4.7 Article

Deep Reinforcement Learning for Cyber Security

相关参考文献

注意:仅列出部分参考文献,下载原文获取全部文献信息。
Article Computer Science, Artificial Intelligence

Formation Control With Collision Avoidance Through Deep Reinforcement Learning Using Model-Guided Demonstration

Zezhi Sui et al.

Summary: The article proposes a method based on deep reinforcement learning to solve the collision avoidance problem in the leader-follower formation control structure, consisting of two stages: imitation learning and reinforcement learning. A compound reward function and formation-oriented network structure are designed to guide the training process effectively.

IEEE TRANSACTIONS ON NEURAL NETWORKS AND LEARNING SYSTEMS (2021)

Article Computer Science, Artificial Intelligence

Price Trailing for Financial Trading Using Deep Reinforcement Learning

Avraam Tsantekidis et al.

Summary: The article introduces a financial trading method based on deep reinforcement learning, significantly improving the agent's performance through a novel reward shaping approach and data preprocessing techniques.

IEEE TRANSACTIONS ON NEURAL NETWORKS AND LEARNING SYSTEMS (2021)

Article Computer Science, Information Systems

Green Resource Allocation Based on Deep Reinforcement Learning in Content-Centric IoT

Xiaoming He et al.

IEEE TRANSACTIONS ON EMERGING TOPICS IN COMPUTING (2020)

Article Computer Science, Information Systems

Data-driven software defined network attack detection : State-of-the-art and perspectives

Puming Wang et al.

INFORMATION SCIENCES (2020)

Article Automation & Control Systems

Deep reinforcement learning for wireless sensor scheduling in cyber-physical systems

Alex S. Leong et al.

AUTOMATICA (2020)

Article Computer Science, Artificial Intelligence

Application of deep reinforcement learning to intrusion detection for supervised problems

Manuel Lopez-Martin et al.

EXPERT SYSTEMS WITH APPLICATIONS (2020)

Article Computer Science, Information Systems

A hybrid deep learning model for efficient intrusion detection in big data environment

Mohammad Mehedi Hassan et al.

INFORMATION SCIENCES (2020)

Article Computer Science, Hardware & Architecture

An efficient reinforcement learning-based Botnet detection approach

Mohammad Alauthman et al.

JOURNAL OF NETWORK AND COMPUTER APPLICATIONS (2020)

Review Computer Science, Artificial Intelligence

Neuromemristive Circuits for Edge Computing: A Review

Olga Krestinskaya et al.

IEEE TRANSACTIONS ON NEURAL NETWORKS AND LEARNING SYSTEMS (2020)

Article Engineering, Electrical & Electronic

Reinforcement Learning Based PHY Authentication for VANETs

Xiaozhen Lu et al.

IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY (2020)

Article Engineering, Electrical & Electronic

Cyber-Attack Recovery Strategy for Smart Grid Based on Deep Reinforcement Learning

Fanrong Wei et al.

IEEE TRANSACTIONS ON SMART GRID (2020)

Article Engineering, Electrical & Electronic

Self-Tuning Sectorization: Deep Reinforcement Learning Meets Broadcast Beam Optimization

Rubayet Shafin et al.

IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS (2020)

Article Computer Science, Information Systems

A Deep-Reinforcement-Learning-Based Approach to Dynamic eMBB/URLLC Multiplexing in 5G NR

Yan Huang et al.

IEEE INTERNET OF THINGS JOURNAL (2020)

Article Computer Science, Artificial Intelligence

Approximate Policy-Based Accelerated Deep Reinforcement Learning

Xuesong Wang et al.

IEEE TRANSACTIONS ON NEURAL NETWORKS AND LEARNING SYSTEMS (2020)

Review Automation & Control Systems

Deep Reinforcement Learning for Multiagent Systems: A Review of Challenges, Solutions, and Applications

Thanh Thi Nguyen et al.

IEEE TRANSACTIONS ON CYBERNETICS (2020)

Article Computer Science, Information Systems

Deep Reinforcement Learning for Cybersecurity Assessment of Wind Integrated Power Systems

Xiaorui Liu et al.

IEEE ACCESS (2020)

Article Computer Science, Artificial Intelligence

A Learning-Based Solution for an Adversarial Repeated Game in Cyber-Physical Power Systems

Shuva Paul et al.

IEEE TRANSACTIONS ON NEURAL NETWORKS AND LEARNING SYSTEMS (2020)

Article Computer Science, Information Systems

A Systematic State-of-the-Art Analysis of Multi-Agent Intrusion Detection

Imtithal A. Saeed et al.

