Towards improving detection performance for malware with a correntropy-based deep learning method
Tài liệu tham khảo
Lee, 2008, Cyber physical systems: design challenges, 363
Ochoa, 2017, Cyber-physical systems, internet of things and big data, Future Generat. Comput. Syst., 75, 82, 10.1016/j.future.2017.05.040
Wang, 2019, Fog-based computing and storage offloading for data synchronization in iot, IEEE Internet Things J., 6, 4272, 10.1109/JIOT.2018.2875915
Ma, 2019, An iot-based task scheduling optimization scheme considering the deadline and cost-aware scientific workflow for cloud computing, EURASIP J. Wirel. Commun. Netw., 249, 10.1186/s13638-019-1557-3
Zhang, 2019, Modeling iot equipment with graph neural networks, IEEE Access, 7, 32754, 10.1109/ACCESS.2019.2902865
Chen, 2017, Special issue on situation, activity, and goal awareness in cyber-physical human-machine systems, IEEE Trans. Human-Machine Syst., 47, 305, 10.1109/THMS.2017.2689178
Neuman, 2009, Challenges in security for cyber-physical systems, 22
Stolfo, 2005
Thakar, 2016, System and method to detect domain generation algorithm malware and systems infected by such malware, 14/466, 806
Taylor, 2001, Nate - network analysis of anomalous traffic events, a low-cost approach, 89
Xiao, 2019, Android malware detection based on system call sequences and lstm, Multimed. Tool. Appl., 78, 3979, 10.1007/s11042-017-5104-0
Peiravian, 2013, Machine learning for android malware detection using permission and api calls, 300
Ding, 2019, Malware detection based on deep learning algorithm, Neural Comput. Appl., 31, 461, 10.1007/s00521-017-3077-6
Luo, 2019, User behavior prediction in social networks using weighted extreme learning machine with distribution optimization, Future Generat. Comput. Syst., 93, 1023, 10.1016/j.future.2018.04.085
Luo, 2020, A robust multilayer extreme learning machine using kernel risk-sensitive loss criterion, Int. J. Mach. Learn. Cybernet., 11, 197, 10.1007/s13042-019-00967-w
Sun, 2020, Categorizing malware via a word2vec-based temporal convolutional network scheme, J. Cloud Comput., 9, 53, 10.1186/s13677-020-00200-y
Tobiyama, 2016, Malware detection with deep neural network using process behavior, vol. 2, 577
Liu, 2006, Correntropy: a localized similarity measure, 4919
Gunduz, 2009, Correntropy as a novel measure for nonlinearity tests, Signal Process., 89, 14, 10.1016/j.sigpro.2008.07.005
Luo, 2018, Towards enhancing stacked extreme learning machine with sparse autoencoder by correntropy, J. Franklin Inst., 355, 1945, 10.1016/j.jfranklin.2017.08.014
Chen, 2018, Generalized correntropy based deep learning in presence of non-Gaussian noises, Neurocomputing, 278, 41, 10.1016/j.neucom.2017.06.080
Luo, 2018, Short-term wind speed forecasting via stacked extreme learning machine with generalized correntropy, IEEE Trans. Ind. Inf., 14, 4963, 10.1109/TII.2018.2854549
Chen, 2019, A novel human activity recognition scheme for smart health using multilayer extreme learning machine, IEEE Internet Things J., 6, 1410, 10.1109/JIOT.2018.2856241
Chen, 2018, Mixture correntropy for robust learning, Pattern Recogn., 79, 318, 10.1016/j.patcog.2018.02.010
LeCun, 1995, Convolutional networks for images, speech, and time series
Príncipe, 2010
Liu, 2007, Correntropy: properties and applications in non-Gaussian signal processing, IEEE Trans. Signal Process., 55, 5286, 10.1109/TSP.2007.896065
Krizhevsky, 2017, Imagenet classification with deep convolutional neural networks, Commun. ACM, 60, 84, 10.1145/3065386
Maturana, 2015, Voxnet: a 3d convolutional neural network for real-time object recognition, 922
Kim, 2014, Convolutional neural networks for sentence classification, 1746
Yuan, 2014, Droid-sec: deep learning in android malware detection, 371
Kolosnjaji, 2016, Deep learning for classification of malware system call sequences, 137
Pascanu, 2015, Malware classification with recurrent networks, 1916
Dahl, 2013, Large-scale malware classification using random projections and neural networks, 3422
Singh, 2014, The c-loss function for pattern classification, Pattern Recogn., 47, 441, 10.1016/j.patcog.2013.07.017
Lin, 2004, A note on margin-based loss functions in classification, Stat. Probab. Lett., 68, 73, 10.1016/j.spl.2004.03.002
Shankarapani, 2011, Malware detection using assembly and api call sequences, J. Comput. Virol., 7, 107, 10.1007/s11416-010-0141-5
Idika, 2007
Xiao, 2017
Nataraj, 2011, Malware images: visualization and automatic classification, 1