Feature data processing: Making medical data fit deep neural networks
暂无分享,去创建一个
Yujun Li | Wei Guo | Yingying Xu | Lizhen Cui | Zhi Liu | Yankun Cao | Yuefeng Zhao | Haixia Hou | Zhi Liu | Wei Guo | Yuefeng Zhao | Yujun Li | Yankun Cao | Li-zhen Cui | Yingying Xu | Haixia Hou
[1] Nikhil R. Pal,et al. Feature Selection Using a Neural Framework With Controlled Redundancy , 2015, IEEE Transactions on Neural Networks and Learning Systems.
[2] Vijay Varadharajan,et al. A Detailed Investigation and Analysis of Using Machine Learning Techniques for Intrusion Detection , 2019, IEEE Communications Surveys & Tutorials.
[3] Huan Liu,et al. Feature Selection for Classification , 1997, Intell. Data Anal..
[4] Yann LeCun,et al. Transformation Invariance in Pattern Recognition - Tangent Distance and Tangent Propagation , 2012, Neural Networks: Tricks of the Trade.
[5] Zhi Xue,et al. Character-Level Intrusion Detection Based On Convolutional Neural Networks , 2018, 2018 International Joint Conference on Neural Networks (IJCNN).
[6] Jianwen Luo,et al. Learning the implicit strain reconstruction in ultrasound elastography using privileged information , 2019, Medical Image Anal..
[7] Zhiyuan Liu,et al. Graph Neural Networks: A Review of Methods and Applications , 2018, AI Open.
[8] Xing Zhao,et al. Intrusion Detection Algorithm Based on Convolutional Neural Network , 2018 .
[9] Chaopeng Li,et al. Using a Recurrent Neural Network and Restricted Boltzmann Machines for Malicious Traffic Detection , 2018 .
[10] Zahid Akhtar,et al. KDD Cup 99 Data Sets: A Perspective on the Role of Data Sets in Network Intrusion Detection Research , 2019, Computer.
[11] Yuefei Zhu,et al. A Deep Learning Approach for Intrusion Detection Using Recurrent Neural Networks , 2017, IEEE Access.
[12] Luis Perez,et al. The Effectiveness of Data Augmentation in Image Classification using Deep Learning , 2017, ArXiv.
[13] Jeffrey L. Elman,et al. Finding Structure in Time , 1990, Cogn. Sci..
[14] Ali A. Ghorbani,et al. A detailed analysis of the KDD CUP 99 data set , 2009, 2009 IEEE Symposium on Computational Intelligence for Security and Defense Applications.
[15] Yang Xin,et al. Robust detection for network intrusion of industrial IoT based on multi-CNN fusion , 2020 .
[16] Djamal Zeghlache,et al. A Cascade-structured Meta-Specialists Approach for Neural Network-based Intrusion Detection , 2019, 2019 16th IEEE Annual Consumer Communications & Networking Conference (CCNC).
[17] Yong Wang,et al. Learning Traffic as Images: A Deep Convolutional Neural Network for Large-Scale Transportation Network Speed Prediction , 2017, Sensors.
[18] Vladimir Vapnik,et al. An overview of statistical learning theory , 1999, IEEE Trans. Neural Networks.
[19] Yuan-Ting Zhang,et al. Heartbeats Based Biometric Random Binary Sequences Generation to Secure Wireless Body Sensor Networks , 2018, IEEE Transactions on Biomedical Engineering.
[20] Hongyi Zhang,et al. mixup: Beyond Empirical Risk Minimization , 2017, ICLR.
[21] Yi Yang,et al. Random Erasing Data Augmentation , 2017, AAAI.
[22] Qi Shi,et al. A Deep Learning Approach to Network Intrusion Detection , 2018, IEEE Transactions on Emerging Topics in Computational Intelligence.
[23] Yu Lasheng,et al. Deep Learning Approach Combining Sparse Autoencoder With SVM for Network Intrusion Detection , 2018, IEEE Access.
[24] Andrew Zisserman,et al. Very Deep Convolutional Networks for Large-Scale Image Recognition , 2014, ICLR.
[25] Heikki Huttunen,et al. Convolutional Recurrent Neural Networks for Polyphonic Sound Event Detection , 2017, IEEE/ACM Transactions on Audio, Speech, and Language Processing.
[26] Geoffrey E. Hinton,et al. ImageNet classification with deep convolutional neural networks , 2012, Commun. ACM.
[27] Bo Li,et al. V-CNN: Data Visualizing based Convolutional Neural Network , 2018, 2018 IEEE International Conference on Signal Processing, Communications and Computing (ICSPCC).
[28] Tanja Zseby,et al. Analysis of network traffic features for anomaly detection , 2014, Machine Learning.
[29] Yoshua Bengio,et al. Gradient-based learning applied to document recognition , 1998, Proc. IEEE.
[30] David Haussler,et al. Occam's Razor , 1987, Inf. Process. Lett..
[31] Yixian Yang,et al. Building an Effective Intrusion Detection System Using the Modified Density Peak Clustering Algorithm and Deep Belief Networks , 2019, Applied Sciences.
[32] Kehe Wu,et al. A Novel Intrusion Detection Model for a Massive Network Using Convolutional Neural Networks , 2018, IEEE Access.
[33] Rob Fergus,et al. Visualizing and Understanding Convolutional Networks , 2013, ECCV.
[34] Guang Yang,et al. SaliencyGAN: Deep Learning Semisupervised Salient Object Detection in the Fog of IoT , 2020, IEEE Transactions on Industrial Informatics.
[35] Huafeng Liu,et al. Direct delineation of myocardial infarction without contrast agents using a joint motion feature learning architecture , 2018, Medical Image Anal..
[36] Muhammad Munwar Iqbal,et al. Enhanced Network Anomaly Detection Based on Deep Neural Networks , 2018, IEEE Access.
[37] Michael R. Moore,et al. Anomaly Detection of Cyber Physical Network Data Using 2D Images , 2019, 2019 IEEE International Conference on Consumer Electronics (ICCE).
[38] Jürgen Schmidhuber,et al. Long Short-Term Memory , 1997, Neural Computation.