[1]Hubballi N, Suryanarayanan V. False alarm minimization techniques in signaturebased intrusion detection systems: A survey[J]. Computer Communications, 2014, 49: 117[2]Yan Q, Wang M, Huang W, et al. Automatically synthesizing DoS attack traces using generative adversarial networks[J]. International Journal of Machine Learning and Cybernetics, 2019, 10(12): 33873396[3]Roopak M, Tian G Y, Chambers J. Deep learning models for cyber security in IoT networks[C] Proc of the 9th IEEE Annual Computing and Communication Workshop and Conference (CCWC). Piscataway, NJ: IEEE, 2019: 04520457[4]Aldwairi T, Perera D, Novotny M A. An evaluation of the performance of Restricted Boltzmann Machines as a model for anomaly network intrusion detection[J]. Computer Networks, 2018, 144: 111119[5]Hendrycks D, Gimpel K. A baseline for detecting misclassified and outofdistribution examples in neural networks[J]. arXiv preprint, arXiv:1610.02136, 2016[6]DeVries T, Taylor G W. Learning confidence for outofdistribution detection in neural networks[J]. arXiv preprint, arXiv:1802.04865, 2018[7]Wei H, Xie R, Cheng H, et al. Mitigating neural network overconfidence with logit normalization[C] Proc of the Int Conf on Machine Learning. New York: PMLR, 2022: 2363123644[8]车佳臻. 面向网络流量的分布外异常检测技术研究[D]. 哈尔滨: 哈尔滨工业大学, 2022[9]Liang S, Li Y, Srikant R. Enhancing the reliability of outofdistribution image detection in neural networks[J]. arXiv preprint, arXiv:1706.02690, 2017[10]Tzeng E, Hoffman J, Zhang N, et al. Deep domain confusion: Maximizing for domain invariance[J]. arXiv preprint, arXiv:1412.3474, 2014[11]Long M, Zhu H, Wang J, et al. Deep transfer learning with joint adaptation networks[C] Proc of the Int Conf on Machine Learning. New York: PMLR, 2017: 22082217
|