4.5 Article

Intrusion detection system for cyberattacks in the Internet of Vehicles environment

相关参考文献

注意:仅列出部分参考文献,下载原文获取全部文献信息。
Article Computer Science, Artificial Intelligence

Learning Semantic Segmentation of Large-Scale Point Clouds With Random Sampling

Qingyong Hu et al.

Summary: This paper addresses the problem of efficient semantic segmentation of large-scale 3D point clouds and proposes RandLA-Net, a lightweight neural architecture that relies on random point sampling and local feature aggregation for fast and accurate semantic segmentation.

IEEE TRANSACTIONS ON PATTERN ANALYSIS AND MACHINE INTELLIGENCE (2022)

Article Computer Science, Information Systems

CNN-LSTM: Hybrid Deep Neural Network for Network Intrusion Detection System

Asmaa Halbouni et al.

Summary: Network security is crucial in daily interactions and networks, with researchers developing a hybrid intrusion detection system model using deep learning algorithms and artificial neural networks. Through training on different datasets, the model demonstrates high detection rate and accuracy.

IEEE ACCESS (2022)

Article Computer Science, Information Systems

GAN-based imbalanced data intrusion detection system

JooHwa Lee et al.

Summary: This study addresses the issue of data imbalance by utilizing Generative Adversarial Networks (GAN) and proposes a Random Forest model for detection performance. Experimental results demonstrate that the proposed model outperforms other models widely used for data imbalance problems.

PERSONAL AND UBIQUITOUS COMPUTING (2021)

Article Computer Science, Interdisciplinary Applications

Analyzing Overfitting Under Class Imbalance in Neural Networks for Image Segmentation

Zeju Li et al.

Summary: Class imbalance in image segmentation neural networks can lead to overfitting, where the distribution of logit activations may shift across the decision boundary at test time, resulting in systematic under-segmentation of small structures. New asymmetric variants of popular loss functions and regularization techniques have been introduced to counteract this bias, demonstrating significantly improved segmentation accuracy compared to baselines and alternative approaches through extensive experiments.

IEEE TRANSACTIONS ON MEDICAL IMAGING (2021)

Article Computer Science, Hardware & Architecture

A GRU deep learning system against attacks in software defined networks

Marcos V. O. Assis et al.

Summary: This paper proposes an SDN defense system based on deep learning method to detect DDoS and intrusion attacks by analyzing single IP flow records for faster mitigation responses; in addition, performance of a lightweight mitigation approach is evaluated and feasibility tests are conducted regarding the throughput of flows per second for each detection method.

JOURNAL OF NETWORK AND COMPUTER APPLICATIONS (2021)

Article Chemistry, Multidisciplinary

A Novel Intrusion Detection Approach Using Machine Learning Ensemble for IoT Environments

Parag Verma et al.

Summary: The Internet of Things (IoT) has gained significant importance due to its applicability in diverse environments, but the absence of security protocols has attracted cyber-criminals. The authors propose a binary classifier approach using machine learning to prevent malicious actors from accessing the IoT network and effectively combat network threats.

APPLIED SCIENCES-BASEL (2021)

Article Engineering, Chemical

HCRNNIDS: Hybrid Convolutional Recurrent Neural Network-Based Network Intrusion Detection System

Muhammad Ashfaq Khan

Summary: Network attacks are a crucial problem in modern society, and developing effective intrusion detection systems is essential to mitigate the impact of malicious threats. Utilizing deep learning and machine learning techniques, researchers have designed a hybrid convolutional recurrent neural network intrusion detection system that achieves high accuracy in detecting malicious cyberattacks.

PROCESSES (2021)

Article Computer Science, Information Systems

SDN-Enabled Hybrid DL-Driven Framework for the Detection of Emerging Cyber Threats in IoT

Danish Javeed et al.

Summary: The Internet of Things (IoT) is a billion-dollar industry, but its prevalence makes it vulnerable to cyber attacks. Software-defined networks provide a single effective security solution to combat these threats, and algorithms can efficiently detect cyber threats and attacks while ensuring no additional burden on resource-constrained IoT devices.

