暂无分享,去创建一个
G. Fortino | M. Di Mauro | A. Liotta | L. Erhan | M. Ndubuaku | W. Song | M. Chen | O. Bagdasar | Min Chen | G. Fortino | A. Liotta | M. Ndubuaku | Wei Song | O. Bagdasar | M. Mauro | Laura Erhan | Maryleen U. Ndubuaku | L. Erhan
[1] Pedro M. Domingos. MetaCost: a general method for making classifiers cost-sensitive , 1999, KDD '99.
[2] Martin May,et al. A Signal Processing View on Packet Sampling and Anomaly Detection , 2010, 2010 Proceedings IEEE INFOCOM.
[3] Benjamin M. Marlin,et al. Missing Data Problems in Machine Learning , 2008 .
[4] Yuan Zuo,et al. Towards Experienced Anomaly Detector Through Reinforcement Learning , 2018, AAAI.
[5] Mikael Gidlund,et al. Future research challenges in wireless sensor and actuator networks targeting industrial automation , 2011, 2011 9th IEEE International Conference on Industrial Informatics.
[6] Samaneh Hoghooghi,et al. Proposing a new method for improving RPL to support mobility in the Internet of things , 2020, IET Networks.
[7] Anahita Khojandi,et al. Real-Time Sensor Anomaly Detection and Recovery in Connected Automated Vehicle Sensors , 2021, IEEE Transactions on Intelligent Transportation Systems.
[8] Steven Verstockt,et al. Convolutional Neural Network Based Fault Detection for Rotating Machinery , 2016 .
[9] Hao Deng,et al. Fog Computing Architecture-Based Data Reduction Scheme for WSN , 2019, 2019 1st International Conference on Industrial Artificial Intelligence (IAI).
[10] Giancarlo Fortino,et al. Short-long term anomaly detection in wireless sensor networks based on machine learning and multi-parameterized edit distance , 2019, Inf. Fusion.
[11] Yuan Yao,et al. Online anomaly detection for sensor systems: A simple and efficient approach , 2010, Perform. Evaluation.
[12] Antonio Iera,et al. The Internet of Things: A survey , 2010, Comput. Networks.
[13] Asok Ray,et al. Symbolic time series analysis via wavelet-based partitioning , 2006, Signal Process..
[14] Antonio Liotta,et al. Impact of Transmission Power Control in multi-hop networks , 2017, Future Gener. Comput. Syst..
[15] Pierre Baldi,et al. Autoencoders, Unsupervised Learning, and Deep Architectures , 2011, ICML Unsupervised and Transfer Learning.
[16] Sameer Singh,et al. Novelty detection: a review - part 1: statistical approaches , 2003, Signal Process..
[17] Apoorva Nandini Saridena,et al. Adversarial Learning-Based On-Line Anomaly Monitoring for Assured Autonomy , 2018, 2018 IEEE/RSJ International Conference on Intelligent Robots and Systems (IROS).
[18] Nawaz Mohamudally,et al. Building An Anomaly Detection Engine (ADE) For IoT Smart Applications , 2018, FNC/MobiSPC.
[19] Angelos Antonopoulos,et al. Online VNF Lifecycle Management in an MEC-Enabled 5G IoT Architecture , 2020, IEEE Internet of Things Journal.
[20] Min-hwan Oh,et al. Sequential Anomaly Detection using Inverse Reinforcement Learning , 2019, KDD.
[21] Sudip Misra,et al. Blockchain-Enabled Safety-as-a-Service for Industrial IoT Applications , 2020, IEEE Internet of Things Magazine.
[22] Li-Qing Zhang,et al. Abnormal Event Detection Using Recurrent Neural Network , 2015, 2015 International Conference on Computer Science and Applications (CSA).
[23] Tingting Zhang,et al. Combining Fog Computing with Sensor Mote Machine Learning for Industrial IoT , 2018, Sensors.
[24] Gregory J. Pottie,et al. Sensor network data fault types , 2007, TOSN.
[25] Antonio Liotta,et al. Ensembles of incremental learners to detect anomalies in ad hoc sensor networks , 2015, Ad Hoc Networks.
[26] Sameer Singh,et al. Novelty detection: a review - part 2: : neural network based approaches , 2003, Signal Process..
[27] Arthur Zimek,et al. There and back again: Outlier detection between statistical reasoning and data mining algorithms , 2018, WIREs Data Mining Knowl. Discov..
[28] David A. Clifton,et al. A review of novelty detection , 2014, Signal Process..
