4.5 Article

Differential evolution-based convolutional neural networks: An automatic architecture design method for intrusion detection in industrial control systems

Related references

Note: Only part of the references are listed.
Article Computer Science, Artificial Intelligence

Smart city infrastructure protection: real-time threat detection employing online reservoir computing architecture

Lili Gao et al.

Summary: The key challenges in extracting knowledge from data streams are related to the characteristics of BigData, such as high information flow speed, diverse forms, data variability, and a variety of information accuracy diagnosis methods. Traditional methods focus on heuristic or logical analysis rules, but struggle with handling new patterns and dynamic characteristics.

NEURAL COMPUTING & APPLICATIONS (2022)

Article Automation & Control Systems

Automated Deep CNN-LSTM Architecture Design for Solar Irradiance Forecasting

Seyed Mohammad Jafar Jalali et al.

Summary: This article introduces a new deep learning-based multistep ahead approach to improve the forecasting performance of global horizontal irradiance. By using deep neural networks and optimization methods, the performance of the prediction model is enhanced, and its superiority is demonstrated in experiments.

IEEE TRANSACTIONS ON SYSTEMS MAN CYBERNETICS-SYSTEMS (2022)

Article Computer Science, Artificial Intelligence

An evolutionary block based network for medical image denoising using Differential Evolution

Chilukamari Rajesh et al.

Summary: The study proposed an automatic network evolution model based on Differential Evolution for optimizing medical image denoising network structures and hyperparameters. By exploring the fittest parameters and accelerating the training process, the model was evaluated on four different medical image datasets.

APPLIED SOFT COMPUTING (2022)

Article Computer Science, Information Systems

CNN based method for the development of cyber-attacks detection algorithms in industrial control systems

Dusan Nedeljkovic et al.

Summary: This study proposes a method for designing algorithms to detect cyber-attacks on communication links between smart devices in Industrial Control Systems (ICS). The method utilizes Convolutional Neural Networks (CNN) and is capable of autonomously selecting suitable parameters for online intrusion detection. Experimental verification is conducted using two case studies.

COMPUTERS & SECURITY (2022)

Article Computer Science, Artificial Intelligence

Intrusion detection using multi-objective evolutionary convolutional neural network for Internet of Things in Fog computing

Yi Chen et al.

Summary: With the rapid development of the IoT, network security becomes a major challenge. This paper proposes a multi-objective evolutionary convolutional neural network for intrusion detection system, which runs on fog nodes to achieve low-latency and high-accuracy intrusion detection. Experimental studies demonstrate that the proposed system outperforms other state-of-the-art IDSs in terms of detection performance and robustness.

KNOWLEDGE-BASED SYSTEMS (2022)

Article Computer Science, Hardware & Architecture

Efficient Cyber Attack Detection in Industrial Control Systems Using Lightweight Neural Networks and PCA

Moshe Kravchik et al.

Summary: This article presents a method for detecting attacks on industrial control systems (ICSs) using simple and lightweight neural networks. The method utilizes 1D convolutional neural networks and autoencoders to analyze data in both the time and frequency domains, and discusses the advantages and disadvantages of each representation approach. Experimental results show that the proposed method achieves high detection rates and is robust against adversarial attacks.

IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING (2022)

Article Computer Science, Artificial Intelligence

Designing optimal convolutional neural network architecture using differential evolution algorithm

Arjun Ghosh et al.

Summary: Convolutional neural networks (CNNs) are widely used deep learning models for tasks like computer vision and speech recognition. In this study, an improved differential evolution algorithm, IDECNN, is proposed to design CNN layer architectures more efficiently. The IDECNN utilizes variable-length encoding to represent flexible layer architecture and incorporates mutation and crossover to prevent premature convergence. Experimental results demonstrate the effectiveness of IDECNN in generating suitable CNN models.

PATTERNS (2022)

Article Physics, Multidisciplinary

Ensemble Neuroevolution-Based Approach for Multivariate Time Series Anomaly Detection

Kamil Faber et al.

Summary: The research introduces a framework that utilizes neuroevolution methods to enhance anomaly detection models' accuracy. By combining multiple models, each model operating on a subset of data sensors. Neuroevolution aims to optimize model architecture and hyperparameters to improve the anomaly detection performance of deep learning models.

ENTROPY (2021)

Article Computer Science, Artificial Intelligence

AutoML: A survey of the state-of-the-art

Xin He et al.

