4.6 Article

Intrusion detection based on improved density peak clustering for imbalanced data on sensor-cloud systems

相关参考文献

注意:仅列出部分参考文献,下载原文获取全部文献信息。
Article Computer Science, Artificial Intelligence

Mobile edge-enabled trust evaluation for the Internet of Things

Tian Wang et al.

Summary: This paper presents a novel trust evaluation model based on trust transitivity assisted by mobile edge nodes to ensure the reliability of nodes in the Internet of Things and prevent malicious attacks. The model measures trust degrees of different trust chains and collects trust information of sensor nodes using an improved Dijkstra's algorithm. Experimental results show that the trust model based on mobile edge nodes can evaluate sensor nodes more precisely and enhance security in the Internet of Things.

INFORMATION FUSION (2021)

Article Computer Science, Artificial Intelligence

Clustering with Local Density Peaks-Based Minimum Spanning Tree

Dongdong Cheng et al.

Summary: The paper introduces a novel MST-based clustering algorithm LDP-MST, which utilizes local density peaks and a new distance measurement method to effectively discover clusters with complex structures. The experimental results demonstrate that the proposed algorithm is competitive with state-of-the-art methods in cluster discovery.

IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING (2021)

Article Computer Science, Hardware & Architecture

Movement-Based Solutions to Energy Limitation in Wireless Sensor Networks: State of the Art and Future Trends

Xuxun Liu et al.

Summary: This article discusses the energy limitation problem in wireless sensor networks and reviews movement-based solutions as an efficient approach. It analyzes the performance criteria of mobile WSNs and classifies solutions into mobile data collection and mobile energy provision categories. The article describes representative movement solutions and compares them based on proposed taxonomy, while also identifying open issues for further exploration.

IEEE NETWORK (2021)

Article Computer Science, Artificial Intelligence

Flexible Auto-Weighted Local-Coordinate Concept Factorization: A Robust Framework for Unsupervised Clustering

Zhao Zhang et al.

Summary: The study introduces a novel unsupervised Robust Flexible Auto-weighted Local-coordinate Concept Factorization (RFA-LCF) framework for clustering high-dimensional data. By integrating various techniques to improve representation ability, enhance robustness to noise and errors, and optimize locality, RFA-LCF achieves state-of-the-art clustering results on public databases compared to other related methods.

IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING (2021)

Article Computer Science, Hardware & Architecture

EIHDP: Edge-Intelligent Hierarchical Dynamic Pricing Based on Cloud-Edge-Client Collaboration for IoT Systems

Tian Wang et al.

Summary: IoT systems can better satisfy user service requirements by effectively utilizing edge computing resources. Designing an appropriate pricing scheme is critical for both users and service providers. The proposed edge-intelligent dynamic pricing mechanism based on cloud-edge-client collaboration improves service quality for users and achieves maximum benefit for service providers, especially in IoT applications with multiple competing edge service providers.

IEEE TRANSACTIONS ON COMPUTERS (2021)

Article Computer Science, Artificial Intelligence

Clustering With Outlier Removal

Hongfu Liu et al.

Summary: Cluster analysis and outlier detection are closely related topics in data mining. The COR algorithm proposed in this article transforms the original space into a binary space through basic partitions and uses Holoentropy to measure cluster compactness. By introducing an auxiliary binary matrix, COR efficiently solves the joint cluster analysis and outlier detection problem through a unified K-means algorithm.

IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING (2021)

Article Automation & Control Systems

KNN-BLOCK DBSCAN: Fast Clustering for Large-Scale Data

Yewang Chen et al.

Summary: This article proposes a fast approximate DBSCAN algorithm, KNN-BLOCK DBSCAN, based on kNN problem, which detects core-blocks, noncore-blocks, and noise-blocks, and merges CBs while assigning noncore points to proper clusters for efficient data clustering.

IEEE TRANSACTIONS ON SYSTEMS MAN CYBERNETICS-SYSTEMS (2021)

Article Engineering, Electrical & Electronic

Reconstruction Bias U-Net for Road Extraction From Optical Remote Sensing Images

Ziyi Chen et al.

Summary: Automatic road extraction from remote sensing images is crucial for navigation, intelligent transportation, and road network updates, but there is a lack of standard and large dataset. This article introduces a new dataset LRSNY and a reconstruction bias U-Net model, which has been proven to outperform other state-of-the-art segmentation models in road extraction.

IEEE JOURNAL OF SELECTED TOPICS IN APPLIED EARTH OBSERVATIONS AND REMOTE SENSING (2021)

Article Automation & Control Systems

An Industrial Network Intrusion Detection Algorithm Based on Multifeature Data Clustering Optimization Model

Wei Liang et al.

IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS (2020)

Article Computer Science, Artificial Intelligence

Partition level multiview subspace clustering

Zhao Kang et al.

NEURAL NETWORKS (2020)

Article Computer Science, Artificial Intelligence

Ultra-Scalable Spectral Clustering and Ensemble Clustering

Dong Huang et al.

IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING (2020)

Article Engineering, Civil

Corse-to-Fine Road Extraction Based on Local Dirichlet Mixture Models and Multiscale-High-Order Deep Learning

Ziyi Chen et al.

IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS (2020)

Article Computer Science, Information Systems

An Improved DBSCAN Algorithm Based on the Neighbor Similarity and Fast Nearest Neighbor Query

Shan-Shan Li

IEEE ACCESS (2020)

Article Computer Science, Artificial Intelligence

Low-rank kernel learning for graph-based clustering

Zhao Kang et al.

KNOWLEDGE-BASED SYSTEMS (2019)

Article Computer Science, Hardware & Architecture

Fuzzy pattern tree for edge malware detection and categorization in IoT

Ensieh Modiri Dovom et al.

JOURNAL OF SYSTEMS ARCHITECTURE (2019)

Article Computer Science, Artificial Intelligence

A self-training method based on density peaks and an extended parameter-free local noise filter for k nearest neighbor

Junnan Li et al.

KNOWLEDGE-BASED SYSTEMS (2019)

Article Mathematics, Interdisciplinary Applications

Nearest neighbors based density peaks approach to intrusion detection

Lixiang Li et al.

CHAOS SOLITONS & FRACTALS (2018)

Article Health Care Sciences & Services

Fast clustering using adaptive density peak detection

Xiao-Feng Wang et al.

STATISTICAL METHODS IN MEDICAL RESEARCH (2017)

Article Computer Science, Artificial Intelligence

A novel clustering-based image segmentation via density peaks algorithm with mid-level feature

Yong Shi et al.

NEURAL COMPUTING & APPLICATIONS (2017)

Article Computer Science, Artificial Intelligence

A novel outlier cluster detection algorithm without top-n parameter

Jinlong Huang et al.

KNOWLEDGE-BASED SYSTEMS (2017)

Article Computer Science, Artificial Intelligence

Adaptive density peak clustering based on K-nearest neighbors with aggregating strategy

Liu Yaohui et al.

KNOWLEDGE-BASED SYSTEMS (2017)

Article Computer Science, Artificial Intelligence

A novel SVM-kNN-PSO ensemble method for intrusion detection system

Abdulla Amin Aburomman et al.

APPLIED SOFT COMPUTING (2016)

Article Computer Science, Artificial Intelligence

High-dimensional and large-scale anomaly detection using a linear one-class SVM with deep learning

Sarah M. Erfani et al.

PATTERN RECOGNITION (2016)

Article Computer Science, Artificial Intelligence

Delta-density based clustering with a divide-and-conquer strategy: 3DC clustering

Zhou Liang et al.

PATTERN RECOGNITION LETTERS (2016)

Article Computer Science, Artificial Intelligence

CANN: An intrusion detection system based on combining cluster centers and nearest neighbors

Wei-Chao Lin et al.

KNOWLEDGE-BASED SYSTEMS (2015)

Article Multidisciplinary Sciences

Clustering by fast search and find of density peaks

Alex Rodriguez et al.

SCIENCE (2014)

Article Computer Science, Artificial Intelligence

Anomaly intrusion detection based on PLS feature extraction and core vector machine

Gan Xu-sheng et al.

KNOWLEDGE-BASED SYSTEMS (2013)

Article Computer Science, Information Systems

Toward developing a systematic approach to generate benchmark datasets for intrusion detection

Ali Shiravi et al.

COMPUTERS & SECURITY (2012)

Article Computer Science, Information Systems

Minimum spanning tree based split-and-merge: A hierarchical clustering method

Caiming Zhong et al.

INFORMATION SCIENCES (2011)

Article Computer Science, Artificial Intelligence

A triangle area based nearest neighbors approach to intrusion detection

Chih-Fong Tsai et al.

PATTERN RECOGNITION (2010)

Article Computer Science, Artificial Intelligence

Unsupervised feature selection using feature similarity

P Mitra et al.

IEEE TRANSACTIONS ON PATTERN ANALYSIS AND MACHINE INTELLIGENCE (2002)

Article Computer Science, Information Systems

LOF: Identifying density-based local outliers

MM Breunig et al.

SIGMOD RECORD (2000)