4.8 Article

Intrusion Detection for Cyber-Physical Systems Using Generative Adversarial Networks in Fog Environment

Related references

Note: Only part of the references are listed.
Article Computer Science, Artificial Intelligence

Deep Fuzzy Hashing Network for Efficient Image Retrieval

Huimin Lu et al.

Summary: Our proposed deep fuzzy hashing network (DFHN) combines fuzzy logic technique and DNN to learn effective binary codes that leverage fuzzy rules to model data uncertainties. The generalized hamming distance derived from fuzzy logic theory is utilized in the convolutional and fully connected layers to model outputs, resulting in competitive retrieval accuracy and efficient training speed on large-scale image datasets: CIFAR-10 and NUS-WIDE, compared to state-of-the-art deep hashing approaches.

IEEE TRANSACTIONS ON FUZZY SYSTEMS (2021)

Article Automation & Control Systems

An Adaptive Encryption-as-a-Service Architecture Based on Fog Computing for Real-Time Substation Communications

Hua Zhang et al.

IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS (2020)

Proceedings Paper Computer Science, Information Systems

Correlated Features Synthesis and Alignment for Zero-shot Cross-modal Retrieval

Xing Xu et al.

PROCEEDINGS OF THE 43RD INTERNATIONAL ACM SIGIR CONFERENCE ON RESEARCH AND DEVELOPMENT IN INFORMATION RETRIEVAL (SIGIR '20) (2020)

Article Computer Science, Hardware & Architecture

Unsupervised learning approach for network intrusion detection system using autoencoders

Hyunseung Choi et al.

JOURNAL OF SUPERCOMPUTING (2019)

Article Computer Science, Artificial Intelligence

f-AnoGAN: Fast unsupervised anomaly detection with generative adversarial networks

Thomas Schlegl et al.

MEDICAL IMAGE ANALYSIS (2019)

Article Computer Science, Artificial Intelligence

Inverting the Generator of a Generative Adversarial Network

Antonia Creswell et al.

IEEE TRANSACTIONS ON NEURAL NETWORKS AND LEARNING SYSTEMS (2019)

Article Computer Science, Information Systems

Introducing Deep Learning Self-Adaptive Misuse Network Intrusion Detection Systems

Dimitrios Papamartzivanos et al.

IEEE ACCESS (2019)

Article Computer Science, Hardware & Architecture

Brain Intelligence: Go beyond Artificial Intelligence

Huimin Lu et al.

MOBILE NETWORKS & APPLICATIONS (2018)

Review Computer Science, Interdisciplinary Applications

Cyber-physical systems and their security issues

Rasim Alguliyev et al.

COMPUTERS IN INDUSTRY (2018)

Article Engineering, Electrical & Electronic

Deep Learning: The Frontier for Distributed Attack Detection in Fog-to-Things Computing

Abebe Abeshu Diro et al.

IEEE COMMUNICATIONS MAGAZINE (2018)

Article Automation & Control Systems

Deploying Fog Computing in Industrial Internet of Things and Industry 4.0

Mohammad Aazam et al.

IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS (2018)

Article Computer Science, Artificial Intelligence

A survey on security control and attack detection for industrial cyber-physical systems

Derui Ding et al.

NEUROCOMPUTING (2018)

Article Computer Science, Information Systems

Sample Selected Extreme Learning Machine Based Intrusion Detection in Fog Computing and MEC

Xingshuo An et al.

WIRELESS COMMUNICATIONS & MOBILE COMPUTING (2018)

Article Computer Science, Information Systems

Virtual Fog: A Virtualization Enabled Fog Computing Framework for Internet of Things

Jianhua Li et al.

IEEE INTERNET OF THINGS JOURNAL (2018)

Article Computer Science, Information Systems

On Reducing IoT Service Delay via Fog Offloading

Ashkan Yousefpour et al.

IEEE INTERNET OF THINGS JOURNAL (2018)

Proceedings Paper Computer Science, Artificial Intelligence

Adversarially Learned Anomaly Detection

Houssam Zenati et al.

2018 IEEE INTERNATIONAL CONFERENCE ON DATA MINING (ICDM) (2018)

Article Computer Science, Artificial Intelligence

A Deep Learning Approach to Network Intrusion Detection

Nathan Shone et al.

IEEE TRANSACTIONS ON EMERGING TOPICS IN COMPUTATIONAL INTELLIGENCE (2018)

Review Computer Science, Hardware & Architecture

A survey of intrusion detection in Internet of Things

Bruno Bogaz Zarpelao et al.

JOURNAL OF NETWORK AND COMPUTER APPLICATIONS (2017)

Article Computer Science, Information Systems

Optimal Load Distribution for the Detection of VM-based DDoS Attacks in the Cloud

Omar Abdel Wahab et al.

IEEE Transactions on Services Computing (2017)

Article Computer Science, Information Systems

Security and Privacy Preservation Scheme of Face Identification and Resolution Framework Using Fog Computing in Internet of Things

Pengfei Hu et al.

IEEE INTERNET OF THINGS JOURNAL (2017)

Proceedings Paper Computer Science, Hardware & Architecture

Anomaly Detection in Cyber Physical Systems using Recurrent Neural Networks

Jonathan Goh et al.

2017 IEEE 18TH INTERNATIONAL SYMPOSIUM ON HIGH ASSURANCE SYSTEMS ENGINEERING (HASE 2017) (2017)

Article Computer Science, Theory & Methods

A Survey of Intrusion Detection Techniques for Cyber-Physical Systems

Robert Mitchell et al.

ACM COMPUTING SURVEYS (2014)

Article Construction & Building Technology

A model-based fault detection and diagnostic methodology based on PCA method and wavelet transform

Shun Li et al.

ENERGY AND BUILDINGS (2014)

Article Computer Science, Information Systems

Intrusion Detection in Cyber-Physical Systems: Techniques and Challenges

Song Han et al.

IEEE SYSTEMS JOURNAL (2014)

Article Telecommunications

Reputation-Based Cooperative Detection Model of Selfish Nodes in Cluster-Based QoS-OLSR Protocol

Nadia Moati et al.

WIRELESS PERSONAL COMMUNICATIONS (2014)

Article Computer Science, Information Systems

A High-level Aspect-oriented-based Framework for Software Security Hardening

Azzam Mourad et al.

INFORMATION SECURITY JOURNAL (2008)