Summary: Deep learning techniques have achieved remarkable results in various tasks, but building a high-quality DL system requires human expertise. Automated machine learning is a promising solution that is currently being extensively researched.

KNOWLEDGE-BASED SYSTEMS (2021)

Article Automation & Control Systems

Evolutionary Deep Belief Network for Cyber-Attack Detection in Industrial Automation and Control System

Kang-Di Lu et al.

Summary: Industrial automation and control systems (IACS) heavily rely on supervisory control and data acquisition (SCADA) networks, which are vulnerable to cyber-attacks. This article introduces a population extremal optimization (PEO)-based deep belief network detection method (PEO-DBN) to detect cyber-attacks in SCADA-based IACS. Ensemble learning scheme is utilized to improve detection performance, resulting in EnPEO-DBN method. Performance analysis demonstrates the superior results of PEO-DBN and EnPEO-DBN in comparison with existing methods on real datasets from SCADA network traffic.

IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS (2021)

Article Computer Science, Theory & Methods

Deep Learning-based Anomaly Detection in Cyber-physical Systems: Progress and Opportunities

Yuan Luo et al.

Summary: This article reviews the latest DLAD methods in the field of CPS, proposes a classification method to understand the basic characteristics of current methods, and analyzes new features and designs in various CPS domains. It not only discusses the limitations and unresolved issues of these methods, but also experimentally explores the characteristics, workflow, and operational performance of DLAD methods.

ACM COMPUTING SURVEYS (2021)

Article Computer Science, Artificial Intelligence

MODE-CNN: A fast converging multi-objective optimization algorithm for CNN-based models

Ozkan Inik et al.

Summary: Convolutional neural networks (CNNs) have been widely used in computer science for problem-solving, but manual tuning of CNN models remains time-consuming. Researchers have started utilizing optimization algorithms for automatic adjustment of CNN hyper-parameters, with the MODE-CNN algorithm showing competitive performance in parameter optimization.

APPLIED SOFT COMPUTING (2021)

Article Computer Science, Theory & Methods

A Comprehensive Survey of Neural Architecture Search: Challenges and Solutions

Pengzhen Ren et al.

Summary: Neural Architecture Search (NAS) is a revolutionary algorithm aimed at reducing human intervention and allowing algorithms to automatically design neural architectures. The related research work is complex and rich, requiring a comprehensive and systematic survey.

ACM COMPUTING SURVEYS (2021)

Article Computer Science, Information Systems

A Comprehensive Survey of Databases and Deep Learning Methods for Cybersecurity and Intrusion Detection Systems

Dilara Gumusbas et al.

Summary: This survey provides a comprehensive overview of machine learning methods for cybersecurity intrusion detection systems, focusing specifically on recent approaches utilizing deep learning. The review analyzes recent methods in terms of intrusion detection mechanisms, performance results, and limitations, as well as the use of benchmark databases for fair evaluation. Additionally, it includes a detailed investigation of benchmark datasets for cybersecurity. This article aims to guide readers in understanding the potential of DL methods for cybersecurity and intrusion detection systems, while also offering a detailed analysis of benchmark datasets used for training DL models in literature.

IEEE SYSTEMS JOURNAL (2021)

Review Computer Science, Information Systems

Deep Learning in the Industrial Internet of Things: Potentials, Challenges, and Emerging Applications

Ruhul Amin Khalil et al.

Summary: Recent advances in IoT have led to a proliferation of interconnected devices and the use of various smart applications, with the application of deep learning algorithms in IIoT providing various new applications. This article introduces various DL techniques and their applications in different industries, as well as use cases and research challenges in smart manufacturing, smart metering, and smart agriculture in IIoT systems.

IEEE INTERNET OF THINGS JOURNAL (2021)

Article Computer Science, Information Systems

Cascading effects of cyber-attacks on interconnected critical infrastructure

Venkata Reddy Palleti et al.

Summary: Modern critical infrastructure, such as water treatment plants and power grids, are susceptible to cyber-attacks that can lead to cascading effects due to their interdependencies. Research shows that when one of these infrastructures is attacked, the connected systems may also be affected.

CYBERSECURITY (2021)

Article Computer Science, Artificial Intelligence

Deep learning approaches for anomaly-based intrusion detection systems: A survey, taxonomy, and open issues

Arwa Aldweesh et al.

KNOWLEDGE-BASED SYSTEMS (2020)

Article Computer Science, Theory & Methods

A Taxonomy of Supervised Learning for IDSs in SCADA Environments

Jakapan Suaboot et al.