IEEE ACCESS (2020)

Article Computer Science, Artificial Intelligence

Deep Reinforcement Learning for Sequence-to-Sequence Models

Yaser Keneshloo et al.

IEEE TRANSACTIONS ON NEURAL NETWORKS AND LEARNING SYSTEMS (2020)

Article Engineering, Multidisciplinary

Trust-Based Social Networks with Computing, Caching and Communications: A Deep Reinforcement Learning Approach

Ying He et al.

IEEE TRANSACTIONS ON NETWORK SCIENCE AND ENGINEERING (2020)

Article Computer Science, Artificial Intelligence

Detecting cyber-physical attacks in CyberManufacturing systems with machine learning methods

Mingtao Wu et al.

JOURNAL OF INTELLIGENT MANUFACTURING (2019)

Article Computer Science, Artificial Intelligence

A survey of dynamic spectrum allocation based on reinforcement learning algorithms in cognitive radio networks

Yonghua Wang et al.

ARTIFICIAL INTELLIGENCE REVIEW (2019)

Article Computer Science, Theory & Methods

Secure Identification Under Passive Eavesdroppers and Active Jamming Attacks

Holger Boche et al.

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2019)

Article Engineering, Electrical & Electronic

Evaluation of Reinforcement Learning-Based False Data Injection Attack to Automatic Voltage Control

Ying Chen et al.

IEEE TRANSACTIONS ON SMART GRID (2019)

Article Physics, Multidisciplinary

Long memory is important: A test study on deep-learning based car-following model

Xiao Wang et al.

PHYSICA A-STATISTICAL MECHANICS AND ITS APPLICATIONS (2019)

Article Computer Science, Hardware & Architecture

Zero-Day Signature Extraction for High-Volume Attacks

Yehuda Afek et al.

IEEE-ACM TRANSACTIONS ON NETWORKING (2019)

Article Chemistry, Multidisciplinary

On the Performance of Deep Reinforcement Learning-Based Anti-Jamming Method Confronting Intelligent Jammer

Yangyang Li et al.

APPLIED SCIENCES-BASEL (2019)

Article Computer Science, Hardware & Architecture

Blockchain and Deep Reinforcement Learning Empowered Intelligent 5G Beyond

Yueyue Dai et al.

IEEE NETWORK (2019)

Article Computer Science, Hardware & Architecture

Adversarial environment reinforcement learning algorithm for intrusion detection

Guillermo Caminero et al.

COMPUTER NETWORKS (2019)

Article Computer Science, Artificial Intelligence

A machine learning based intrusion detection scheme for data fusion in mobile clouds involving heterogeneous client networks

Saurabh Dey et al.

INFORMATION FUSION (2019)

Article Computer Science, Artificial Intelligence

A Multistage Game in Smart Grid Security: A Reinforcement Learning Solution

Zhen Ni et al.

IEEE TRANSACTIONS ON NEURAL NETWORKS AND LEARNING SYSTEMS (2019)

Article Automation & Control Systems

Resilient Event-Triggered Controller Synthesis of Networked Control Systems Under Periodic DoS Jamming Attacks

Songlin Hu et al.

IEEE TRANSACTIONS ON CYBERNETICS (2019)

Article Computer Science, Information Systems

A Collaborative Multi-Agent Reinforcement Learning Anti-Jamming Algorithm in Wireless Networks

Fuqiang Yao et al.

IEEE WIRELESS COMMUNICATIONS LETTERS (2019)

Proceedings Paper Engineering, Electrical & Electronic

A New Tensioning Method using Deep Reinforcement Learning for Surgical Pattern Cutting

Thanh Nguyen et al.

2019 IEEE INTERNATIONAL CONFERENCE ON INDUSTRIAL TECHNOLOGY (ICIT) (2019)

Proceedings Paper Engineering, Electrical & Electronic

Multi-Agent Deep Reinforcement Learning with Human Strategies

Thanh Nguyen et al.

2019 IEEE INTERNATIONAL CONFERENCE ON INDUSTRIAL TECHNOLOGY (ICIT) (2019)

Article Computer Science, Information Systems

Introducing Deep Learning Self-Adaptive Misuse Network Intrusion Detection Systems

Dimitrios Papamartzivanos et al.

IEEE ACCESS (2019)

Proceedings Paper Computer Science, Interdisciplinary Applications

Detecting Phishing Websites through Deep Reinforcement Learning

Moitrayee Chatterjee et al.

2019 IEEE 43RD ANNUAL COMPUTER SOFTWARE AND APPLICATIONS CONFERENCE (COMPSAC), VOL 2 (2019)

Review Computer Science, Information Systems

A Survey of Deep Learning Methods for Cyber Security

Daniel S. Berman et al.

