Deep Learning Algorithms for Cybersecurity Applications: A Technological and Status Review
暂无分享,去创建一个
[1] Geethapriya Thamilarasu,et al. Towards Deep-Learning-Driven Intrusion Detection for the Internet of Things , 2019, Sensors.
[2] Vinu Sundararaj,et al. An Efficient Threshold Prediction Scheme for Wavelet Based ECG Signal Noise Reduction Using Variable Step Size Firefly Algorithm , 2016 .
[3] Ali A. Ghorbani,et al. Application of deep learning to cybersecurity: A survey , 2019, Neurocomputing.
[4] Alan T. Sherman,et al. Identifying Core Concepts of Cybersecurity: Results of Two Delphi Processes , 2018, IEEE Transactions on Education.
[5] Naveen K. Chilamkurti,et al. Distributed attack detection scheme using deep learning approach for Internet of Things , 2017, Future Gener. Comput. Syst..
[6] Mingyan Liu,et al. Generating Adversarial Examples with Adversarial Networks , 2018, IJCAI.
[7] Erik Cambria,et al. Recent Trends in Deep Learning Based Natural Language Processing , 2017, IEEE Comput. Intell. Mag..
[8] Arwa Alrawais,et al. Fog Computing for the Internet of Things: Security and Privacy Issues , 2017, IEEE Internet Computing.
[9] Jaime Lloret,et al. Conditional Variational Autoencoder for Prediction and Feature Recovery Applied to Intrusion Detection in IoT , 2017, Sensors.
[10] Edward K. Wong,et al. JPEG Steganalysis Based on DenseNet , 2017, ArXiv.
[11] Hee-su Chae,et al. Feature Selection for Intrusion Detection using NSL-KDD , 2013 .
[12] Peter Norvig,et al. Artificial Intelligence: A Modern Approach , 1995 .
[13] Xiangyang Luo,et al. Anti-steganalysis for image on convolutional neural networks , 2018, Multimedia Tools and Applications.
[14] Donghong Ji,et al. Multi-task and multi-view training for end-to-end relation extraction , 2019, Neurocomputing.
[15] Pascal Vincent,et al. Generalized Denoising Auto-Encoders as Generative Models , 2013, NIPS.
[16] Daniel S. Berman,et al. A Survey of Deep Learning Methods for Cyber Security , 2019, Inf..
[17] Qin Zheng,et al. IMCFN: Image-based malware classification using fine-tuned convolutional neural network architecture , 2020, Comput. Networks.
[18] Verónica Bolón-Canedo,et al. Performance evaluation of unsupervised techniques in cyber-attack anomaly detection , 2019, Journal of Ambient Intelligence and Humanized Computing.
[19] Zheng Qin,et al. A feature-hybrid malware variants detection using CNN based opcode embedding and BPNN based API embedding , 2019, Comput. Secur..
[20] Alfredo De Santis,et al. Network anomaly detection with the restricted Boltzmann machine , 2013, Neurocomputing.
[21] Mamoun Alazab,et al. A Comprehensive Tutorial and Survey of Applications of Deep Learning for Cyber Security , 2020 .
[22] Shouhuai Xu,et al. A deep learning framework for predicting cyber attacks rates , 2019, EURASIP J. Inf. Secur..
[23] Jun Yang,et al. Improved traffic detection with support vector machine based on restricted Boltzmann machine , 2017, Soft Comput..
[24] Zongqing Lu,et al. Learning Attentional Communication for Multi-Agent Cooperation , 2018, NeurIPS.
[25] Xianbin Wang,et al. Machine learning techniques for intrusion detection on public dataset , 2016, 2016 IEEE Canadian Conference on Electrical and Computer Engineering (CCECE).
[26] K. P. Soman,et al. Deep Learning Approach for Intelligent Intrusion Detection System , 2019, IEEE Access.
[27] Dong Yu,et al. Recent progresses in deep learning based acoustic models , 2017, IEEE/CAA Journal of Automatica Sinica.