ACM COMPUTING SURVEYS (2020)

Review Automation & Control Systems

Differential Evolution: A review of more than two decades of research

Bilal et al.

ENGINEERING APPLICATIONS OF ARTIFICIAL INTELLIGENCE (2020)

Article Computer Science, Artificial Intelligence

Surrogate-Assisted Evolutionary Deep Learning Using an End-to-End Random Forest-Based Performance Predictor

Yanan Sun et al.

IEEE TRANSACTIONS ON EVOLUTIONARY COMPUTATION (2020)

Article Computer Science, Artificial Intelligence

Evolving Deep Convolutional Neural Networks for Image Classification

Yanan Sun et al.

IEEE TRANSACTIONS ON EVOLUTIONARY COMPUTATION (2020)

Article Computer Science, Artificial Intelligence

Completely Automated CNN Architecture Design Based on Blocks

Yanan Sun et al.

IEEE TRANSACTIONS ON NEURAL NETWORKS AND LEARNING SYSTEMS (2020)

Article Infectious Diseases

Classification of COVID-19 patients from chest CT images using multi-objective differential evolution-based convolutional neural networks

Dilbag Singh et al.

EUROPEAN JOURNAL OF CLINICAL MICROBIOLOGY & INFECTIOUS DISEASES (2020)

Article Computer Science, Information Systems

FALCON: Framework for Anomaly Detection in Industrial Control Systems

Subin Sapkota et al.

ELECTRONICS (2020)

Article Computer Science, Information Systems

Anomaly detection in Industrial Control Systems using Logical Analysis of Data

Tanmoy Kanti Das et al.

COMPUTERS & SECURITY (2020)

Article Geochemistry & Geophysics

Automatic Design of CNNs via Differentiable Neural Architecture Search for PolSAR Image Classification

Hongwei Dong et al.

IEEE TRANSACTIONS ON GEOSCIENCE AND REMOTE SENSING (2020)

Article Computer Science, Theory & Methods

Genetic convolutional neural network for intrusion detection systems

Minh Tuan Nguyen et al.

FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE (2020)

Article Mathematical & Computational Biology

Arabic Sentiment Classification Using Convolutional Neural Network and Differential Evolution Algorithm

Abdelghani Dahou et al.

COMPUTATIONAL INTELLIGENCE AND NEUROSCIENCE (2019)

Article Computer Science, Artificial Intelligence

Multi-head CNN-RNN for multi-time series anomaly detection: An industrial case study

Mikel Canizo et al.

NEUROCOMPUTING (2019)

Article Computer Science, Information Systems

Intrusion Detection for IoT Based on Improved Genetic Algorithm and Deep Belief Network

Ying Zhang et al.

IEEE ACCESS (2019)

Article Computer Science, Artificial Intelligence

Evolutionary convolutional neural networks: An application to handwriting recognition

Alejandro Baldominos et al.

NEUROCOMPUTING (2018)

Article Computer Science, Information Systems

Cascading Impact Assessment in a Critical Infrastructure System

David Rehak et al.

INTERNATIONAL JOURNAL OF CRITICAL INFRASTRUCTURE PROTECTION (2018)

Article Computer Science, Hardware & Architecture

ImageNet Classification with Deep Convolutional Neural Networks

Alex Krizhevsky et al.

COMMUNICATIONS OF THE ACM (2017)

Article Computer Science, Theory & Methods

A Survey of Intrusion Detection Techniques for Cyber-Physical Systems

Robert Mitchell et al.

ACM COMPUTING SURVEYS (2014)

Article Engineering, Industrial

Optimisation of block erection scheduling based on a Petri net and discrete PSO

Zhong Yuguang

INTERNATIONAL JOURNAL OF PRODUCTION RESEARCH (2012)

Article Engineering, Electrical & Electronic

Performance Comparison of GA, DE, PSO and SA Approaches in Enhancement of Total Transfer Capability using FACTS Devices

K. Chandrasekar et al.

JOURNAL OF ELECTRICAL ENGINEERING & TECHNOLOGY (2012)

Article Computer Science, Interdisciplinary Applications

A discrete particle swarm optimization algorithm for the no-wait flowshop scheduling problem

Quan-Ke Pan et al.

COMPUTERS & OPERATIONS RESEARCH (2008)

Article Computer Science, Artificial Intelligence

Toward automatic phenotyping of developing embryos from videos

F Ning et al.

IEEE TRANSACTIONS ON IMAGE PROCESSING (2005)