INFORMATION (2019)

Proceedings Paper Computer Science, Hardware & Architecture

The Future of Cybersecurity: Major Role of Artificial Intelligence, Machine Learning, and Deep Learning in Cyberspace

B. Geluvaraj et al.

INTERNATIONAL CONFERENCE ON COMPUTER NETWORKS AND COMMUNICATION TECHNOLOGIES (ICCNCT 2018) (2019)

Article Computer Science, Information Systems

Applications of Deep Reinforcement Learning in Communications and Networking: A Survey

Nguyen Cong Luong et al.

IEEE COMMUNICATIONS SURVEYS AND TUTORIALS (2019)

Article Computer Science, Information Systems

A New Deep-Q-Learning-Based Transmission Scheduling Mechanism for the Cognitive Internet of Things

Jiang Zhu et al.

IEEE INTERNET OF THINGS JOURNAL (2018)

Article Telecommunications

Anti-Jamming Communications Using Spectrum Waterfall: A Deep Reinforcement Learning Approach

Xin Liu et al.

IEEE COMMUNICATIONS LETTERS (2018)

Article Computer Science, Theory & Methods

A Secure Mobile Crowdsensing Game With Deep Reinforcement Learning

Liang Xiao et al.

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2018)

Article Computer Science, Theory & Methods

Using Bayesian Networks for Probabilistic Identification of Zero-Day Attack Paths

Xiaoyan Sun et al.

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2018)

Article Engineering, Civil

Nonlane-Discipline-Based Car-Following Model for Electric Vehicles in Transportation-Cyber-Physical Systems

Yongfu Li et al.

IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS (2018)

Article Engineering, Electrical & Electronic

UAV Relay in VANETs Against Smart Jamming With Reinforcement Learning

Liang Xiao et al.

IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY (2018)

Article Computer Science, Hardware & Architecture

SECURITY IN MOBILE EDGE CACHING WITH REINFORCEMENT LEARNING

Liang Xiao et al.

IEEE WIRELESS COMMUNICATIONS (2018)

Article Automation & Control Systems

Adaptive and online network intrusion detection system using clustering and Extreme Learning Machines

Setareh Roshan et al.

JOURNAL OF THE FRANKLIN INSTITUTE-ENGINEERING AND APPLIED MATHEMATICS (2018)

Article Computer Science, Artificial Intelligence

A survey on security control and attack detection for industrial cyber-physical systems

Derui Ding et al.

NEUROCOMPUTING (2018)

Article Computer Science, Artificial Intelligence

Applications of Deep Learning and Reinforcement Learning to Biological Data

Mufti Mahmud et al.

IEEE TRANSACTIONS ON NEURAL NETWORKS AND LEARNING SYSTEMS (2018)

Article Computer Science, Information Systems

Mobile Edge Computing: A Survey

Nasir Abbas et al.

IEEE INTERNET OF THINGS JOURNAL (2018)

Article Multidisciplinary Sciences

A Survey of Adversarial Machine Learning in Cyber Warfare

Vasisht Duddu

DEFENCE SCIENCE JOURNAL (2018)

Article Multidisciplinary Sciences

Deep reinforcement learning for de novo drug design

Mariya Popova et al.

SCIENCE ADVANCES (2018)

Review Computer Science, Hardware & Architecture

Deep Reinforcement Learning for Mobile Edge Caching: Review, New Features, and Open Issues

Hao Zhu et al.

IEEE NETWORK (2018)

Article Chemistry, Multidisciplinary

Interference-Aware Cooperative Anti-Jamming Distributed Channel Selection in UAV Communication Networks

Yifan Xu et al.

APPLIED SCIENCES-BASEL (2018)

Proceedings Paper Mathematics, Applied

A Survey on Anomaly Based Host Intrusion Detection System

Shijoe Jose et al.

PROCEEDINGS OF THE 10TH NATIONAL CONFERENCE ON MATHEMATICAL TECHNIQUES AND ITS APPLICATIONS (NCMTA 18) (2018)

Proceedings Paper Computer Science, Software Engineering

Falsification of Cyber-Physical Systems Using Deep Reinforcement Learning

Takumi Akazaki et al.

FORMAL METHODS (2018)

Proceedings Paper Computer Science, Theory & Methods

Game Theory Meets Network Security

Quanyan Zhu et al.

PROCEEDINGS OF THE 2018 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (CCS'18) (2018)

Proceedings Paper Computer Science, Cybernetics

A Human Mixed Strategy Approach to Deep Reinforcement Learning

Ngoc Duy Nguyen et al.

