Intrusion detection methods based on integrated deep learning model
暂无分享,去创建一个
Daojing He | Zhendong Wang | Yaodi Liu | Sammy Chan | Daojing He | Sammy Chan | Zhendong Wang | Yaodi Liu
[1] Saumendra Sengupta,et al. Hybrid Intrusion Detection System Using Machine Learning Techniques in Cloud Computing Environments , 2019, 2019 IEEE 17th International Conference on Software Engineering Research, Management and Applications (SERA).
[2] Gürsel Serpen,et al. Host-based misuse intrusion detection using PCA feature extraction and kNN classification algorithms , 2018, Intell. Data Anal..
[3] Mounir Ghogho,et al. Deep learning approach for Network Intrusion Detection in Software Defined Networking , 2016, 2016 International Conference on Wireless Networks and Mobile Communications (WINCOM).
[4] Muttukrishnan Rajarajan,et al. Host-Based Intrusion Detection for VANETs: A Statistical Approach to Rogue Node Detection , 2016, IEEE Transactions on Vehicular Technology.
[5] Naiqi Wu,et al. SVM-DT-based adaptive and collaborative intrusion detection , 2018, IEEE/CAA Journal of Automatica Sinica.
[6] Richard A. Kemmerer,et al. State Transition Analysis: A Rule-Based Intrusion Detection Approach , 1995, IEEE Trans. Software Eng..
[7] Qi Shi,et al. A Deep Learning Approach to Network Intrusion Detection , 2018, IEEE Transactions on Emerging Topics in Computational Intelligence.
[8] Anazida Zainal,et al. A Model for Adaptive and Distributed Intrusion Detection for Cloud Computing , 2018, 2018 Seventh ICT International Student Project Conference (ICT-ISPC).
[9] Daniel Rosa Canêdo Canêdo,et al. Intrusion Detection System in Ad Hoc Networks with Artificial Neural Networks and Algorithm K-Means , 2019, IEEE Latin America Transactions.
[10] Shaoguo Wen,et al. NOMA Codebook Optimization by Batch Gradient Descent , 2019, IEEE Access.
[11] Dezhi Han,et al. Design of intrusion detection system based on improved ABC_elite and BP neural networks , 2019, Comput. Sci. Inf. Syst..
[12] Majid Sarrafzadeh,et al. Dynamic Feature Acquisition Using Denoising Autoencoders , 2018, IEEE Transactions on Neural Networks and Learning Systems.
[13] Umi Kalsom Yusof,et al. Filter-Based Multi-Objective Feature Selection Using NSGA III and Cuckoo Optimization Algorithm , 2020, IEEE Access.
[14] Na Wang,et al. Building a Cloud IDS Using an Efficient Feature Selection Method and SVM , 2019, IEEE Access.
[15] Han Yu,et al. Research on Network Intrusion Detection Based on Support Vector Machine Optimized with Grasshopper Optimization Algorithm , 2019, 2019 10th IEEE International Conference on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications (IDAACS).
[16] Cheng Wu,et al. Semi-Supervised and Unsupervised Extreme Learning Machines , 2014, IEEE Transactions on Cybernetics.
[17] Ehsan Namjoo,et al. LR-HIDS: logistic regression host-based intrusion detection system for cloud environments , 2018, Journal of Ambient Intelligence and Humanized Computing.
[18] Xuewen Xia,et al. Efficient Feature Selection Algorithm Based on Particle Swarm Optimization With Learning Memory , 2019, IEEE Access.
[19] Jon Atli Benediktsson,et al. Feature Selection Based on Hybridization of Genetic Algorithm and Particle Swarm Optimization , 2015, IEEE Geoscience and Remote Sensing Letters.
[20] Shiyong Cui,et al. A Comparative Study of Bag-of-Words and Bag-of-Topics Models of EO Image Patches , 2015, IEEE Geoscience and Remote Sensing Letters.
[21] Pascal Vincent,et al. Representation Learning: A Review and New Perspectives , 2012, IEEE Transactions on Pattern Analysis and Machine Intelligence.
[22] S. Mercy Shalinie,et al. Design of cognitive fog computing for intrusion detection in Internet of Things , 2018, Journal of Communications and Networks.
[23] Pierre-Francois Marteau,et al. Sequence Covering for Efficient Host-Based Intrusion Detection , 2017, IEEE Transactions on Information Forensics and Security.
[24] C. L. Philip Chen,et al. Fuzzy Restricted Boltzmann Machine for the Enhancement of Deep Learning , 2015, IEEE Transactions on Fuzzy Systems.
[25] Seyedali Mirjalili,et al. Binary Multi-Objective Grey Wolf Optimizer for Feature Selection in Classification , 2020, IEEE Access.
[26] Georges Kaddoum,et al. Intrusion Detection for Cyber–Physical Systems Using Generative Adversarial Networks in Fog Environment , 2020, IEEE Internet of Things Journal.
[27] Kiseon Kim,et al. Genetic convolutional neural network for intrusion detection systems , 2020, Future Gener. Comput. Syst..
[28] Jabeen Sultana,et al. Intrusion Detection Based on Autoencoder and Isolation Forest in Fog Computing , 2020, IEEE Access.
[29] Yaxi Liu,et al. An Efficient Stochastic Gradient Descent Algorithm to Maximize the Coverage of Cellular Networks , 2019, IEEE Transactions on Wireless Communications.
[30] Hyejeong Hong,et al. A memory-efficient parallel string matching for intrusion detection systems , 2009, IEEE Communications Letters.
[31] Hongbin Yu,et al. Feature Extraction and Analysis of Natural Language Processing for Deep Learning English Language , 2020, IEEE Access.
[32] Arun Kumar Sangaiah,et al. A real-time and ubiquitous network attack detection based on deep belief network and support vector machine , 2020, IEEE/CAA Journal of Automatica Sinica.
[33] Jin Liu,et al. Applications of deep learning to MRI images: A survey , 2018, Big Data Min. Anal..
[34] Jun Du,et al. Speech Enhancement Based on Teacher–Student Deep Learning Using Improved Speech Presence Probability for Noise-Robust Speech Recognition , 2019, IEEE/ACM Transactions on Audio, Speech, and Language Processing.
[35] Yu Lasheng,et al. Deep Learning Approach Combining Sparse Autoencoder With SVM for Network Intrusion Detection , 2018, IEEE Access.
[36] Marc Frappier,et al. Intrusion Detection Systems: A Cross-Domain Overview , 2019, IEEE Communications Surveys & Tutorials.
[37] Stefan C. Kremer,et al. Network intrusion detection system based on recursive feature addition and bigram technique , 2018, Comput. Secur..
[38] Yee Whye Teh,et al. A Fast Learning Algorithm for Deep Belief Nets , 2006, Neural Computation.
[39] Geoffrey E. Hinton. Training Products of Experts by Minimizing Contrastive Divergence , 2002, Neural Computation.
[40] Jiasong Wu,et al. Quaternion softmax classifier , 2014 .
[41] S Messaoud,et al. Online GMM Clustering and Mini-Batch Gradient Descent Based Optimization for Industrial IoT 4.0 , 2020, IEEE Transactions on Industrial Informatics.
[42] J. Rene Beulah,et al. A Hybrid Feature Selection Method for Improved Detection of Wired/Wireless Network Intrusions , 2017, Wireless personal communications.
[43] Albert Y. Zomaya,et al. An Industrial Network Intrusion Detection Algorithm Based on Multifeature Data Clustering Optimization Model , 2020, IEEE Transactions on Industrial Informatics.