Y Zhao, J Chen, D Wu, J Teng, S Yu - Proceedings of the 10th …, 2019 - dl.acm.org
Because of the complexity of network traffic, there are various significant challenges in the network anomaly detection fields. One of the major challenges is the lack of labeled training …
C Park, J Lee, Y Kim, JG Park, H Kim… - IEEE Internet of Things …, 2022 - ieeexplore.ieee.org
As communication technology advances, various and heterogeneous data are communicated in distributed environments through network systems. Meanwhile, along with …
J Li, X Tong, J Liu, L Cheng - IEEE Systems Journal, 2023 - ieeexplore.ieee.org
Network intrusion detection is used to detect unauthorized activities on a digital network, with which the cybersecurity teams of organizations can then kick-start prevention protocols …
P Wu, H Guo, N Moustafa - 2020 50th annual IEEE/IFIP …, 2020 - ieeexplore.ieee.org
One challenge for building a secure network communication environment is how to effectively detect and prevent malicious network behaviours. The abnormal network …
There is a growing trend of cyberattacks against Internet of Things (IoT) devices; moreover, the sophistication and motivation of those attacks is increasing. The vast scale of IoT, diverse …
Y Qin, M Kondo - 2021 International conference on electrical …, 2021 - ieeexplore.ieee.org
With the increase and diversity of network attacks, machine learning has shown its efficiency in realizing intrusion detection. Federated Learning (FL) has been proposed as a new …
L Cui, Y Qu, G Xie, D Zeng, R Li… - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
Internet of Things (IoT) anomaly detection is significant due to its fundamental roles of securing modern critical infrastructures, such as falsified data injection detection and …
Intrusion detection systems are evolving into intelligent systems that perform data analysis searching for anomalies in their environment. The development of deep learning …
R Zhao, Y Wang, Z Xue, T Ohtsuki… - IEEE Internet of …, 2022 - ieeexplore.ieee.org
Federated learning (FL) has become an increasingly popular solution for intrusion detection to avoid data privacy leakage in Internet of Things (IoT) edge devices. Existing FL-based …