Intrusion Detection in Green Internet of Things: A Deep Deterministic Policy Gradient-Based Algorithm
暂无分享,去创建一个
Zhaolong Ning | Laisen Nie | Joel J. P. C. Rodrigues | Shupeng Wang | Wentao Sun | Yixuan Wu | Shengtao Li | Shupeng Wang | Zhaolong Ning | J. Rodrigues | Laisen Nie | Yixuan Wu | Shengtao Li | W. Sun
[1] Mohsen Guizani,et al. Cognitive Balance for Fog Computing Resource in Internet of Things: An Edge Learning Approach , 2022, IEEE Transactions on Mobile Computing.
[2] Zhaolong Ning,et al. Data-Driven Intrusion Detection for Intelligent Internet of Vehicles: A Deep Convolutional Neural Network-Based Method , 2020, IEEE Transactions on Network Science and Engineering.
[3] Weifa Liang,et al. Green Data-Collection From Geo-Distributed IoT Networks Through Low-Earth-Orbit Satellites , 2019, IEEE Transactions on Green Communications and Networking.
[4] Zhen Xu,et al. ConnSpoiler: Disrupting C&C Communication of IoT-Based Botnet Through Fast Detection of Anomalous Domain Queries , 2020, IEEE Transactions on Industrial Informatics.
[5] S. Mercy Shalinie,et al. Learning-Driven Detection and Mitigation of DDoS Attack in IoT via SDN-Cloud Architecture , 2020, IEEE Internet of Things Journal.
[6] C. L. Philip Chen,et al. Fuzzy Restricted Boltzmann Machine for the Enhancement of Deep Learning , 2015, IEEE Transactions on Fuzzy Systems.
[7] Haipeng Yao,et al. Blockchain-Based Hierarchical Trust Networking for JointCloud , 2020, IEEE Internet of Things Journal.
[8] David K. Y. Yau,et al. You can run, but you can't hide: an effective statistical methodology to trace back DDoS attackers , 2005, IEEE Transactions on Parallel and Distributed Systems.
[9] Peter Bodorik,et al. DDoS Detection System: Using a Set of Classification Algorithms Controlled by Fuzzy Logic System in Apache Spark , 2019, IEEE Transactions on Network and Service Management.
[10] Wei Wang,et al. A Game Theory Based Collaborative Security Detection Method for Internet of Things Systems , 2018, IEEE Transactions on Information Forensics and Security.
[11] Angelos D. Keromytis,et al. SOS: an architecture for mitigating DDoS attacks , 2004, IEEE Journal on Selected Areas in Communications.
[12] Ali A. Ghorbani,et al. Developing Realistic Distributed Denial of Service (DDoS) Attack Dataset and Taxonomy , 2019, 2019 International Carnahan Conference on Security Technology (ICCST).
[13] Jun Zhao,et al. Artificial-Intelligence-Enabled Intelligent 6G Networks , 2019, IEEE Network.
[14] Albert Y. Zomaya,et al. A Hybrid Deep Learning-Based Model for Anomaly Detection in Cloud Datacenter Networks , 2019, IEEE Transactions on Network and Service Management.
[15] Yuval Tassa,et al. Continuous control with deep reinforcement learning , 2015, ICLR.
[16] Tie Qiu,et al. Mobile Edge Computing Enabled 5G Health Monitoring for Internet of Medical Things: A Decentralized Game Theoretic Approach , 2021, IEEE Journal on Selected Areas in Communications.
[17] Mohammad S. Obaidat,et al. A Reinforcement Learning-Based Network Traffic Prediction Mechanism in Intelligent Internet of Things , 2021, IEEE Transactions on Industrial Informatics.
[18] Bin Hu,et al. Joint Computing and Caching in 5G-Envisioned Internet of Vehicles: A Deep Reinforcement Learning-Based Traffic Control System , 2020, IEEE Transactions on Intelligent Transportation Systems.
[19] Lei Guo,et al. Intelligent resource allocation in mobile blockchain for privacy and security transactions: a deep reinforcement learning based approach , 2021, Science China Information Sciences.
[20] Victor C. M. Leung,et al. Partial Computation Offloading and Adaptive Task Scheduling for 5G-Enabled Vehicular Networks , 2022, IEEE Transactions on Mobile Computing.
[21] Gui Yun Tian,et al. Multi-objective-based feature selection for DDoS attack detection in IoT networks , 2020, IET Networks.
[22] Chao Wang,et al. DDoS Attack Detection Using Flow Entropy and Clustering Technique , 2015, 2015 11th International Conference on Computational Intelligence and Security (CIS).
[23] Jun Zhao,et al. Deep Reinforcement Learning-Based Intelligent Reflecting Surface for Secure Wireless Communications , 2020, IEEE Transactions on Wireless Communications.
[24] Milos Prvulovic,et al. REMOTE: Robust External Malware Detection Framework by Using Electromagnetic Signals , 2020, IEEE Transactions on Computers.
[25] Zhetao Li,et al. Minimizing Convergecast Time and Energy Consumption in Green Internet of Things , 2020, IEEE Transactions on Emerging Topics in Computing.
[26] Keqin Li,et al. Graphene-Grid Deployment in Energy Harvesting Cooperative Wireless Sensor Networks for Green IoT , 2019, IEEE Transactions on Industrial Informatics.
[27] Pete Burnap,et al. A Supervised Intrusion Detection System for Smart Home IoT Devices , 2019, IEEE Internet of Things Journal.