[1]何红艳, 黄国言, 张炳, 等. 基于多种特征选择策略的入侵检测模型研究[J]. 信息安全研究, 2021, 7(3): 225232[2]莫坤, 王娜, 李恒吉, 等. 基于LightGBM的网络入侵检测系统[J]. 信息安全研究, 2019, 5(2): 152156[3]Ren M, Zeng W, Yang B, et al. Learning to reweight examples for robust deep learning[C] Proc of Int Conf on Machine Learning. Long Beach: PMLR, 2018: 43344343[4]Arazo E, Ortego D, Albert P, et al. Unsupervised label noise modeling and loss correction[C] Proc of Int Conf on Machine Learning. Long Beach: PMLR, 2019: 312321[5]Xu J, Li Y, Deng R H. Differential training: A generic framework to reduce label noises for Android malware detection[COL] Proc of Network and Distributed System Security Symp. Virtual: NDSS, 2021 [20230517]. https:www.ndsssymposium.orgwpcontentuploadsndss2021_4C3_24126_paper.pdf[6]Xia S, Huang L, Wang G, et al. An adaptive and general model for label noise detection using relative probabilistic density[J]. KnowledgeBased Systems, 2022, 239(1): 262275[7]Sugiyama M, Nakajima S, Kashima H, et al. Direct importance estimation with model selection and its application to covariate shift adaptation[J]. Advances in Neural Information Processing Systems, 2007, 20(1): 14331440[8]MontazeriShatoori M, Davidson L, Kaur G, et al. Detection of DoH tunnels using timeseries classification of encrypted traffic[C] Proc of 2020 IEEE Int Conf on Dependable, Autonomic and Secure Computing, Int Conf on Pervasive Intelligence and Computing, Int Conf on Cloud and Big Data Computing, Int Conf on Cyber Science and Technology Congress. Piscataway, NJ: IEEE, 2020: 6370[9]Singh S K, Roy P K. Malicious traffic detection of DNS over HTTPS using ensemble machine learning[J]. International Journal of Computing and Digital Systems, 2022, 11(1): 189197[10]Malach E, ShalevShwartz S. Decoupling “when to update” from “how to update”[J]. Advances in Neural Information Processing Systems, 2017, 30(4): 961971[11]Han B, Yao Q, Yu X, et al. Coteaching: Robust training of deep neural networks with extremely noisy labels[J]. Advances in Neural Information Processing Systems, 2018, 31(1): 136149
|