Related references
Note: Only part of the references are listed.CNN Explainer: Learning Convolutional Neural Networks with Interactive Visualization
Zijie J. Wang et al.
IEEE TRANSACTIONS ON VISUALIZATION AND COMPUTER GRAPHICS (2021)
Reinforcement Learning Based PHY Authentication for VANETs
Xiaozhen Lu et al.
IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY (2020)
Semi-Supervised Speech Emotion Recognition With Ladder Networks
Srinivas Parthasarathy et al.
IEEE-ACM TRANSACTIONS ON AUDIO SPEECH AND LANGUAGE PROCESSING (2020)
Finger Vein Verification Algorithm Based on Fully Convolutional Neural Network and Conditional Random Field
Junying Zeng et al.
IEEE ACCESS (2020)
A systematic literature review of blockchain cyber security
Paul J. Taylor et al.
DIGITAL COMMUNICATIONS AND NETWORKS (2020)
Securing Deep Learning Based Edge Finger Vein Biometrics With Binary Decision Diagram
Wencheng Yang et al.
IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS (2019)
被撤回的出版物: Application of combined kernel function artificial intelligence algorithm in mobile communication network security authentication mechanism (Retracted article. See OCT, 2022)
Zhongru Wang et al.
JOURNAL OF SUPERCOMPUTING (2019)
One Pixel Attack for Fooling Deep Neural Networks
Jiawei Su et al.
IEEE TRANSACTIONS ON EVOLUTIONARY COMPUTATION (2019)
Internet of Things (IoT) Cybersecurity Research: A Review of Current Research Topics
Yang Lu et al.
IEEE INTERNET OF THINGS JOURNAL (2019)
Adaptive Learning Gabor Filter for Finger-Vein Recognition
Yakun Zhang et al.
IEEE ACCESS (2019)
Speech Emotion Recognition Based on Deep Learning and Kernel Nonlinear PSVM
Han Zhiyan et al.
PROCEEDINGS OF THE 2019 31ST CHINESE CONTROL AND DECISION CONFERENCE (CCDC 2019) (2019)
Hybrid Intrusion Detection System Using Machine Learning Techniques in Cloud Computing Environments
Ibraheem Aljamal et al.
2019 IEEE/ACIS 17TH INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING RESEARCH, MANAGEMENT AND APPLICATIONS (SERA) (2019)
Research on Information Security Situation Awareness System Based on Big Data and Artificial Intelligence Technology
Bao Hongrui et al.
2019 INTERNATIONAL CONFERENCE ON ROBOTS & INTELLIGENT SYSTEM (ICRIS 2019) (2019)
Securing Malware Cognitive Systems against Adversarial Attacks
Yuede Ti et al.
2019 IEEE INTERNATIONAL CONFERENCE ON COGNITIVE COMPUTING (IEEE ICCC 2019) (2019)
End to End Fingerprint Verification Based on Convolutional Neural Network
Behnam Bakhshi et al.
2019 27TH IRANIAN CONFERENCE ON ELECTRICAL ENGINEERING (ICEE 2019) (2019)
C4.5 Decision Tree against Neural Network on Gait Phase Recognition for Lower Limp Exoskeleton
Akamin Thongsook et al.
2019 FIRST INTERNATIONAL SYMPOSIUM ON INSTRUMENTATION, CONTROL, ARTIFICIAL INTELLIGENCE, AND ROBOTICS (ICA-SYMP 2019) (2019)
PCCN: Parallel Cross Convolutional Neural Network for Abnormal Network Traffic Flows Detection in Multi-Class Imbalanced Network Traffic Flows
Yong Zhang et al.
IEEE ACCESS (2019)
A Robust Iris Segmentation Scheme Based on Improved U-Net
Wei Zhang et al.
IEEE ACCESS (2019)
Study on network security situation awareness based on particle swarm optimization algorithm
Zhao Dongmei et al.
COMPUTERS & INDUSTRIAL ENGINEERING (2018)
Trunk-Branch Ensemble Convolutional Neural Networks for Video-Based Face Recognition
Changxing Ding et al.
IEEE TRANSACTIONS ON PATTERN ANALYSIS AND MACHINE INTELLIGENCE (2018)
A Self-Adaptive Deep Learning-Based System for Anomaly Detection in 5G Networks
Lorenzo Fernandez Maimo et al.
IEEE ACCESS (2018)
Distributed Abnormal Behavior Detection Approach Based on Deep Belief Network and Ensemble SVM Using Spark
Naila Marir et al.
IEEE ACCESS (2018)
Fast Abnormal Identification for Large Scale Internet Traffic
Lingjing Kong et al.
ICCNS 2018: PROCEEDINGS OF THE 8TH INTERNATIONAL CONFERENCE ON COMMUNICATION AND NETWORK SECURITY (2018)
Convolutional Neural Network-Based Finger-Vein Recognition Using NIR Image Sensors
Hyung Gil Hong et al.
SENSORS (2017)
DeepDefense: Identifying DDoS Attack via Deep Learning
Xiaoyong Yuan et al.
2017 IEEE INTERNATIONAL CONFERENCE ON SMART COMPUTING (SMARTCOMP) (2017)
Anomaly Detection System in Cloud Environment Using Fuzzy Clustering Based ANN
N. Pandeeswari et al.
MOBILE NETWORKS & APPLICATIONS (2016)
A survey of network anomaly detection techniques
Mohiuddin Ahmed et al.
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS (2016)
BRAIN: BehavioR based Adaptive Intrusion detection in Networks: Using Hardware Performance Counters to detect DDoS Attacks
Vinayaka Jyothi et al.
2016 29TH INTERNATIONAL CONFERENCE ON VLSI DESIGN AND 2016 15TH INTERNATIONAL CONFERENCE ON EMBEDDED SYSTEMS (VLSID) (2016)
AI2: Training a big data machine to defend
Kalyan Veeramachaneni et al.
2016 IEEE 2ND INTERNATIONAL CONFERENCE ON BIG DATA SECURITY ON CLOUD (BIGDATASECURITY), IEEE INTERNATIONAL CONFERENCE ON HIGH PERFORMANCE AND SMART COMPUTING (HPSC), AND IEEE INTERNATIONAL CONFERENCE ON INTELLIGENT DATA AND SECURITY (IDS) (2016)
Biometric Authentication by Keystroke Dynamics for Remote Evaluation with One-Class Classification
Chuan Chang et al.
ADVANCES IN ARTIFICIAL INTELLIGENCE, AI 2016 (2016)
A Survey on Human-in-the-Loop Applications Towards an Internet of All
David Sousa Nunes et al.
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS (2015)
An intelligent situation awareness support system for safety-critical environments
Mohsen Naderpour et al.
DECISION SUPPORT SYSTEMS (2014)
Use of Kernel Functions in Artificial Immune Systems for the Nonlinear Classification Problems
Seral Ozsen et al.
IEEE TRANSACTIONS ON INFORMATION TECHNOLOGY IN BIOMEDICINE (2009)