• Reference Citation Analysis
  • v
  • v
  • Find an Article
Find an Article PDF (4614794)   Today's Articles (5899)   Subscriber (49390)
For: Kan X, Fan Y, Fang Z, Cao L, Xiong NN, Yang D, Li X. A novel IoT network intrusion detection approach based on Adaptive Particle Swarm Optimization Convolutional Neural Network. Inf Sci (N Y) 2021. [DOI: 10.1016/j.ins.2021.03.060] [Citation(s) in RCA: 39] [Impact Index Per Article: 13.0] [Reference Citation Analysis] [What about the content of this article? (0)] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 12/22/2022]
Number Cited by Other Article(s)
1
Alshahrani H, Anjum M, Shahab S, Al Reshan MS, Sulaiman A, Shaikh A. Analyzing anonymous activities using Interrupt-aware Anonymous User-System Detection Method (IAU-S-DM) in IoT. Sci Rep 2024;14:18075. [PMID: 39103381 DOI: 10.1038/s41598-024-67956-0] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Key Words] [Grants] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Received: 12/19/2023] [Accepted: 07/17/2024] [Indexed: 08/07/2024]  Open
2
Hu G, Zheng Y, Houssein EH, Wei G. DRPSO:A multi-strategy fusion particle swarm optimization algorithm with a replacement mechanisms for colon cancer pathology image segmentation. Comput Biol Med 2024;178:108780. [PMID: 38909447 DOI: 10.1016/j.compbiomed.2024.108780] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Key Words] [MESH Headings] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Received: 01/19/2024] [Revised: 05/06/2024] [Accepted: 06/15/2024] [Indexed: 06/25/2024]
3
Zhao D, Wang Z, Chen Y, Wei G, Sheng W. Partial-Neurons-Based Proportional-Integral Observer Design for Artificial Neural Networks: A Multiple Description Encoding Scheme. IEEE TRANSACTIONS ON NEURAL NETWORKS AND LEARNING SYSTEMS 2024;35:6393-6407. [PMID: 36197865 DOI: 10.1109/tnnls.2022.3209632] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 06/16/2023]
4
Vijayan PM, Sundar S. An automated system of intrusion detection by IoT-aided MQTT using improved heuristic-aided autoencoder and LSTM-based Deep Belief Network. PLoS One 2023;18:e0291872. [PMID: 37792753 PMCID: PMC10550182 DOI: 10.1371/journal.pone.0291872] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [MESH Headings] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Received: 05/09/2023] [Accepted: 09/07/2023] [Indexed: 10/06/2023]  Open
5
Mahalingam A, Perumal G, Subburayalu G, Albathan M, Altameem A, Almakki RS, Hussain A, Abbas Q. ROAST-IoT: A Novel Range-Optimized Attention Convolutional Scattered Technique for Intrusion Detection in IoT Networks. SENSORS (BASEL, SWITZERLAND) 2023;23:8044. [PMID: 37836874 PMCID: PMC10575244 DOI: 10.3390/s23198044] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Key Words] [Grants] [Track Full Text] [Subscribe] [Scholar Register] [Received: 09/04/2023] [Revised: 09/17/2023] [Accepted: 09/22/2023] [Indexed: 10/15/2023]
6
Khan NW, Alshehri MS, Khan MA, Almakdi S, Moradpoor N, Alazeb A, Ullah S, Naz N, Ahmad J. A hybrid deep learning-based intrusion detection system for IoT networks. MATHEMATICAL BIOSCIENCES AND ENGINEERING : MBE 2023;20:13491-13520. [PMID: 37679099 DOI: 10.3934/mbe.2023602] [Citation(s) in RCA: 2] [Impact Index Per Article: 2.0] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 09/09/2023]
7
Alsubai S, Dutta AK, Alnajim AM, Wahab Sait AR, Ayub R, AlShehri AM, Ahmad N. Artificial intelligence-driven malware detection framework for internet of things environment. PeerJ Comput Sci 2023;9:e1366. [PMID: 37346520 PMCID: PMC10280412 DOI: 10.7717/peerj-cs.1366] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Figures] [Journal Information] [Subscribe] [Scholar Register] [Received: 01/23/2023] [Accepted: 04/04/2023] [Indexed: 06/23/2023]
8
Yue Y, Cao L, Lu D, Hu Z, Xu M, Wang S, Li B, Ding H. Review and empirical analysis of sparrow search algorithm. Artif Intell Rev 2023. [DOI: 10.1007/s10462-023-10435-1] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 03/05/2023]
9
Qiu Y, Wu Z, Wang J, Zhang C, Zhang H. Introduction of Materials Genome Technology and Its Applications in the Field of Biomedical Materials. MATERIALS (BASEL, SWITZERLAND) 2023;16:1906. [PMID: 36903027 PMCID: PMC10004319 DOI: 10.3390/ma16051906] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Figures] [Subscribe] [Scholar Register] [Received: 10/09/2022] [Revised: 02/13/2023] [Accepted: 02/17/2023] [Indexed: 06/18/2023]
