TY - JOUR AU - Akhtar, N. AU - Mian, A. PY - 2018 DA - 2018// TI - Threat of adversarial attacks on deep learning in computer vision: A survey JO - IEEE Access VL - 6 UR - https://doi.org/10.1109/ACCESS.2018.2807385 DO - 10.1109/ACCESS.2018.2807385 ID - Akhtar2018 ER - TY - JOUR AU - Al-Qatf, M. AU - Lasheng, Y. AU - Al-Habib, M. AU - Al-Sabahi, K. PY - 2018 DA - 2018// TI - Deep learning approach combining sparse autoencoder with svm for network intrusion detection JO - IEEE Access VL - 6 UR - https://doi.org/10.1109/ACCESS.2018.2869577 DO - 10.1109/ACCESS.2018.2869577 ID - Al-Qatf2018 ER - TY - STD TI - Bahdanau, D, Cho K, Bengio Y (2015) Neural Machine Translation by Jointly Learning to Align and Translate. cite arxiv:1409.0473Comment: Accepted at ICLR 2015 as oral presentation. https://nyuscholars.nyu.edu/en/publications/neural-machine-translation-by-jointly-learning-to-align-and-trans-2. UR - https://nyuscholars.nyu.edu/en/publications/neural-machine-translation-by-jointly-learning-to-align-and-trans-2 ID - ref3 ER - TY - STD TI - Cho, K, Van Merriënboer B, Gulcehre C, Bahdanau D, Bougares F, Schwenk H, Bengio Y (2014) Learning phrase representations using rnn encoder-decoder for statistical machine translation. arXiv preprint arXiv:1406.1078:1724–1734. https://www.aclweb.org/anthology/D14-1179.bib. UR - https://www.aclweb.org/anthology/D14-1179.bib ID - ref4 ER - TY - BOOK AU - Chung, J. AU - Gulcehre, C. AU - Cho, K. AU - Bengio, Y. PY - 2014 DA - 2014// TI - Empirical evaluation of gated recurrent neural networks on sequence modeling PB - ACM CY - Montreal ID - Chung2014 ER - TY - JOUR AU - Cortes, C. AU - Vapnik, V. PY - 1995 DA - 1995// TI - Support-vector networks JO - Mach Learn VL - 20 ID - Cortes1995 ER - TY - CHAP AU - Creech, G. AU - Hu, J. PY - 2013 DA - 2013// TI - Generation of a new ids test dataset: Time to retire the kdd collection BT - 2013 IEEE Wireless Communications and Networking Conference (WCNC) PB - IEEE CY - Shanghai UR - https://doi.org/10.1109/WCNC.2013.6555301 DO - 10.1109/WCNC.2013.6555301 ID - Creech2013 ER - TY - STD TI - Devlin, J, Chang M-W, Lee K, Toutanova K (2018) Bert: Pre-training of deep bidirectional transformers for language understanding. arXiv preprint arXiv:1810.04805:4171–4186. https://www.aclweb.org/anthology/N19-1423.bib. UR - https://www.aclweb.org/anthology/N19-1423.bib ID - ref8 ER - TY - JOUR AU - Elman, J. PY - 1990 DA - 1990// TI - Finding structure in time JO - Cogn Sci VL - 14 UR - https://doi.org/10.1207/s15516709cog1402_1 DO - 10.1207/s15516709cog1402_1 ID - Elman1990 ER - TY - JOUR AU - Fawcett, T. PY - 2006 DA - 2006// TI - An introduction to roc analysis JO - Pattern Recogn Lett VL - 27 UR - https://doi.org/10.1016/j.patrec.2005.10.010 DO - 10.1016/j.patrec.2005.10.010 ID - Fawcett2006 ER - TY - CHAP AU - Forrest, S. AU - Hofmeyr, S. AU - Somayaji, A. PY - 2008 DA - 2008// TI - The evolution of system-call monitoring BT - 2008 Annual Computer Security Applications Conference (ACSAC) PB - IEEE CY - Anaheim UR - https://doi.org/10.1109/ACSAC.2008.54 DO - 10.1109/ACSAC.2008.54 ID - Forrest2008 ER - TY - CHAP AU - Gao, N. AU - Gao, L. AU - Gao, Q. AU - Wang, H. PY - 2014 DA - 2014// TI - An intrusion detection model based on deep belief networks BT - 2014 Second International Conference on Advanced Cloud and Big Data PB - IEEE CY - Huangshan UR - https://doi.org/10.1109/CBD.2014.41 DO - 10.1109/CBD.2014.41 ID - Gao2014 ER - TY - STD TI - Goodfellow, IJ, Shlens J, Szegedy C (2015) Explaining and Harnessing Adversarial Examples. ID - ref13 ER - TY - STD TI - Hao, S, Long J, Yang