Long-Range Dependent Traffic Classification with Convolutional Neural Networks Based on Hurst Exponent Analysis
暂无分享,去创建一个
Joanna Domańska | Adam Domański | Dariusz Marek | Jakub Szyguła | Katarzyna Filus | J. Domańska | Katarzyna Filus | D. Marek | A. Domanski | Jakub Szygula
[1] Yanan Wang,et al. Network traffic forecasting model based on long-term intuitionistic fuzzy time series , 2020, Inf. Sci..
[2] Jie Yu,et al. Time Series Classification with Deep Neural Networks Based on Hurst Exponent Analysis , 2017, ICONIP.
[3] Sung-Bae Cho,et al. A convolutional neural-based learning classifier system for detecting database intrusion via insider attack , 2020, Inf. Sci..
[4] Luiz Paulo Lopes Fávero,et al. Hurst exponent, fractals and neural networks for forecasting financial asset returns in Brazil , 2018 .
[5] Shaojie Qiao,et al. Identification of DNA-protein binding sites by bootstrap multiple convolutional neural networks on sequence information , 2019, Eng. Appl. Artif. Intell..
[6] Jiaqi Wang,et al. Three-way enhanced convolutional neural networks for sentence-level sentiment classification , 2019, Inf. Sci..
[7] Mehdi Rezaeian,et al. Modeling of self-similar network traffic using artificial neural networks , 2014, 2014 4th International Conference on Computer and Knowledge Engineering (ICCKE).
[8] Jian Jiang,et al. Traffic self-similarity analysis and application of industrial internet , 2020 .
[9] Xiaolin Hu,et al. PopMNet: Generating structured pop music melodies using neural networks , 2020, Artif. Intell..
[10] L. Oxley,et al. Estimators for Long Range Dependence: An Empirical Study , 2009, 0901.0762.
[11] Walter Willinger,et al. Lessons from "on the self-similar nature of ethernet traffic" , 2019, CCRV.
[12] Jennifer Brown,et al. Not all estimators are born equal: The empirical properties of some estimators of long memory , 2013, Math. Comput. Simul..
[13] Homero Toral,et al. Self-Similarity, Packet Loss, Jitter, and Packet Size: Empirical Relationships for VoIP , 2008, 18th International Conference on Electronics, Communications and Computers (conielecomp 2008).
[14] José Ruiz-Pinales,et al. Hurst Parameter Estimation Using Artificial Neural Networks , 2011 .
[15] Hao Shao,et al. Syntax-aware entity representations for neural relation extraction , 2019, Artif. Intell..
[16] C. Peng,et al. Mosaic organization of DNA nucleotides. , 1994, Physical review. E, Statistical physics, plasmas, fluids, and related interdisciplinary topics.
[17] Ying Li,et al. Convolutional neural network learning for generic data classification , 2019, Inf. Sci..
[18] Uthpala Premarathne,et al. Network traffic self similarity measurements using classifier based Hurst parameter estimation , 2010, 2010 Fifth International Conference on Information and Automation for Sustainability.
[19] Jing Liu,et al. Self-attention convolutional neural network for improved MR image reconstruction , 2019, Inf. Sci..
[20] E. Grab,et al. Hurst parameter estimation by wavelet transformation and a filter bank for self-similar traffic , 2015, Automatic Control and Computer Sciences.
[21] Qianmu Li,et al. Self-similarity Analysis and Application of Network Traffic , 2019, MobiCASE.
[22] Tadeusz Czachórski,et al. Estimating the Intensity of Long-Range Dependence in Real and Synthetic Traffic Traces , 2015, CN.
[23] Scott Sanner,et al. Compact and efficient encodings for planning in factored state and action spaces with learned Binarized Neural Network transition models , 2020, Artif. Intell..
[24] Jianxi Yang,et al. A Hierarchical Deep Convolutional Neural Network and Gated Recurrent Unit Framework for Structural Damage Detection , 2020, Inf. Sci..
[25] T. Matcharashvili,et al. Analysis of the regularity of the Internet Interdomain Routing dynamics , 2020 .
[26] Marcin Korytkowski,et al. Convolutional Neural Networks for Time Series Classification , 2017, ICAISC.
[27] Gagandeep Kaur,et al. Detection of TCP targeted high bandwidth attacks using self-similarity , 2017, J. King Saud Univ. Comput. Inf. Sci..
[28] Igor S. Barsukov,et al. Fractal Analysis based Detection of DoS/LDoS Network Attacks , 2019, 2019 International Russian Automation Conference (RusAutoCon).
[29] K. Rasheed,et al. HURST EXPONENT AND FINANCIAL MARKET PREDICTABILITY , 2005 .
[30] Paisarn Muneesawang,et al. On-device facial verification using NUF-Net model of deep learning , 2019, Eng. Appl. Artif. Intell..
[31] Tshilidzi Marwala,et al. Time Series Analysis Using Fractal Theory and Online Ensemble Classifiers , 2006, Australian Conference on Artificial Intelligence.
[32] Sally Floyd,et al. Wide-area traffic: the failure of Poisson modeling , 1994 .
[33] Yuefei Zhu,et al. A Deep Learning Approach for Intrusion Detection Using Recurrent Neural Networks , 2017, IEEE Access.
[34] Adam Domanski,et al. Investigating Long-Range Dependence in E-Commerce Web Traffic , 2016, CN.
[35] Nikhil Ketkar,et al. Deep Learning with Python , 2017 .
[36] Mbulelo Brenwen Ntlangu. Modelling computer network traffic using wavelets and time series analysis , 2019 .
[37] Joanna Domańska,et al. On Stochastic Models of Internet Traffic , 2015 .
[38] S. Havlin,et al. Detecting long-range correlations with detrended fluctuation analysis , 2001, cond-mat/0102214.
[39] Shize Huang,et al. Arc detection and recognition in pantograph-catenary system based on convolutional neural network , 2019, Inf. Sci..
[40] Meng Lan,et al. Global context based automatic road segmentation via dilated convolutional neural network , 2020, Inf. Sci..
[41] G. Rutka,et al. Neural Network Models for Internet Traffic Prediction , 2006 .
[42] Dianxiang Xu,et al. Detecting Saturation Attacks Based on Self-Similarity of OpenFlow Traffic , 2020, IEEE Transactions on Network and Service Management.