2018 IEEE INTERNATIONAL CONFERENCE ON SYSTEMS, MAN, AND CYBERNETICS (SMC) (2018)

Review Energy & Fuels

Review on the Research and Practice of Deep Learning and Reinforcement Learning in Smart Grids

Dongxia Zhang et al.

CSEE JOURNAL OF POWER AND ENERGY SYSTEMS (2018)

Article Engineering, Multidisciplinary

HIDS: A host based intrusion detection system for cloud computing environment

Prachi Deshpande et al.

INTERNATIONAL JOURNAL OF SYSTEM ASSURANCE ENGINEERING AND MANAGEMENT (2018)

Article Engineering, Electrical & Electronic

Cognitive Radio Network and Network Service Chaining toward 5G: Challenges and Requirements

Ioanna Kakalou et al.

IEEE COMMUNICATIONS MAGAZINE (2017)

Article Computer Science, Information Systems

A Survey on Smart Grid Cyber-Physical System Testbeds

Mehmet Hazar Cintuglu et al.

IEEE COMMUNICATIONS SURVEYS AND TUTORIALS (2017)

Article Engineering, Electrical & Electronic

Deep Reinforcement Learning A brief survey

Kai Arulkumaran et al.

IEEE SIGNAL PROCESSING MAGAZINE (2017)

Article Computer Science, Information Systems

Health-CPS: Healthcare Cyber-Physical System Assisted by Cloud and Big Data

Yin Zhang et al.

IEEE SYSTEMS JOURNAL (2017)

Article Multidisciplinary Sciences

Mastering the game of Go without human knowledge

David Silver et al.

NATURE (2017)

Article Computer Science, Information Systems

Knowledge-Defined Networking

Albert Mestres et al.

ACM SIGCOMM Computer Communication Review (2017)

Article Computer Science, Information Systems

System Design Perspective for Human-Level Agents Using Deep Reinforcement Learning: A Survey

Ngoc Duy Nguyen et al.

IEEE ACCESS (2017)

Article Computer Science, Information Systems

Intelligent Cloud Resource Management with Deep Reinforcement Learning

Yu Zhang et al.

IEEE CLOUD COMPUTING (2017)

Article Computer Science, Hardware & Architecture

Machine learning aided Android malware classification

Nikola Milosevic et al.

COMPUTERS & ELECTRICAL ENGINEERING (2017)

Article Computer Science, Hardware & Architecture

Fog Computing: Helping the Internet of Things Realize Its Potential

Amir Vahid Dastjerdi et al.

COMPUTER (2016)

Article Computer Science, Theory & Methods

Integration of Cloud computing and Internet of Things: A survey

Alessio Botta et al.

FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE (2016)

Article Computer Science, Information Systems

A Survey of Data Mining and Machine Learning Methods for Cyber Security Intrusion Detection

Anna L. Buczak et al.

IEEE COMMUNICATIONS SURVEYS AND TUTORIALS (2016)

Article Engineering, Electrical & Electronic

PHY-Layer Spoofing Detection With Reinforcement Learning in Wireless Networks

Liang Xiao et al.

IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY (2016)

Article Multidisciplinary Sciences

Mastering the game of Go with deep neural networks and tree search

David Silver et al.

NATURE (2016)

Proceedings Paper Computer Science, Information Systems

A Survey of Game Theoretic Methods for Cyber Security

Yuan Wang et al.

2016 IEEE FIRST INTERNATIONAL CONFERENCE ON DATA SCIENCE IN CYBERSPACE (DSC 2016) (2016)

Proceedings Paper Computer Science, Hardware & Architecture

Game Theory with Learning for Cyber Security Monitoring

Keywhan Chung et al.

2016 IEEE 17TH INTERNATIONAL SYMPOSIUM ON HIGH ASSURANCE SYSTEMS ENGINEERING (HASE) (2016)

Proceedings Paper Computer Science, Theory & Methods

A Host-based Intrusion Detection and Mitigation Framework for Smart Home IoT using OpenFlow

Mehdi Nobakht et al.

PROCEEDINGS OF 2016 11TH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY, (ARES 2016) (2016)

Review Computer Science, Artificial Intelligence

Application of reinforcement learning for security enhancement in cognitive radio networks

Mee Hong Ling et al.

APPLIED SOFT COMPUTING (2015)

Article Computer Science, Information Systems

A Mininet-based Virtual Testbed for Distributed SDN Development

Bob Lantz et al.

ACM SIGCOMM COMPUTER COMMUNICATION REVIEW (2015)

Article Automation & Control Systems

Distributed response to network intrusions using multiagent reinforcement learning

Kleanthis Malialis et al.

