[1] |
YIN Chuanlong, ZHU Yuefei, FEI Jinlong, et al.A Deep Learning Approach for Intrusion Detection Using Recurrent Neural Networks[J]. IEEE Access, 2017(5): 21954-21961.
|
[2] |
LI Zhipeng, QIN Zheng, HUANG Kai, et al.Intrusion Detection Using Convolutional Neural Networks for Representation Learning[C]//Springer. International Conference on Neural Information Processing, November 14-18, 2017, Guangzhou, China. Heidelberg: Springer, 2017: 858-866.
|
[3] |
WANG Wei, SHENG Yiqiang, WANG Jinlin, et al.HAST-IDS: Learning Hierarchical Spatial-temporal Features Using Deep Neural Networks to Improve Intrusion Detection[J]. IEEE Access, 2017(6): 1792-1806.
|
[4] |
ZHANG Hongpo, WU C Q, GAO Shan, et al.An Effective Deep Learning Based Scheme for Network Intrusion Detection[C]//IEEE. 24th International Conference on Pattern Recognition(ICPR), Auguest 20-24, 2018, Beijing, China. New Jersey: IEEE, 2018: 682-687.
|
[5] |
AL-QATF M, YU Lasheng, AL-HABIB M, et al.Deep Learning Approach Combining Sparse Autoencoder With SVM for Network Intrusion Detection[J]. IEEE Access, 2018(6): 52843-52856.
|
[6] |
NGUYEN T D, MARCHAL S, MIETTINEN M, et al.DÏoT: A Federated Self-learning Anomaly Detection System for IoT[C]//IEEE. 39th International Conference on Distributed Computing Systems(ICDCS), July 17-10, 2019, Dallas, TX, USA. New Jersey: IEEE, 2019: 756-767.
|
[7] |
AVALLAEE M, BAGHERIE , LU W, et al. NSL-KDD[EB/OL]. , 2018-5-3.
|
[8] |
GAO Yazhi, RONG Wenge, SHEN Yikang, et al.Convolutional Neural Network Based Sentiment Analysis Using Adaboost Combination[C]//IEEE. 2016 International Joint Conference on Neural Networks(IJCNN), July 24-29, 2016, Vancouver, BC, Canada. New Jersey: IEEE, 2016: 1333-1338.
|
[9] |
YU Dingjun, WANG Hanli, CHEN Peiqiu, et al.Mixed Pooling for Convolutional Neural Networks[C]//Springer. International Conference on Rough Sets and Knowledge Technology, October 24-26, 2014, Shanghai, China. Heidelberg: Springer, 2014: 364-375.
|
[10] |
YANG Qiang, LIU Yang, CHEN Tianjian, et al.Federated Machine Learning: Concept and Applications[J]. ACM Transactions on Intelligent Systems and Technology(TIST), 2019, 10(2): 1-19.
|
[11] |
KONEČNÝ J, MCMAHAN H B, YU F X, et al. Federated Learning: Strategies for Improving Communication Efficiency[EB/OL]. , 2019-12-21.
|
[12] |
TAVALLAEE M, BAGHERI E, LU W, et al.A Detailed Analysis of the KDD CUP 99 Data Set[C]//IEEE. 2009 IEEE Symposium on Computational Intelligence for Security and Defense Applications, July 8-10, 2009, Ottawa, ON, Canada. New Jersey: IEEE, 2009: 1-6.
|
[13] |
ZHANG Sicong, XIE Xiaoyao, XU Yang.Intrusion Detection Method Based on a Deep Convolutional Neural Network[J]. Journal of Tsinghua University(Science and Technology), 2019, 59(1): 46-54.
|
|
张思聪,谢晓尧,徐洋. 基于dCNN的入侵检测方法[J]. 清华大学学报(自然科学版),2019,59(1):46-54.
|
[14] |
LIANG Jie, CHEN Jiahao, ZHANG Xueqin.One-hot Encoding and Convolutional Neural Network Based Anomaly Detection[J]. Journal of Tsinghua University(Science and Technology), 2019, 59(7): 523-529.
|
|
梁杰,陈嘉豪,张雪芹. 基于独热编码和卷积神经网络的异常检测[J]. 清华大学学报(自然科学版),2019,59(7):523-529.
|
[15] |
WU Kehe, CHEN Zuge, LI Wei.A Novel Intrusion Detection Model for a Massive Network Using Convolutional Neural Networks[J]. IEEE Access, 2018(6): 50850-50859.
|
[16] |
VINAYAKUMAR R, SOMAN K P, POORNACHANDRAN P.Applying Convolutional Neural Network for Network Intrusion Detection[C]//IEEE. 2017 International Conference on Advances in Computing, Communications and Informatics, September 13-16, 2017, Udupi, India. New Jersey: IEEE, 2017: 1222-1228.
|
[17] |
KWON D, NATARAJAN K, SUH S C, et al.An Empirical Study on Network Anomaly Detection Using Convolutional Neural Networks[C]//IEEE. 2018 IEEE 38th International Conference on Distributed Computing Systems, July 2-6, Vienna, Austria. New Jersey: IEEE, 2018: 1595-1598.
|
[18] |
CHOONG A C H, LEE N K. Evaluation of Convolutionary Neural Networks Modeling of DNA Sequences Using Ordinal Versus One-hot Encoding Method[C]//IEEE. 2017 International Conference on Computer and Drone Applications, November 9-11, Kuching, Malaysia. New Jersey: IEEE, 2017: 60-65.
|
[19] |
SHONE N, NGOC T N, PHAI V D, et al.A Deep Learning Approach to Network Intrusion Detection[J]. IEEE Transactions on Emerging Topics in Computational Intelligence, 2018, 2(1): 41-50.
|