Y (2019) Bl-ids: Detecting web attacks using bi-lstm model based on deep learning In: International Conference on Security and Privacy in New Computing Environments, 551–563.. Springer. ID - ref14 ER - TY - JOUR AU - Hochreiter, S. AU - Schmidhuber, J. PY - 1997 DA - 1997// TI - Long short-term memory JO - Neural Comput VL - 9 UR - https://doi.org/10.1162/neco.1997.9.8.1735 DO - 10.1162/neco.1997.9.8.1735 ID - Hochreiter1997 ER - TY - CHAP AU - Kam, H. PY - 1995 DA - 1995// TI - Random decision forest BT - Proceedings of the 3rd International Conference on Document Analysis and Recognition, vol. 1416 PB - IEEE CY - Montreal, Canada, August ID - Kam1995 ER - TY - CHAP AU - Karras, T. AU - Laine, S. AU - Aila, T. PY - 2019 DA - 2019// TI - A style-based generator architecture for generative adversarial networks BT - Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition PB - IEEE CY - Long Beach ID - Karras2019 ER - TY - CHAP AU - Kim, J. AU - Kim, H. PY - 2015 DA - 2015// TI - Applying recurrent neural network to intrusion detection with hessian free optimization BT - International Workshop on Information Security Applications PB - Springer CY - Jeju Island ID - Kim2015 ER - TY - CHAP AU - Kim, J. AU - Kim, J. AU - Thu, H. AU - Kim, H. PY - 2016 DA - 2016// TI - Long short term memory recurrent neural network classifier for intrusion detection BT - 2016 International Conference on Platform Technology and Service (PlatCon) PB - IEEE CY - Jeju ID - Kim2016 ER - TY - STD TI - Kobayashi, S (2018) Contextual augmentation: Data augmentation by words with paradigmatic relations. arXiv preprint arXiv:1805.06201:452–457. https://www.aclweb.org/anthology/N18-2072.bib. UR - https://www.aclweb.org/anthology/N18-2072.bib ID - ref20 ER - TY - STD TI - Kusner, M, Hernández-Lobato J (2016) Gans for sequences of discrete elements with the gumbel-softmax distribution. arXiv preprint arXiv:1611.04051. ID - ref21 ER - TY - STD TI - Lan, Z, Chen M, Goodman S, Gimpel K, Sharma P, Soricut R (2019) Albert: A lite bert for self-supervised learning of language representations. arXiv preprint arXiv:1909.11942. ID - ref22 ER - TY - JOUR AU - LeCun, Y. AU - Boser, B. AU - Denker, J. AU - Henderson, D. AU - Howard, R. AU - Hubbard, W. AU - Jackel, L. PY - 1989 DA - 1989// TI - Backpropagation applied to handwritten zip code recognition JO - Neural Comput VL - 1 UR - https://doi.org/10.1162/neco.1989.1.4.541 DO - 10.1162/neco.1989.1.4.541 ID - LeCun1989 ER - TY - JOUR AU - LeCun, Y. AU - Bottou, L. AU - Bengio, Y. AU - Haffner, P. PY - 1998 DA - 1998// TI - Gradient-based learning applied to document recognition JO - Proc IEEE VL - 86 UR - https://doi.org/10.1109/5.726791 DO - 10.1109/5.726791 ID - LeCun1998 ER - TY - STD TI - Liu, Y, Liu S, Zhao X (2017) Intrusion detection algorithm based on convolutional neural network. DEStech Trans Eng Technol Res (iceta):62–67. https://dl.acm.org/doi/abs/10.1145/3313991.3314009. UR - https://dl.acm.org/doi/abs/10.1145/3313991.3314009 ID - ref25 ER - TY - JOUR AU - Lv, S. AU - Wang, J. AU - Yang, Y. AU - Liu, J. PY - 2018 DA - 2018// TI - Intrusion prediction with system-call sequence-to-sequence model JO - IEEE Access VL - 6 UR - https://doi.org/10.1109/ACCESS.2018.2881561 DO - 10.1109/ACCESS.2018.2881561 ID - Lv2018 ER - TY - STD TI - Mikolov, T, Karafiat M, Burget L, Cernocký J, Khudanpur S (2010) Recurrent neural network based language model. Twelfth Annu Conf Int Speech Commun Assoc:1045–1048. ID - ref27 ER - TY - CHAP AU - Nair, V. AU - Hinton, G. PY - 2010 DA - 2010// TI - Rectified linear units improve restricted boltzmann