4.6 Article

A Hybrid Spectral Clustering and Deep Neural Network Ensemble Algorithm for Intrusion Detection in Sensor Networks

Related references

Note: Only part of the references are listed.
Article Computer Science, Artificial Intelligence

A novel SVM-kNN-PSO ensemble method for intrusion detection system

Abdulla Amin Aburomman et al.

APPLIED SOFT COMPUTING (2016)

Article Green & Sustainable Science & Technology

Transfer learning for short-term wind speed prediction with deep neural networks

Qinghua Hu et al.

RENEWABLE ENERGY (2016)

Article Multidisciplinary Sciences

Intrusion Detection System Using Deep Neural Network for In-Vehicle Network Security

Min-Joo Kang et al.

PLOS ONE (2016)

Article Computer Science, Artificial Intelligence

CANN: An intrusion detection system based on combining cluster centers and nearest neighbors

Wei-Chao Lin et al.

KNOWLEDGE-BASED SYSTEMS (2015)

Review Computer Science, Artificial Intelligence

Deep learning in neural networks: An overview

Juergen Schmidhuber

NEURAL NETWORKS (2015)

Article Computer Science, Artificial Intelligence

A fuzzy anomaly detection system based on hybrid PSO-Kmeans algorithm in content-centric networks

Amin Karami et al.

NEUROCOMPUTING (2015)

Review Computer Science, Artificial Intelligence

Representation Learning: A Review and New Perspectives

Yoshua Bengio et al.

IEEE TRANSACTIONS ON PATTERN ANALYSIS AND MACHINE INTELLIGENCE (2013)

Article Computer Science, Artificial Intelligence

Network anomaly detection with the restricted Boltzmann machine

Ugo Fiore et al.

NEUROCOMPUTING (2013)

Article Computer Science, Artificial Intelligence

A network intrusion detection system based on a Hidden Naive Bayes multiclass classifier

Levent Koc et al.

EXPERT SYSTEMS WITH APPLICATIONS (2012)

Article Engineering, Electrical & Electronic

Deep Neural Networks for Acoustic Modeling in Speech Recognition

Geoffrey Hinton et al.

IEEE SIGNAL PROCESSING MAGAZINE (2012)

Article Acoustics

Context-Dependent Pre-Trained Deep Neural Networks for Large-Vocabulary Speech Recognition

George E. Dahl et al.

IEEE TRANSACTIONS ON AUDIO SPEECH AND LANGUAGE PROCESSING (2012)

Article Computer Science, Artificial Intelligence

Incremental SVM based on reserved set for network intrusion detection

Yang Yi et al.

EXPERT SYSTEMS WITH APPLICATIONS (2011)

Article Engineering, Electrical & Electronic

Energy Efficient Security Algorithm for Power Grid Wide Area Monitoring System

Meikang Qiu et al.

IEEE TRANSACTIONS ON SMART GRID (2011)

Article Computer Science, Artificial Intelligence

A new approach to intrusion detection using Artificial Neural Networks and fuzzy clustering

Gang Wang et al.

EXPERT SYSTEMS WITH APPLICATIONS (2010)

Review Computer Science, Artificial Intelligence

Intrusion detection by machine learning: A review

Chih-Fong Tsai et al.

EXPERT SYSTEMS WITH APPLICATIONS (2009)

Article Computer Science, Artificial Intelligence

Random-forests-based network intrusion detection systems

Jiong Zhang et al.

IEEE TRANSACTIONS ON SYSTEMS MAN AND CYBERNETICS PART C-APPLICATIONS AND REVIEWS (2008)

Article Computer Science, Theory & Methods

A tutorial on spectral clustering

Ulrike von Luxburg

STATISTICS AND COMPUTING (2007)

Article Automation & Control Systems

A hierarchical SOM-based intrusion detection system

H. Gunes Kayacik et al.

ENGINEERING APPLICATIONS OF ARTIFICIAL INTELLIGENCE (2007)

Article Multidisciplinary Sciences

Reducing the dimensionality of data with neural networks

G. E. Hinton et al.

SCIENCE (2006)

Article Computer Science, Artificial Intelligence

A fast learning algorithm for deep belief nets

Geoffrey E. Hinton et al.

NEURAL COMPUTATION (2006)

Article Computer Science, Artificial Intelligence

An introduction to ROC analysis

Tom Fawcett

PATTERN RECOGNITION LETTERS (2006)

Article Computer Science, Information Systems

Network security basics

GA Marin

IEEE SECURITY & PRIVACY (2005)

Article Computer Science, Interdisciplinary Applications

Application of SVM and ANN for intrusion detection

WH Chen et al.

COMPUTERS & OPERATIONS RESEARCH (2005)

Article Computer Science, Information Systems

Intrusion detection techniques for mobile wireless networks

YG Zhang et al.

WIRELESS NETWORKS (2003)

Article Engineering, Electrical & Electronic

Network intrusion and fault detection: A statistical anomaly approach

C Manikopoulos et al.

IEEE COMMUNICATIONS MAGAZINE (2002)

Article Computer Science, Artificial Intelligence

Normalized cuts and image segmentation

JB Shi et al.

IEEE TRANSACTIONS ON PATTERN ANALYSIS AND MACHINE INTELLIGENCE (2000)