ELECTRONICS (2021)

Article Computer Science, Information Systems

A Novel Ensemble Framework for an Intelligent Intrusion Detection System

Sugandh Seth et al.

Summary: The study presents a unique ensemble framework for detecting different attack categories effectively. By ranking the detection ability of various base classifiers, a better attack detection rate is achieved.

IEEE ACCESS (2021)

Article Computer Science, Hardware & Architecture

Evolving deep learning architectures for network intrusion detection using a double PSO metaheuristic

Wisam Elmasry et al.

COMPUTER NETWORKS (2020)

Article Engineering, Electrical & Electronic

The Security of Autonomous Driving: Threats, Defenses, and Future Directions

Kui Ren et al.

PROCEEDINGS OF THE IEEE (2020)

Article Computer Science, Artificial Intelligence

LR-SMOTE - An improved unbalanced data set oversampling based on K-means and SVM

X. W. Liang et al.

KNOWLEDGE-BASED SYSTEMS (2020)

Article Computer Science, Information Systems

Attacks on Self-Driving Cars and Their Countermeasures: A Survey

Abdullahi Chowdhury et al.

IEEE ACCESS (2020)

Proceedings Paper Computer Science, Artificial Intelligence

A Review of the Advancement in Intrusion Detection Datasets

Ankit Thakkar et al.

INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND DATA SCIENCE (2020)

Proceedings Paper Computer Science, Artificial Intelligence

Analysis of KDD-Cup'99, NSL-KDD and UNSW-NB15 Datasets using Deep Learning in IoT

Sarika Choudhary et al.

INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND DATA SCIENCE (2020)

Article Business

DeepCoin: A Novel Deep Learning and Blockchain-Based Energy Exchange Framework for Smart Grids

Mohamed Amine Ferrag et al.

IEEE TRANSACTIONS ON ENGINEERING MANAGEMENT (2020)

Proceedings Paper Operations Research & Management Science

How Do Autonomous Cars Work?

Jan Ondrus et al.

LOGI 2019 - HORIZONS OF AUTONOMOUS MOBILITY IN EUROPE (2020)

Article Computer Science, Information Systems

An Overview of Vehicular Communications

Fabio Arena et al.

FUTURE INTERNET (2019)

Article Computer Science, Theory & Methods

A Survey of Random Forest Based Methods for Intrusion Detection Systems

Paulo Angelo Alves Resende et al.

ACM COMPUTING SURVEYS (2018)

Article Automation & Control Systems

Intelligent intrusion detection in external communication systems for autonomous vehicles

Khattab M. Ali Alheeti et al.

SYSTEMS SCIENCE & CONTROL ENGINEERING (2018)

Article Statistics & Probability

Dealing with Imbalanced Dataset: A Re-sampling Method Based on the Improved SMOTE Algorithm

Wei Xue et al.

COMMUNICATIONS IN STATISTICS-SIMULATION AND COMPUTATION (2016)

Proceedings Paper Business

A Survey on Feature Selection

Jianyu Miao et al.

PROMOTING BUSINESS ANALYTICS AND QUANTITATIVE MANAGEMENT OF TECHNOLOGY: 4TH INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY AND QUANTITATIVE MANAGEMENT (ITQM 2016) (2016)

Review Statistics & Probability

Variable importance in regression models

Ulrike Groemping

WILEY INTERDISCIPLINARY REVIEWS-COMPUTATIONAL STATISTICS (2015)

Article Computer Science, Artificial Intelligence

Addressing data complexity for imbalanced data sets: analysis of SMOTE-based oversampling and evolutionary undersampling

Julian Luengo et al.

SOFT COMPUTING (2011)

Article Engineering, Electrical & Electronic

INTELLIGENT TRANSPORTATION SYSTEMS

George Dimitrakopoulos et al.

IEEE VEHICULAR TECHNOLOGY MAGAZINE (2010)