參考文獻 |
Electronic Markets, vol. 31, no. 3, pp. 685-695, 2021.
[2] A. S. Khan, Z. Ahmad, J. Abdullah, and F. Ahmad, "A spectrogram image-based network anomaly detection system using deep convolutional neural network," IEEE Access, vol. 9, pp. 87079-87093, 2021.
[3] U. Cisco, "Cisco annual internet report (2018–2023) white paper," Cisco: San Jose, CA, USA, 2020.
[4] T. M. Research. "TREND MICRO SECURITY PREDICTIONS FOR 2022." https://documents.trendmicro.com/assets/rpt/rpt-toward-a-new-momentum-trend-micro-security-predictions-for-2022.pdf (accessed.
[5] D. H. Dario Amodei, Girish SastryJack, ClarkGreg Brockman,Ilya Sutskever. "AI and Compute." OpenAI. https://openai.com/blog/ai-and-compute/ (accessed.
[6] A. Adadi and M. Berrada, "Peeking inside the black-box: a survey on explainable artificial intelligence (XAI)," IEEE access, vol. 6, pp. 52138-52160, 2018.
[7] J. W. Oh and J. Jeong, "Data augmentation for bearing fault detection with a light weight CNN," Procedia Computer Science, vol. 175, pp. 72-79, 2020.
[8] J. Zhao, X. Jing, Z. Yan, and W. Pedrycz, "Network traffic classification for data fusion: A survey," Information Fusion, vol. 72, pp. 22-47, 2021.
[9] 彭筱茵, "基於卷積神經網路與梯度提升演算法於網路惡意加密流量偵測之研究," 碩士論文, 國立中央大學資訊工程學系, 2021. [Online]. Available: https://hdl.handle.net/11296/4s243p
[10] M. Lopez-Martin, B. Carro, A. Sanchez-Esguevillas, and J. Lloret, "Network traffic classifier with convolutional and recurrent neural networks for Internet of Things," IEEE access, vol. 5, pp. 18042-18050, 2017.
[11] L. Vokorokos and A. Baláž, "Host-based intrusion detection system," in 2010 IEEE 14th International Conference on Intelligent Engineering Systems, 2010: IEEE, pp. 43-47.
[12] M. Liu, Z. Xue, X. Xu, C. Zhong, and J. Chen, "Host-based intrusion detection system with system calls: Review and future trends," ACM Computing Surveys (CSUR), vol. 51, no. 5, pp. 1-36, 2018.
[13] c. Wikipedia, "Spectrogram," in Wikipedia, The Free Encyclopedia., ed.
[14] A. Satt, S. Rozenberg, and R. Hoory, "Efficient Emotion Recognition from Speech Using Deep Learning on Spectrograms," in Interspeech, 2017, pp. 1089-1093.
[15] J. Huang, B. Chen, B. Yao, and W. He, "ECG arrhythmia classification using STFT-based spectrogram and convolutional neural network," IEEE access, vol. 7, pp. 92871-92880, 2019.
[16] L. Chen, S. Li, Q. Bai, J. Yang, S. Jiang, and Y. Miao, "Review of image classification algorithms based on convolutional neural networks," Remote Sensing, vol. 13, no. 22, p. 4712, 2021.
[17] H. Liu, B. Lang, M. Liu, and H. Yan, "CNN and RNN based payload classification methods for attack detection," Knowledge-Based Systems, vol. 163, pp. 332-341, 2019.
[18] S. Albawi, T. A. Mohammed, and S. Al-Zawi, "Understanding of a convolutional neural network," in 2017 international conference on engineering and technology (ICET), 2017: Ieee, pp. 1-6.
[19] R. R. Selvaraju, M. Cogswell, A. Das, R. Vedantam, D. Parikh, and D. Batra, "Grad-cam: Visual explanations from deep networks via gradient-based localization," in Proceedings of the IEEE international conference on computer vision, 2017, pp. 618-626.
[20] B. Zhou, A. Khosla, A. Lapedriza, A. Oliva, and A. Torralba, "Learning deep features for discriminative localization," in Proceedings of the IEEE conference on computer vision and pattern recognition, 2016, pp. 2921-2929.
[21] J. Toldinas, A. Venčkauskas, R. Damaševičius, Š. Grigaliūnas, N. Morkevičius, and E. Baranauskas, "A novel approach for network intrusion detection using multistage deep learning image recognition," Electronics, vol. 10, no. 15, p. 1854, 2021.
[22] B. Andreas, J. Dilruksha, and E. McCandless, "Flow-Based and Packet-Based Intrusion Detection Using BLSTM," SMU Data Science Review, vol. 3, no. 3, p. 8, 2020.
[23] M. Wieczorek, J. Siłka, M. Woźniak, S. Garg, and M. M. Hassan, "Lightweight Convolutional Neural Network Model for Human Face Detection in Risk Situations," IEEE Transactions on Industrial Informatics, vol. 18, no. 7, pp. 4820-4829, 2021.
[24] P. Zhao, K. Liu, H. Zou, and X. Zhen, "Multi-stream convolutional neural network for SAR automatic target recognition," Remote Sensing, vol. 10, no. 9, p. 1473, 2018.
[25] B. Li et al., "Towards practical lottery ticket hypothesis for adversarial training," arXiv preprint arXiv:2003.05733, 2020.
[26] L. Liu, P. Wang, J. Lin, and L. Liu, "Intrusion detection of imbalanced network traffic based on machine learning and deep learning," Ieee Access, vol. 9, pp. 7550-7563, 2020.
[27] A. Gramfort et al., "Scikit-Learn: Sklearn Preprocessing Minmaxscaler," ed: Accessed: Oct, 2019.
[28] E. W. Weisstein, "Fourier transform," https://mathworld. wolfram. com/, 2004.
[29] F. Scarselli, M. Gori, A. C. Tsoi, M. Hagenbuchner, and G. Monfardini, "The graph neural network model," IEEE transactions on neural networks, vol. 20, no. 1, pp. 61-80, 2008.
[30] W. F. Noh and P. Woodward, "SLIC (simple line interface calculation)," in Proceedings of the fifth international conference on numerical methods in fluid dynamics June 28–July 2, 1976 Twente University, Enschede, 1976: Springer, pp. 330-340. |