftaar,et al. A survey on Image Data Augmentation for Deep Learning , 2019, Journal of Big Data.
[8] Jian Wang,et al. Intrusion Prediction With System-Call Sequence-to-Sequence Model , 2018, IEEE Access.
[9] Kevin Gimpel,et al. ALBERT: A Lite BERT for Self-supervised Learning of Language Representations , 2019, ICLR.
[10] Yoshua Bengio,et al. Gradient-based learning applied to document recognition , 1998, Proc. IEEE.
[11] Joan Bruna,et al. Intriguing properties of neural networks , 2013, ICLR.
[12] Tom Fawcett,et al. An introduction to ROC analysis , 2006, Pattern Recognit. Lett..
[13] Hilde van der Togt,et al. Publisher's Note , 2003, J. Netw. Comput. Appl..
[14] Jürgen Schmidhuber,et al. Long Short-Term Memory , 1997, Neural Computation.
[15] Ajmal Mian,et al. Threat of Adversarial Attacks on Deep Learning in Computer Vision: A Survey , 2018, IEEE Access.
[16] Yu Lasheng,et al. Deep Learning Approach Combining Sparse Autoencoder With SVM for Network Intrusion Detection , 2018, IEEE Access.
[17] Howon Kim,et al. Long Short Term Memory Recurrent Neural Network Classifier for Intrusion Detection , 2016, 2016 International Conference on Platform Technology and Service (PlatCon).
[18] Yoshua Bengio,et al. Empirical Evaluation of Gated Recurrent Neural Networks on Sequence Modeling , 2014, ArXiv.
[19] Yoshua Bengio,et al. Learning Phrase Representations using RNN Encoder–Decoder for Statistical Machine Translation , 2014, EMNLP.
[20] Lantao Yu,et al. SeqGAN: Sequence Generative Adversarial Nets with Policy Gradient , 2016, AAAI.
[21] Corinna Cortes,et al. Support-Vector Networks , 1995, Machine Learning.
[22] Jun Long,et al. BL-IDS: Detecting Web Attacks Using Bi-LSTM Model Based on Deep Learning , 2019 .
[23] Xing Zhao,et al. Intrusion Detection Algorithm Based on Convolutional Neural Network , 2018 .
[24] Timo Aila,et al. A Style-Based Generator Architecture for Generative Adversarial Networks , 2018, 2019 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR).
[25] Annual Computer Security Applications Conference, ACSAC '13, New Orleans, LA, USA, December 9-13, 2013 , 2013, ACSAC.
[26] Jonathon Shlens,et al. Explaining and Harnessing Adversarial Examples , 2014, ICLR.
[27] Matt J. Kusner,et al. GANS for Sequences of Discrete Elements with the Gumbel-softmax Distribution , 2016, ArXiv.
[28] Lawrence D. Jackel,et al. Backpropagation Applied to Handwritten Zip Code Recognition , 1989, Neural Computation.
[29] Jeffrey L. Elman,et al. Finding Structure in Time , 1990, Cogn. Sci..
[30] Zeynep Turgut,et al. Intrusion Detection System with Recursive Feature Elimination by Using Random Forest and Deep Learning Classifier , 2018, 2018 International Congress on Big Data, Deep Learning and Fighting Cyber Terrorism (IBIGDELFT).
[31] Lior Rokach,et al. Generic Black-Box End-to-End Attack Against State of the Art API Call Based Malware Classifiers , 2017, RAID.
[32] Jiankun Hu,et al. Generation of a new IDS test dataset: Time to retire the KDD collection , 2013, 2013 IEEE Wireless Communications and Networking Conference (WCNC).
[33] Geoffrey E. Hinton,et al. Rectified Linear Units Improve Restricted Boltzmann Machines , 2010, ICML.
[34] Stephanie Forrest,et al. The Evolution of System-Call Monitoring , 2008, 2008 Annual Computer Security Applications Conference (ACSAC).
[35] Ling Gao,et al. An Intrusion Detection Model Based on Deep Belief Networks , 2014, 2014 Second International Conference on Advanced Cloud and Big Data.
[36] Fan Zhang,et al. An Intrusion Detection System Using a Deep Neural Network With Gated Recurrent Units , 2018, IEEE Access.
[37] Yuan-Fang Wang,et al. Reinforced Cross-Modal Matching and Self-Supervised Imitation Learning for Vision-Language Navigation , 2018, 2019 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR).