4.6 Article

A Feedback Semi-Supervised Learning With Meta-Gradient for Intrusion Detection

Related references

Note: Only part of the references are listed.
Article Computer Science, Artificial Intelligence

A Hybrid parallel deep learning model for efficient intrusion detection based on metric learning

Shaokang Cai et al.

Summary: This paper proposes an efficient hybrid parallel deep learning model (HPM) for intrusion detection, which improves the accuracy of classifying malicious network traffic by constructing parallel CNN architectures and parsing temporal information of the fused features. Additionally, an improved traffic feature extraction method is proposed to reduce redundant features and accelerate network convergence. Experimental results demonstrate that the HPM achieves a detection accuracy of 99% for each malicious class, with a 5%-10% improvement compared to other models.

CONNECTION SCIENCE (2022)

Article Computer Science, Hardware & Architecture

A Traceable and Revocable Ciphertext-Policy Attribute-based Encryption Scheme Based on Privacy Protection

Dezhi Han et al.

Summary: The proposed CP-ABE scheme in this article achieves revocation, white-box traceability, and the application of hidden policy. The ciphertext is composed of two parts: the access policy encrypted by attribute value and the revocation information related to a binary tree. The scheme is proven to be IND-CPA secure, efficient, and promising in the standard model.

IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING (2022)

Article Automation & Control Systems

A Blockchain-Based Auditable Access Control System for Private Data in Service-Centric IoT Environments

Dezhi Han et al.

Summary: This article proposes an auditable access control model based on attribute-based access control for managing private data's access control policy in IoT environments. A blockchain-based auditable access control system is also introduced to ensure data security and auditable access in IoT environments. Experimental results demonstrate high throughput and data security for real application scenarios.

IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS (2022)

Article Computer Science, Information Systems

A Privacy-Preserving Storage Scheme for Logistics Data With Assistance of Blockchain

Hongzhi Li et al.

Summary: In this study, a blockchain-assisted secure storage scheme is proposed for logistics data protection. The scheme utilizes a blockchain network to provide reliable storage interfaces and introduces an efficient consensus mechanism to improve the efficiency of the consensus process. Experimental results indicate that the performance of the scheme is acceptable.

IEEE INTERNET OF THINGS JOURNAL (2022)

Article Computer Science, Theory & Methods

GAN augmentation to deal with imbalance in imaging-based intrusion detection

Giuseppina Andresini et al.

Summary: This paper presents a deep learning methodology for binary classification of network traffic by representing network flows as 2D images and using Generative Adversarial Networks (GAN) and Convolutional Neural Networks (CNN). The GAN is trained to generate new images of unforeseen network attacks to augment training data for a CNN-based intrusion detection model, leading to better predictive accuracy.

FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE (2021)

Article Computer Science, Information Systems

A Mobile Malware Detection Method Based on Malicious Subgraphs Mining

Yao Du et al.

Summary: This paper proposes a new Android malware identification approach based on malicious subgraph mining to improve the detection performance of large-scale graph structure analysis. By generating malicious subgraphs and putting them into the feature set, automatic identification and classification of malware can be achieved.

SECURITY AND COMMUNICATION NETWORKS (2021)

Article Computer Science, Information Systems

A Privacy-Preserving Charging Scheme for Electric Vehicles Using Blockchain and Fog Computing

Hongzhi Li et al.

Summary: This article proposes a decentralized and privacy-preserving charging scheme for EVs based on blockchain and fog computing to address the privacy issues of EVs charging systems. The scheme introduces fog computing to provide local computing services and employs a flexible consortium blockchain architecture to ensure privacy security during the charging process.

IEEE SYSTEMS JOURNAL (2021)

Article Computer Science, Information Systems

Al-SPSD: Anti-leakage smart Ponzi schemes detection in blockchain

Shuhui Fan et al.

Summary: Blockchain provides a decentralized environment for applications and information systems in various fields, but without proper regulation, it can become a breeding ground for criminal activities such as Ponzi schemes. Machine learning techniques are being used to automatically detect smart Ponzi schemes in order to maintain security, but existing methods may have leakage and overfitting issues. A new method, Al-SPSD, has been proposed in this paper to address these challenges and has shown to outperform competitive methods in detecting smart Ponzi schemes in Ethereum.

INFORMATION PROCESSING & MANAGEMENT (2021)

Proceedings Paper Computer Science, Artificial Intelligence

ELITE: Robust Deep Anomaly Detection with Meta Gradient

Huayi Zhang et al.

Summary: The paper introduces a novel deep learning approach ELITE for anomaly detection that utilizes a small number of labeled anomalies to infer hidden anomalies in the training data and improve anomaly detection performance. Unlike traditional methods, ELITE uses labeled examples as a validation set and leverages the gradient of validation loss to predict anomalies.

KDD '21: PROCEEDINGS OF THE 27TH ACM SIGKDD CONFERENCE ON KNOWLEDGE DISCOVERY & DATA MINING (2021)

Article Computer Science, Artificial Intelligence

An overview of data fusion techniques for Internet of Things enabled physical activity recognition and measure

Jun Qi et al.

INFORMATION FUSION (2020)

Article Computer Science, Hardware & Architecture

Design of multi-view based email classification for IoT systems via semi-supervised learning

Wenjuan Li et al.

JOURNAL OF NETWORK AND COMPUTER APPLICATIONS (2019)

Article Computer Science, Information Systems

Semi-supervised tri-Adaboost algorithm for network intrusion detection

Yali Yuan et al.

INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS (2019)

Article Computer Science, Information Systems

Semi-Supervised K-Means DDoS Detection Method Using Hybrid Feature Selection Algorithm

Yonghao Gu et al.

IEEE ACCESS (2019)

Article Computer Science, Artificial Intelligence

A Review on Bilevel Optimization: From Classical to Evolutionary Approaches and Applications

Ankur Sinha et al.

IEEE TRANSACTIONS ON EVOLUTIONARY COMPUTATION (2018)

Article Computer Science, Information Systems

MVPSys: Toward practical multi-view based false alarm reduction system in network intrusion detection

Wenjuan Li et al.

COMPUTERS & SECURITY (2016)

Article Computer Science, Artificial Intelligence

Maximum margin semi-supervised learning with irrelevant data

Haiqin Yang et al.

NEURAL NETWORKS (2015)

Article Computer Science, Information Systems

Effective semi-supervised approach towards intrusion detection system using machine learning techniques

Sharmila Kishor Wagh et al.

INTERNATIONAL JOURNAL OF ELECTRONIC SECURITY AND DIGITAL FORENSICS (2015)

Article Computer Science, Information Systems

Toward developing a systematic approach to generate benchmark datasets for intrusion detection

Ali Shiravi et al.

COMPUTERS & SECURITY (2012)

Article

Semi-Supervised Learning (Chapelle, O. et al., Eds.; 2006) [Book reviews]

O. Chapelle et al.

IEEE TRANSACTIONS ON NEURAL NETWORKS (2009)