ENGINEERING APPLICATIONS OF ARTIFICIAL INTELLIGENCE (2015)

Article Computer Science, Information Systems

Energy-Efficient Monitoring in Software Defined Wireless Sensor Networks Using Reinforcement Learning: A Prototype

Ru Huang et al.

INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS (2015)

Article Engineering, Industrial

Current status and advancement of cyber-physical systems in manufacturing

Lihui Wang et al.

JOURNAL OF MANUFACTURING SYSTEMS (2015)

Article Computer Science, Hardware & Architecture

Power control with reinforcement learning in cooperative cognitive radio networks against jamming

Liang Xiao et al.

JOURNAL OF SUPERCOMPUTING (2015)

Article Multidisciplinary Sciences

Human-level control through deep reinforcement learning

Volodymyr Mnih et al.

NATURE (2015)

Article Computer Science, Information Systems

A Mininet-based Virtual Testbed for Distributed SDN Development

Bob Lantz et al.

ACM SIGCOMM COMPUTER COMMUNICATION REVIEW (2015)

Article Computer Science, Information Systems

Software-Defined Networking for RSU Clouds in Support of the Internet of Vehicles

Mohammad Ali Salahuddin et al.

IEEE INTERNET OF THINGS JOURNAL (2015)

Article Computer Science, Information Systems

Energy-Efficient Monitoring in Software Defined Wireless Sensor Networks Using Reinforcement Learning: A Prototype

Ru Huang et al.

INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS (2015)

Article Automation & Control Systems

Cooperative game theoretic approach using fuzzy Q-learning for detecting and preventing intrusions in wireless sensor networks

Shahaboddin Shamshirband et al.

ENGINEERING APPLICATIONS OF ARTIFICIAL INTELLIGENCE (2014)

Article Automation & Control Systems

An appraisal and design of a multi-agent system based cooperative wireless intrusion detection computational intelligence technique

Shahaboddin Shamshirband et al.

ENGINEERING APPLICATIONS OF ARTIFICIAL INTELLIGENCE (2013)

Article Computer Science, Artificial Intelligence

Optimization of load balancing using fuzzy Q-Learning for next generation wireless networks

P. Munoz et al.

EXPERT SYSTEMS WITH APPLICATIONS (2013)

Article Engineering, Electrical & Electronic

Coping with a Smart Jammer in Wireless Networks: A Stackelberg Game Approach

Dejun Yang et al.

IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS (2013)

Proceedings Paper Engineering, Electrical & Electronic

Cognitive Jamming Game for Dynamically Countering Ad Hoc Cognitive Radio Networks

William G. Conley et al.

2013 IEEE MILITARY COMMUNICATIONS CONFERENCE (MILCOM 2013) (2013)

Article Engineering, Electrical & Electronic

Anti-Jamming Games in Multi-Channel Cognitive Radio Networks

Yongle Wu et al.

IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS (2012)

Article Engineering, Electrical & Electronic

A Survey of Security Challenges in Cognitive Radio Networks: Solutions and Future Research Directions

Alireza Attar et al.

PROCEEDINGS OF THE IEEE (2012)

Article Computer Science, Artificial Intelligence

A Survey of Monte Carlo Tree Search Methods

Cameron B. Browne et al.

IEEE TRANSACTIONS ON COMPUTATIONAL INTELLIGENCE AND AI IN GAMES (2012)

Article Engineering, Electrical & Electronic

An Anti-Jamming Stochastic Game for Cognitive Radio Networks

Beibei Wang et al.

IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS (2011)

Article Computer Science, Artificial Intelligence

Sequential anomaly detection based on temporal-difference learning: Principles, models and case studies

Xin Xu

APPLIED SOFT COMPUTING (2010)

Article Computer Science, Hardware & Architecture

NON-CRYPTOGRAPHIC AUTHENTICATION AND IDENTIFICATION IN WIRELESS NETWORKS

Kai Zeng et al.

IEEE WIRELESS COMMUNICATIONS (2010)

Article Computer Science, Information Systems

A Survey on Jamming Attacks and Countermeasures in WSNs

Aristides Mpitziopoulos et al.

IEEE COMMUNICATIONS SURVEYS AND TUTORIALS (2009)

Article Computer Science, Hardware & Architecture

Defending against distributed denial-of-service attacks with max-min fair server-centric router throttles

DKY Yau et al.

IEEE-ACM TRANSACTIONS ON NETWORKING (2005)

Article Computer Science, Artificial Intelligence

Multiagent learning using a variable learning rate

M Bowling et al.

ARTIFICIAL INTELLIGENCE (2002)