[28] Chris Yakopcic,et al. A State-of-the-Art Survey on Deep Learning Theory and Architectures , 2019, Electronics.
[29] Vinu Sundararaj,et al. Optimal Task Assignment in Mobile Cloud Computing by Queue Based Ant-Bee Algorithm , 2018, Wirel. Pers. Commun..
[30] Shahrokh Valaee,et al. Recent Advances in Recurrent Neural Networks , 2017, ArXiv.
[31] K. P. Soman,et al. Robust Intelligent Malware Detection Using Deep Learning , 2019, IEEE Access.
[32] Ali Dehghantanha,et al. A deep Recurrent Neural Network based approach for Internet of Things malware threat hunting , 2018, Future Gener. Comput. Syst..
[33] Lianbing Deng,et al. A novel CNN based security guaranteed image watermarking generation scenario for smart city applications , 2019, Inf. Sci..
[34] Wei Xiong,et al. Stacked Convolutional Denoising Auto-Encoders for Feature Representation , 2017, IEEE Transactions on Cybernetics.
[35] Geoffrey E. Hinton,et al. Acoustic Modeling Using Deep Belief Networks , 2012, IEEE Transactions on Audio, Speech, and Language Processing.
[36] Mario Vega-Barbas,et al. Evaluation of Cybersecurity Data Set Characteristics for Their Applicability to Neural Networks Algorithms Detecting Cybersecurity Anomalies , 2020, IEEE Access.
[37] Elaine M. Raybourn,et al. A Zero-Entry Cyber Range Environment for Future Learning Ecosystems , 2018, Cyber-Physical Systems Security.
[38] Jian Sun,et al. Optimal switching integrity attacks in cyber-physical systems , 2017, 2017 32nd Youth Academic Annual Conference of Chinese Association of Automation (YAC).
[39] Vijay Janapa Reddi,et al. Deep Reinforcement Learning for Cyber Security , 2019, IEEE Transactions on Neural Networks and Learning Systems.
[40] Zhe Gan,et al. Variational Autoencoder for Deep Learning of Images, Labels and Captions , 2016, NIPS.
[41] Bin Zhou,et al. Deep learning aided interval state prediction for improving cyber security in energy internet , 2019, Energy.
[42] Vinu Sundararaj,et al. An optimal cluster formation based energy efficient dynamic scheduling hybrid MAC protocol for heavy traffic load in wireless sensor networks , 2018, Comput. Secur..
[43] Kai Liu,et al. Spatial Image Steganography Based on Generative Adversarial Network , 2018, ArXiv.
[44] Andrew W. Senior,et al. Fast and accurate recurrent neural network acoustic models for speech recognition , 2015, INTERSPEECH.
[45] Yuval Elovici,et al. Gradients Cannot Be Tamed: Behind the Impossible Paradox of Blocking Targeted Adversarial Attacks , 2021, IEEE Transactions on Neural Networks and Learning Systems.
[46] Shane Legg,et al. Human-level control through deep reinforcement learning , 2015, Nature.
[47] Mitsuaki Akiyama,et al. Empowering Anti-malware Research in Japan by Sharing the MWS Datasets , 2015, J. Inf. Process..
[48] Yuancheng Li,et al. A Hybrid Malicious Code Detection Method based on Deep Learning , 2015 .
[49] Zachary Chase Lipton. A Critical Review of Recurrent Neural Networks for Sequence Learning , 2015, ArXiv.
[50] Jiayi Cao,et al. Reinforcement learning-based real-time power management for hybrid energy storage system in the plug-in hybrid electric vehicle , 2018 .
[51] Vinu Sundararaj,et al. Optimised denoising scheme via opposition-based self-adaptive learning PSO algorithm for wavelet-based ECG signal noise reduction , 2017 .
[52] Ali Tajer,et al. Secure Estimation Under Causative Attacks , 2020, IEEE Transactions on Information Theory.
[53] Wei Feng,et al. A new method for the prediction of network security situations based on recurrent neural network with gated recurrent unit , 2018, Int. J. Intell. Comput. Cybern..
