Related references
Note: Only part of the references are listed.Deep Fuzzy Hashing Network for Efficient Image Retrieval
Huimin Lu et al.
IEEE TRANSACTIONS ON FUZZY SYSTEMS (2021)
An Adaptive Encryption-as-a-Service Architecture Based on Fog Computing for Real-Time Substation Communications
Hua Zhang et al.
IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS (2020)
Correlated Features Synthesis and Alignment for Zero-shot Cross-modal Retrieval
Xing Xu et al.
PROCEEDINGS OF THE 43RD INTERNATIONAL ACM SIGIR CONFERENCE ON RESEARCH AND DEVELOPMENT IN INFORMATION RETRIEVAL (SIGIR '20) (2020)
Unsupervised learning approach for network intrusion detection system using autoencoders
Hyunseung Choi et al.
JOURNAL OF SUPERCOMPUTING (2019)
f-AnoGAN: Fast unsupervised anomaly detection with generative adversarial networks
Thomas Schlegl et al.
MEDICAL IMAGE ANALYSIS (2019)
Inverting the Generator of a Generative Adversarial Network
Antonia Creswell et al.
IEEE TRANSACTIONS ON NEURAL NETWORKS AND LEARNING SYSTEMS (2019)
Introducing Deep Learning Self-Adaptive Misuse Network Intrusion Detection Systems
Dimitrios Papamartzivanos et al.
IEEE ACCESS (2019)
Brain Intelligence: Go beyond Artificial Intelligence
Huimin Lu et al.
MOBILE NETWORKS & APPLICATIONS (2018)
Cyber-physical systems and their security issues
Rasim Alguliyev et al.
COMPUTERS IN INDUSTRY (2018)
Deep Learning: The Frontier for Distributed Attack Detection in Fog-to-Things Computing
Abebe Abeshu Diro et al.
IEEE COMMUNICATIONS MAGAZINE (2018)
Deploying Fog Computing in Industrial Internet of Things and Industry 4.0
Mohammad Aazam et al.
IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS (2018)
A survey on security control and attack detection for industrial cyber-physical systems
Derui Ding et al.
NEUROCOMPUTING (2018)
Sample Selected Extreme Learning Machine Based Intrusion Detection in Fog Computing and MEC
Xingshuo An et al.
WIRELESS COMMUNICATIONS & MOBILE COMPUTING (2018)
Virtual Fog: A Virtualization Enabled Fog Computing Framework for Internet of Things
Jianhua Li et al.
IEEE INTERNET OF THINGS JOURNAL (2018)
On Reducing IoT Service Delay via Fog Offloading
Ashkan Yousefpour et al.
IEEE INTERNET OF THINGS JOURNAL (2018)
Adversarially Learned Anomaly Detection
Houssam Zenati et al.
2018 IEEE INTERNATIONAL CONFERENCE ON DATA MINING (ICDM) (2018)
A Deep Learning Approach to Network Intrusion Detection
Nathan Shone et al.
IEEE TRANSACTIONS ON EMERGING TOPICS IN COMPUTATIONAL INTELLIGENCE (2018)
A survey of intrusion detection in Internet of Things
Bruno Bogaz Zarpelao et al.
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS (2017)
Optimal Load Distribution for the Detection of VM-based DDoS Attacks in the Cloud
Omar Abdel Wahab et al.
IEEE Transactions on Services Computing (2017)
Security and Privacy Preservation Scheme of Face Identification and Resolution Framework Using Fog Computing in Internet of Things
Pengfei Hu et al.
IEEE INTERNET OF THINGS JOURNAL (2017)
Anomaly Detection in Cyber Physical Systems using Recurrent Neural Networks
Jonathan Goh et al.
2017 IEEE 18TH INTERNATIONAL SYMPOSIUM ON HIGH ASSURANCE SYSTEMS ENGINEERING (HASE 2017) (2017)
A Survey of Intrusion Detection Techniques for Cyber-Physical Systems
Robert Mitchell et al.
ACM COMPUTING SURVEYS (2014)
A model-based fault detection and diagnostic methodology based on PCA method and wavelet transform
Shun Li et al.
ENERGY AND BUILDINGS (2014)
Intrusion Detection in Cyber-Physical Systems: Techniques and Challenges
Song Han et al.
IEEE SYSTEMS JOURNAL (2014)
Reputation-Based Cooperative Detection Model of Selfish Nodes in Cluster-Based QoS-OLSR Protocol
Nadia Moati et al.
WIRELESS PERSONAL COMMUNICATIONS (2014)
A High-level Aspect-oriented-based Framework for Software Security Hardening
Azzam Mourad et al.
INFORMATION SECURITY JOURNAL (2008)