[29] Xinyu Yang,et al. A Survey on the Edge Computing for the Internet of Things , 2018, IEEE Access.
[30] Yen Kheng Tan,et al. Energy Harvesting Autonomous Sensor Systems: Design, Analysis, and Practical Implementation , 2013 .
[31] Charu C. Aggarwal,et al. Mining Text Data , 2012 .
[32] Antonio Liotta,et al. Spatial anomaly detection in sensor networks using neighborhood information , 2017, Inf. Fusion.
[33] SalehiMahsa,et al. A Survey on Anomaly detection in Evolving Data , 2018 .
[34] Ramesh Govindan,et al. Sensor faults: Detection methods and prevalence in real-world datasets , 2010, TOSN.
[35] Alex Lu,et al. Anomaly detection on the edge , 2017, MILCOM 2017 - 2017 IEEE Military Communications Conference (MILCOM).
[36] Biming Tian,et al. Anomaly detection in wireless sensor networks: A survey , 2011, J. Netw. Comput. Appl..
[37] A. Rama Mohan Reddy,et al. BARTD: Bio-inspired anomaly based real time detection of under rated App-DDoS attack on web , 2020, J. King Saud Univ. Comput. Inf. Sci..
[38] Maurizio Longo,et al. Cyber-Threat Mitigation Exploiting the Birth–Death–Immigration Model , 2018, IEEE Transactions on Information Forensics and Security.
[39] Subutai Ahmad,et al. Evaluating Real-Time Anomaly Detection Algorithms -- The Numenta Anomaly Benchmark , 2015, 2015 IEEE 14th International Conference on Machine Learning and Applications (ICMLA).
[40] Muhammad Shafique,et al. An overview of next-generation architectures for machine learning: Roadmap, opportunities and challenges in the IoT era , 2018, 2018 Design, Automation & Test in Europe Conference & Exhibition (DATE).
[41] Foster J. Provost,et al. Learning When Training Data are Costly: The Effect of Class Distribution on Tree Induction , 2003, J. Artif. Intell. Res..
[42] Giovanni De Magistris,et al. Spatio-Temporal Anomaly Detection for Industrial Robots through Prediction in Unsupervised Feature Space , 2017, 2017 IEEE Winter Conference on Applications of Computer Vision (WACV).
[43] Geoffrey E. Hinton,et al. Deep Learning , 2015, Nature.
[44] Peter Stone,et al. Scalable training of artificial neural networks with adaptive sparse connectivity inspired by network science , 2017, Nature Communications.
[45] Rong Zhou,et al. 5G NFV-Based Tactile Internet for Mission-Critical IoT Services , 2020, IEEE Internet of Things Journal.
[46] Vipin Kumar,et al. Anomaly Detection for Discrete Sequences: A Survey , 2012, IEEE Transactions on Knowledge and Data Engineering.
[47] Je-Won Kang,et al. Intrusion Detection System Using Deep Neural Network for In-Vehicle Network Security , 2016, PloS one.
[48] Yong Haur Tay,et al. Abnormal Event Detection in Videos using Spatiotemporal Autoencoder , 2017, ISNN.
[49] Ganesh Kumar,et al. Anomaly Detection System in Cloud Environment Using Fuzzy Clustering Based ANN , 2015, Mobile Networks and Applications.
[50] Kristian Kersting,et al. Stochastic Online Anomaly Analysis for Streaming Time Series , 2017, IJCAI.
[51] Joel J. P. C. Rodrigues,et al. Hybrid Deep-Learning-Based Anomaly Detection Scheme for Suspicious Flow Detection in SDN: A Social Multimedia Perspective , 2019, IEEE Transactions on Multimedia.
[52] Maurizio Longo,et al. Botnet identification in randomized DDoS attacks , 2016, 2016 24th European Signal Processing Conference (EUSIPCO).
[53] Guangquan Xu,et al. A Secure Random Key Distribution Scheme Against Node Replication Attacks in Industrial Wireless Sensor Systems , 2020, IEEE Transactions on Industrial Informatics.
[54] Jian Pei,et al. Data Mining Trends and Research Frontiers , 2012 .
[55] Randy C. Paffenroth,et al. Anomaly Detection with Robust Deep Autoencoders , 2017, KDD.
[56] Maurizio Longo,et al. Multiple Cyber-Threats Containment Via Kendall's Birth-Death-Immigration Model , 2018, 2018 26th European Signal Processing Conference (EUSIPCO).