[54] Usama Ahmed,et al. Modelling cyber security for software-defined networks those grow strong when exposed to threats , 2015, Journal of Reliable Intelligent Environments.
[55] Dong Yu,et al. Exploring convolutional neural network structures and optimization techniques for speech recognition , 2013, INTERSPEECH.
[56] Nagaraj Balakrishnan,et al. Deep Belief Network enhanced intrusion detection system to prevent security breach in the Internet of Things , 2019, Internet Things.
[57] Nour Moustafa,et al. UNSW-NB15: a comprehensive data set for network intrusion detection systems (UNSW-NB15 network data set) , 2015, 2015 Military Communications and Information Systems Conference (MilCIS).
[58] Arun Kumar Sangaiah,et al. A real-time and ubiquitous network attack detection based on deep belief network and support vector machine , 2020, IEEE/CAA Journal of Automatica Sinica.
[59] Randy H. Katz,et al. A view of cloud computing , 2010, CACM.
[60] Yunhao Liu,et al. Big Data: A Survey , 2014, Mob. Networks Appl..
[61] Zhi Xue,et al. IDSGAN: Generative Adversarial Networks for Attack Generation against Intrusion Detection , 2018, PAKDD.
[62] Sen Liu,et al. Poisoning and Evasion Attacks Against Deep Learning Algorithms in Autonomous Vehicles , 2020, IEEE Transactions on Vehicular Technology.
[63] Guifang Liu,et al. A Stacked Autoencoder-Based Deep Neural Network for Achieving Gearbox Fault Diagnosis , 2018, Mathematical Problems in Engineering.
[64] Kenli Li,et al. MalFCS: An effective malware classification framework with automated feature extraction based on deep convolutional neural networks , 2020, J. Parallel Distributed Comput..
[65] Yuxi Li,et al. Deep Reinforcement Learning: An Overview , 2017, ArXiv.
[66] Amos J. Storkey,et al. School of Informatics, University of Edinburgh , 2022 .
[67] Soumith Chintala,et al. Unsupervised Representation Learning with Deep Convolutional Generative Adversarial Networks , 2015, ICLR.
[68] Hongpo Zhang,et al. An effective convolutional neural network based on SMOTE and Gaussian mixture model for intrusion detection in imbalanced dataset , 2020, Comput. Networks.
[69] Saeed Mahloujifar,et al. Learning under p-tampering poisoning attacks , 2019, Annals of Mathematics and Artificial Intelligence.
[70] Theodore T. Allen,et al. Reward-based Monte Carlo-Bayesian reinforcement learning for cyber preventive maintenance , 2018, Comput. Ind. Eng..
[71] See-Kiong Ng,et al. Anomaly Detection with Generative Adversarial Networks for Multivariate Time Series , 2018, ArXiv.
[72] Erchin Serpedin,et al. Deep Learning-Based Detection of Electricity Theft Cyber-Attacks in Smart Grid AMI Networks , 2019, Deep Learning Applications for Cyber Security.
[73] Florian Skopik,et al. A problem shared is a problem halved: A survey on the dimensions of collective cyber defense through security information sharing , 2016, Comput. Secur..
[74] Vinu Sundararaj,et al. CCGPA‐MPPT: Cauchy preferential crossover‐based global pollination algorithm for MPPT in photovoltaic system , 2020, Progress in Photovoltaics: Research and Applications.
[75] Yuval Elovici,et al. Quantifying the resilience of machine learning classifiers used for cyber security , 2018, Expert Syst. Appl..
[76] Jiliang Tang,et al. Adversarial Attacks and Defenses in Images, Graphs and Text: A Review , 2019, International Journal of Automation and Computing.
[77] R. Vinayakumar,et al. A hybrid deep learning image-based analysis for effective malware detection , 2019, J. Inf. Secur. Appl..
[78] Ying Zhang,et al. Intrusion Detection for IoT Based on Improved Genetic Algorithm and Deep Belief Network , 2019, IEEE Access.
[79] Jules White,et al. Cyber-physical security challenges in manufacturing systems , 2014 .