10
Ma W, Liu R, Li K, Yan S, Guo J. An adversarial domain adaptation approach combining dual domain pairing strategy for IoT intrusion detection under few-shot samples. Inf Sci (N Y) 2023. [DOI: 10.1016/j.ins.2023.02.031] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 02/13/2023]
11
Abd Elaziz M, Al-qaness MA, Dahou A, Ibrahim RA, El-Latif AAA. Intrusion detection approach for cloud and IoT environments using deep learning and Capuchin Search Algorithm. ADVANCES IN ENGINEERING SOFTWARE 2023;176:103402. [DOI: 10.1016/j.advengsoft.2022.103402] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 09/01/2023]
12
Lin S, Zhang K, Guan D, He L, Chen Y. An intrusion detection method based on granular autoencoders. JOURNAL OF INTELLIGENT & FUZZY SYSTEMS 2023. [DOI: 10.3233/jifs-223649] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 01/12/2023]
13
Bahaa A, Sayed A, Elfangary L, Fahmy H. A novel hybrid optimization enabled robust CNN algorithm for an IoT network intrusion detection approach. PLoS One 2022;17:e0278493. [PMID: 36454861 PMCID: PMC9714761 DOI: 10.1371/journal.pone.0278493] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [MESH Headings] [Track Full Text] [Figures] [Journal Information] [Subscribe] [Scholar Register] [Received: 10/14/2022] [Accepted: 11/16/2022] [Indexed: 12/05/2022]  Open
14
Intrusion detection model using gene expression programming to optimize parameters of convolutional neural network for energy internet. Appl Soft Comput 2022. [DOI: 10.1016/j.asoc.2022.109960] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 12/28/2022]
15
MEMBER: A multi-task learning model with hybrid deep features for network intrusion detection. Comput Secur 2022. [DOI: 10.1016/j.cose.2022.102919] [Citation(s) in RCA: 1] [Impact Index Per Article: 0.5] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 01/22/2023]
16
Suo Z, Dong Y, Tong F, Jiang D, Fang X, Chen X. Semiconductor superlattice physical unclonable function based two-dimensional compressive sensing cryptosystem and its application to image encryption. Inf Sci (N Y) 2022. [DOI: 10.1016/j.ins.2022.10.059] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/09/2022]
17
Kaveh M, Mesgari MS. Application of Meta-Heuristic Algorithms for Training Neural Networks and Deep Learning Architectures: A Comprehensive Review. Neural Process Lett 2022;55:1-104. [PMID: 36339645 PMCID: PMC9628382 DOI: 10.1007/s11063-022-11055-6] [Citation(s) in RCA: 9] [Impact Index Per Article: 4.5] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Download PDF] [Figures] [Journal Information] [Subscribe] [Scholar Register] [Accepted: 10/11/2022] [Indexed: 12/02/2022]
18
Duan L, Xu C, Zhong S, Zhou H, Duan JA. Optical power auto-alignment method with eugenics sorting for enhancing the alignment speed and robustness of fiber-grating couplers. OPTICS EXPRESS 2022;30:39544-39560. [PMID: 36298904 DOI: 10.1364/oe.470642] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Received: 07/14/2022] [Accepted: 09/21/2022] [Indexed: 06/16/2023]
19
A Hybrid Deep Learning Model with Self-Improved Optimization Algorithm for Detection of Security Attacks in IoT Environment. FUTURE INTERNET 2022. [DOI: 10.3390/fi14100301] [Citation(s) in RCA: 1] [Impact Index Per Article: 0.5] [Reference Citation Analysis] [Abstract] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/17/2022]  Open
20
Li Y, Qin T, Huang Y, Lan J, Liang Z, Geng T. HDFEF: A hierarchical and dynamic feature extraction framework for intrusion detection systems. Comput Secur 2022. [DOI: 10.1016/j.cose.2022.102842] [Citation(s) in RCA: 1] [Impact Index Per Article: 0.5] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/03/2022]
21
Li K, Ma W, Duan H, Xie H, ZHU J. Few-shot IoT attack detection based on RFP-CNN and adversarial unsupervised domain-adaptive regularization. Comput Secur 2022. [DOI: 10.1016/j.cose.2022.102856] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/03/2022]
22
A novel hierarchical attention-based triplet network with unsupervised domain adaptation for network intrusion detection. APPL INTELL 2022. [DOI: 10.1007/s10489-022-04076-0] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/26/2022]
23