[57] VARUN CHANDOLA,et al. Anomaly detection: A survey , 2009, CSUR.
[58] Mikael Gidlund,et al. A Machine-Learning-Based Technique for False Data Injection Attacks Detection in Industrial IoT , 2020, IEEE Internet of Things Journal.
[59] T. Tsvetkov,et al. RPL: IPv6 Routing Protocol for Low power and Lossy Networks , 2010 .
[60] Shin Ando,et al. Clustering Needles in a Haystack: An Information Theoretic Analysis of Minority and Outlier Detection , 2007, Seventh IEEE International Conference on Data Mining (ICDM 2007).
[61] David Zaldivar,et al. Investigating the Security Threats on Networked Medical Devices , 2020, 2020 10th Annual Computing and Communication Workshop and Conference (CCWC).
[62] Arif Sari,et al. A Review of Anomaly Detection Systems in Cloud Networks and Survey of Cloud Security Measures in Cloud Storage Applications , 2015 .
[63] Azzedine Boukerche,et al. A multi-stage anomaly detection scheme for augmenting the security in IoT-enabled applications , 2020, Future Gener. Comput. Syst..
[64] Pietro Ducange,et al. Smart Audio Sensors in the Internet of Things Edge for Anomaly Detection , 2018, IEEE Access.
[65] Elena Sitnikova,et al. Towards the Development of Realistic Botnet Dataset in the Internet of Things for Network Forensic Analytics: Bot-IoT Dataset , 2018, Future Gener. Comput. Syst..
[66] Mykola Pechenizkiy,et al. Sparse evolutionary deep learning with over one million artificial neurons on commodity hardware , 2019, Neural Computing and Applications.
[67] Rajkumar Buyya,et al. Fog Computing: A Taxonomy, Survey and Future Directions , 2016, Internet of Everything.
[68] Giancarlo Fortino,et al. Internet of Things Based on Smart Objects, Technology, Middleware and Applications , 2014, Internet of Things Based on Smart Objects, Technology, Middleware and Applications.
[69] Antonio Skarmeta,et al. Virtual IoT HoneyNets to Mitigate Cyberattacks in SDN/NFV-Enabled IoT Networks , 2020, IEEE Journal on Selected Areas in Communications.
[70] Victoria J. Hodge,et al. A Survey of Outlier Detection Methodologies , 2004, Artificial Intelligence Review.
[71] Giancarlo Fortino,et al. Autonomic computation offloading in mobile edge for IoT applications , 2019, Future Gener. Comput. Syst..
[72] Zaigham Mahmood,et al. Cloud Computing: Concepts, Technology & Architecture , 2013 .
[73] Helena Rifà-Pous,et al. A Comparative Study of Anomaly Detection Techniques for Smart City Wireless Sensor Networks , 2016, Sensors.
[74] Brian Litt,et al. Semi-Supervised Anomaly Detection for EEG Waveforms Using Deep Belief Nets , 2010, 2010 Ninth International Conference on Machine Learning and Applications.
[75] Weihua Zhuang,et al. SDN/NFV-Empowered Future IoV With Enhanced Communication, Computing, and Caching , 2020, Proceedings of the IEEE.
[76] Susan A. Murphy,et al. Monographs on statistics and applied probability , 1990 .
[77] Philip Levis,et al. RPL: IPv6 Routing Protocol for Low-Power and Lossy Networks , 2012, RFC.
[78] Lei Shi,et al. MAD-GAN: Multivariate Anomaly Detection for Time Series Data with Generative Adversarial Networks , 2019, ICANN.
[79] Ling Huang,et al. In-Network PCA and Anomaly Detection , 2006, NIPS.
[80] J. Wenny Rahayu,et al. Mobile cloud computing: A survey , 2013, Future Gener. Comput. Syst..
[81] Giancarlo Fortino,et al. Intelligence at the Edge of Complex Networks: The Case of Cognitive Transmission Power Control , 2019, IEEE Wireless Communications.
[82] Zeyu Sun,et al. An Energy-Efficient Cross-Layer-Sensing Clustering Method Based on Intelligent Fog Computing in WSNs , 2019, IEEE Access.
[83] Tie Luo,et al. Distributed Anomaly Detection Using Autoencoder Neural Networks in WSN for IoT , 2018, 2018 IEEE International Conference on Communications (ICC).
[84] Giancarlo Fortino,et al. A framework for anomaly detection and classification in Multiple IoT scenarios , 2021, Future Gener. Comput. Syst..