machines BT - Proceedings of the 27th International Conference on Machine Learning (ICML-10) PB - ACM CY - Madison ID - Nair2010 ER - TY - STD TI - Powers, D (2011) Evaluation: from precision, recall and f-measure to roc, informedness, markedness and correlation. https://dl.acm.org/doi/10.1145/1143844.1143874. UR - https://dl.acm.org/doi/10.1145/1143844.1143874 ID - ref29 ER - TY - STD TI - Rosenberg, I, Shabtai A, Rokach L, Elovici Y (2018) Generic Black-Box End-to-End Attack Against State of the Art API Call Based Malware Classifiers. arXiv 1707.05970. ID - ref30 ER - TY - JOUR AU - Shorten, C. AU - Khoshgoftaar, T. PY - 2019 DA - 2019// TI - A survey on image data augmentation for deep learning JO - J Big Data VL - 6 UR - https://doi.org/10.1186/s40537-019-0197-0 DO - 10.1186/s40537-019-0197-0 ID - Shorten2019 ER - TY - CHAP AU - Singla, A. AU - Bertino, E. AU - Verma, D. PY - 2019 DA - 2019// TI - Overcoming the lack of labeled data: Training intrusion detection models using transfer learning BT - 2019 IEEE International Conference on Smart Computing (SMARTCOMP) PB - IEEE CY - Washington UR - https://doi.org/10.1109/SMARTCOMP.2019.00031 DO - 10.1109/SMARTCOMP.2019.00031 ID - Singla2019 ER - TY - JOUR AU - Stehman, S. PY - 1997 DA - 1997// TI - Selecting and interpreting measures of thematic classification accuracy JO - Remote Sens Environ VL - 62 UR - https://doi.org/10.1016/S0034-4257(97)00083-7 DO - 10.1016/S0034-4257(97)00083-7 ID - Stehman1997 ER - TY - CHAP AU - Sutskever, I. AU - Vinyals, O. AU - Le, Q. PY - 2014 DA - 2014// TI - Sequence to sequence learning with neural networks BT - Proceedings of the 27th International Conference on Neural Information Processing Systems - Volume 2 NIPS’14 PB - MIT Press CY - Cambridge, MA, USA ID - Sutskever2014 ER - TY - STD TI - Szegedy, C, Zaremba W, Sutskever I, Bruna J, Erhan D, Goodfellow I, Fergus R (2014) Intriguing properties of neural networks. ID - ref35 ER - TY - CHAP AU - Ustebay, S. AU - Turgut, Z. AU - Aydin, M. PY - 2018 DA - 2018// TI - Intrusion detection system with recursive feature elimination by using random forest and deep learning classifier BT - 2018 International Congress on Big Data, Deep Learning and Fighting Cyber Terrorism (IBIGDELFT) PB - IEEE CY - Ankara UR - https://doi.org/10.1109/IBIGDELFT.2018.8625318 DO - 10.1109/IBIGDELFT.2018.8625318 ID - Ustebay2018 ER - TY - CHAP AU - Wang, X. AU - Huang, Q. AU - Celikyilmaz, A. AU - Gao, J. AU - Shen, D. AU - Wang, Y. -. F. AU - Wang, W. AU - Zhang, L. PY - 2019 DA - 2019// TI - Reinforced cross-modal matching and self-supervised imitation learning for vision-language navigation BT - Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition PB - IEEE CY - Long Beach ID - Wang2019 ER - TY - STD TI - Wei, J, Zou K (2019) Eda: Easy data augmentation techniques for boosting performance on text classification tasks. arXiv preprint arXiv:1901.11196:6382–6388. https://www.aclweb.org/anthology/D19-1670.bib. UR - https://www.aclweb.org/anthology/D19-1670.bib ID - ref38 ER - TY - JOUR AU - Xu, C. AU - Shen, J. AU - Du, X. AU - Zhang, F. PY - 2018 DA - 2018// TI - An intrusion detection system using a deep neural network with gated recurrent units JO - IEEE Access VL - 6 UR - https://doi.org/10.1109/ACCESS.2018.2867564 DO - 10.1109/ACCESS.2018.2867564 ID - Xu2018 ER - TY - CHAP AU - Yu, L. AU - Zhang, W. AU - Wang, J. AU - Yu, Y. PY - 2019 DA - 2019// TI - Seqgan: Sequence generative adversarial nets with policy gradient BT - Thirty-First AAAI Conference on Artificial Intelligence PB - ACM CY - San Francisco ID - Yu2019 ER -