Fast anomaly detection with locality-sensitive hashing and hyperparameter autotuning. Inf Sci (N Y) 2022. [DOI: 10.1016/j.ins.2022.06.035] [Citation(s) in RCA: 2] [Impact Index Per Article: 1.0] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/21/2022]
24
Distributed parallel deep learning with a hybrid backpropagation-particle swarm optimization for community detection in large complex networks. Inf Sci (N Y) 2022. [DOI: 10.1016/j.ins.2022.03.053] [Citation(s) in RCA: 4] [Impact Index Per Article: 2.0] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/23/2022]
25
Zhao L, Zhang T, Peng X, Zhang X. A Novel Long-term Power Forecasting based Smart Grid Hybrid Energy Storage System Optimal Sizing Method Considering Uncertainties. Inf Sci (N Y) 2022. [DOI: 10.1016/j.ins.2022.07.161] [Citation(s) in RCA: 2] [Impact Index Per Article: 1.0] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/05/2022]
26
Boopathi M. Henry MaxNet: tversky index based feature selection and competitive swarm henry gas solubility optimization integrated Deep Maxout network for intrusion detection in IoT. INTERNATIONAL JOURNAL OF INTELLIGENT ROBOTICS AND APPLICATIONS 2022. [DOI: 10.1007/s41315-022-00234-2] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/30/2022]
27
A Particle Swarm Optimization Backtracking Technique Inspired by Science-Fiction Time Travel. AI 2022. [DOI: 10.3390/ai3020024] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/17/2022]  Open
28
Wang Y, Liu W, Liu X. Explainable AI techniques with application to NBA gameplay prediction. Neurocomputing 2022. [DOI: 10.1016/j.neucom.2022.01.098] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/27/2022]
29
IoT authentication model with optimized deep Q network for attack detection and mitigation. INTERNATIONAL JOURNAL OF INTELLIGENT ROBOTICS AND APPLICATIONS 2022. [DOI: 10.1007/s41315-022-00227-1] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 10/19/2022]
30
An Artificial Fish Swarm Scheme Based on Heterogeneous Pheromone for Emergency Evacuation in Social Networks. ELECTRONICS 2022. [DOI: 10.3390/electronics11040649] [Citation(s) in RCA: 1] [Impact Index Per Article: 0.5] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 02/05/2023]
31
Sound classification using evolving ensemble models and Particle Swarm Optimization. Appl Soft Comput 2022. [DOI: 10.1016/j.asoc.2021.108322] [Citation(s) in RCA: 3] [Impact Index Per Article: 1.5] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/20/2022]
32
Abnormal data detection of guidance angle based on SMP-SVDD for seeker. Sci Rep 2022;12:1509. [PMID: 35087183 PMCID: PMC8795151 DOI: 10.1038/s41598-022-05565-5] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Track Full Text] [Download PDF] [Figures] [Journal Information] [Subscribe] [Scholar Register] [Received: 10/21/2021] [Accepted: 12/10/2021] [Indexed: 11/09/2022]  Open
33
Fatani A, Dahou A, Al-qaness MAA, Lu S, Elaziz MA. Advanced Feature Extraction and Selection Approach Using Deep Learning and Aquila Optimizer for IoT Intrusion Detection System. SENSORS (BASEL, SWITZERLAND) 2021;22:140. [PMID: 35009682 PMCID: PMC8749550 DOI: 10.3390/s22010140] [Citation(s) in RCA: 31] [Impact Index Per Article: 10.3] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Download PDF] [Figures] [Subscribe] [Scholar Register] [Received: 11/27/2021] [Revised: 12/16/2021] [Accepted: 12/20/2021] [Indexed: 11/16/2022]
34
Liang W, Ning Z, Xie S, Hu Y, Lu S, Zhang D. Secure fusion approach for the Internet of Things in smart autonomous multi-robot systems. Inf Sci (N Y) 2021. [DOI: 10.1016/j.ins.2021.08.035] [Citation(s) in RCA: 4] [Impact Index Per Article: 1.3] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 10/20/2022]
35
Cheng S, Wu Y, Li Y, Yao F, Min F. TWD-SFNN: Three-way decisions with a single hidden layer feedforward neural network. Inf Sci (N Y) 2021. [DOI: 10.1016/j.ins.2021.07.091] [Citation(s) in RCA: 15] [Impact Index Per Article: 5.0] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 02/01/2023]
36
Time-Lag Selection for Time-Series Forecasting Using Neural Network and Heuristic Algorithm. ELECTRONICS 2021. [DOI: 10.3390/electronics10202518] [Citation(s) in RCA: 4] [Impact Index Per Article: 1.3] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 02/02/2023]
PrevPage 1 of 1 1Next
© 2004-2024 Baishideng Publishing Group Inc. All rights reserved. 7041 Koll Center Parkway, Suite 160, Pleasanton, CA 94566, USA