[85] Antonio Ortega,et al. Spectral anomaly detection using graph-based filtering for wireless sensor networks , 2014, 2014 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP).
[86] Weiming Shen,et al. Agent-Oriented Cooperative Smart Objects: From IoT System Design to Implementation , 2018, IEEE Transactions on Systems, Man, and Cybernetics: Systems.
[87] Lovekesh Vig,et al. Anomaly detection in ECG time signals via deep long short-term memory networks , 2015, 2015 IEEE International Conference on Data Science and Advanced Analytics (DSAA).
[88] Antonio Liotta,et al. Transmission power control in WSNs : from deterministic to cognitive methods , 2018, IoT 2018.
[89] Onur Mutlu,et al. Gaia: Geo-Distributed Machine Learning Approaching LAN Speeds , 2017, NSDI.
[90] Kevin P. Murphy,et al. Machine learning - a probabilistic perspective , 2012, Adaptive computation and machine learning series.
[91] Laurence T. Yang,et al. A survey on data fusion in internet of things: Towards secure and privacy-preserving fusion , 2019, Inf. Fusion.
[92] Edwin Lughofer,et al. Fault detection in multi-sensor networks based on multivariate time-series models and orthogonal transformations , 2014, Inf. Fusion.
[93] Georgios Kambourakis,et al. DDoS in the IoT: Mirai and Other Botnets , 2017, Computer.
[94] Dong Xiang,et al. Information-theoretic measures for anomaly detection , 2001, Proceedings 2001 IEEE Symposium on Security and Privacy. S&P 2001.
[95] Arthur Zimek,et al. On the evaluation of unsupervised outlier detection: measures, datasets, and an empirical study , 2016, Data Mining and Knowledge Discovery.
[96] Sanjay Chawla,et al. Deep Learning for Anomaly Detection: A Survey , 2019, ArXiv.
[97] MengChu Zhou,et al. Security and trust issues in Fog computing: A survey , 2018, Future Gener. Comput. Syst..
[98] Witold Pedrycz,et al. A survey on machine learning for data fusion , 2020, Inf. Fusion.
[99] Artur Tomaszewski,et al. Energy-Optimal Data Aggregation and Dissemination for the Internet of Things , 2018, IEEE Internet of Things Journal.
[100] Hubert Eichner,et al. Towards Federated Learning at Scale: System Design , 2019, SysML.
[101] Andreas Dengel,et al. FuseAD: Unsupervised Anomaly Detection in Streaming Sensors Data by Fusing Statistical and Deep Learning Models , 2019, Sensors.
[102] Christian Igel,et al. An Introduction to Restricted Boltzmann Machines , 2012, CIARP.
[103] Alfredo De Santis,et al. Network anomaly detection with the restricted Boltzmann machine , 2013, Neurocomputing.
[104] Daniel Kudenko,et al. Multi-agent Reinforcement Learning for Intrusion Detection , 2007, Adaptive Agents and Multi-Agents Systems.
[105] Antonio Liotta,et al. Self-Learning Power Control in Wireless Sensor Networks , 2018, Sensors.
[106] M. Palaniswami,et al. Distributed Anomaly Detection in Wireless Sensor Networks , 2006, 2006 10th IEEE Singapore International Conference on Communication Systems.
[107] Hhwj Hedde Bosman,et al. Anomaly detection in networked embedded sensor systems , 2016 .
[108] Lovekesh Vig,et al. LSTM-based Encoder-Decoder for Multi-sensor Anomaly Detection , 2016, ArXiv.
[109] Albert Y. Zomaya,et al. En-ABC: An ensemble artificial bee colony based anomaly detection scheme for cloud environment , 2020, J. Parallel Distributed Comput..
[110] Hamed S. Al-Raweshidy,et al. Intelligent Traffic Management and Load Balance Based on Spike ISDN-IoT , 2020 .
[111] Tim Kraska,et al. MLbase: A Distributed Machine-learning System , 2013, CIDR.
[112] Estevam R. Hruschka,et al. Roles Played by Bayesian Networks in Machine Learning: An Empirical Investigation , 2013 .
[113] Giancarlo Fortino,et al. Modelling and simulation of Opportunistic IoT Services with Aggregate Computing , 2019, Future Gener. Comput. Syst..
[114] Mazhar Ali,et al. Towards a Fog Enabled Efficient Car Parking Architecture , 2019, IEEE Access.
[115] Giancarlo Fortino,et al. Environment-fusion multipath routing protocol for wireless sensor networks , 2020, Inf. Fusion.
[116] Yao Zhang,et al. Vehicular Blockchain-Based Collective Learning for Connected and Autonomous Vehicles , 2020, IEEE Wireless Communications.
[117] Saeed Amizadeh,et al. Generic and Scalable Framework for Automated Time-series Anomaly Detection , 2015, KDD.
[118] Alberto Del Bimbo,et al. Deep Learning Based Surveillance System for Open Critical Areas , 2018 .
[119] Yoshua Bengio,et al. Generative Adversarial Nets , 2014, NIPS.
[120] Urbashi Mitra,et al. Security Against False Data-Injection Attack in Cyber-Physical Systems , 2018, IEEE Transactions on Control of Network Systems.
[121] Hamadoun Tall,et al. BAIWL: Blacklisting Approach to Improve Wireless Sensor Network Lifetime , 2020, 2020 IEEE International Conf on Natural and Engineering Sciences for Sahel's Sustainable Development - Impact of Big Data Application on Society and Environment (IBASE-BF).
[122] Sridhar Adepu,et al. Anomaly Detection in Cyber Physical Systems Using Recurrent Neural Networks , 2017, 2017 IEEE 18th International Symposium on High Assurance Systems Engineering (HASE).
[123] Libing Wu,et al. A New Proposed Sensor Cloud Architecture Based on Fog Computing for Internet of Things , 2019, 2019 International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData).
[124] Zachary Chase Lipton. A Critical Review of Recurrent Neural Networks for Sequence Learning , 2015, ArXiv.
[125] Hui Yang,et al. Convolutional Neural Network Analysis of Recurrence Plots for Anomaly Detection , 2020, Int. J. Bifurc. Chaos.
[126] Qihui Wu,et al. A survey of machine learning for big data processing , 2016, EURASIP Journal on Advances in Signal Processing.
[127] Jianguo Liu,et al. A Hybrid Anomaly Detection Framework in Cloud Computing Using One-Class and Two-Class Support Vector Machines , 2012, ADMA.
[128] Salvatore J. Stolfo,et al. Real time data mining-based intrusion detection , 2001, Proceedings DARPA Information Survivability Conference and Exposition II. DISCEX'01.
[129] Mahsa Salehi,et al. A Survey on Anomaly detection in Evolving Data: [with Application to Forest Fire Risk Prediction] , 2018, SKDD.
[130] Axel Jantsch,et al. Neural network based ECG anomaly detection on FPGA and trade-off analysis , 2017, 2017 IEEE International Symposium on Circuits and Systems (ISCAS).
[131] Jaromir Konecny,et al. Environmental WSN Edge Computing Concept by Wavelet Transform Data Compression in a Sensor Node , 2019, IFAC-PapersOnLine.
[132] Hamed Haddadi,et al. Deep Learning in Mobile and Wireless Networking: A Survey , 2018, IEEE Communications Surveys & Tutorials.
[133] Sanjay Chawla,et al. On local spatial outliers , 2004, Fourth IEEE International Conference on Data Mining (ICDM'04).
[134] Hamid Reza Shahriari,et al. A Survey of Anomaly Detection Approaches in Internet of Things , 2018, ISC Int. J. Inf. Secur..
[135] Md Zahangir Alom,et al. Intrusion detection using deep belief networks , 2015, 2015 National Aerospace and Electronics Conference (NAECON).
[136] Charu C. Aggarwal,et al. Outlier Analysis , 2013, Springer New York.
[137] Lida Xu,et al. The internet of things: a survey , 2014, Information Systems Frontiers.
[138] Kai Ming Ting,et al. An Instance-weighting Method to Induce Cost-sensitive Trees , 2001 .
[139] Mouzhi Ge,et al. Big Data for Internet of Things: A Survey , 2018, Future Gener. Comput. Syst..
[140] Raghavendra Chalapathy University of Sydney,et al. Deep Learning for Anomaly Detection: A Survey , 2019, ArXiv.
[141] Subutai Ahmad,et al. Unsupervised real-time anomaly detection for streaming data , 2017, Neurocomputing.
[142] Oliver Obst,et al. Spatiotemporal Anomaly Detection in Gas Monitoring Sensor Networks , 2008, EWSN.
[143] Prem Prakash Jayaraman,et al. Deep Osmosis: Holistic Distributed Deep Learning in Osmotic Computing , 2018, IEEE Cloud Computing.
[144] Mansoor Alam,et al. A Deep Learning Approach for Network Intrusion Detection System , 2016, EAI Endorsed Trans. Security Safety.