Computer Science ›› 2022, Vol. 49 ›› Issue (11): 293-301.doi: 10.11896/jsjkx.210800252
• Computer Network • Previous Articles Next Articles
WU Ji-sheng, HONG Zheng, MA Tian-tian, LIN Pei-hong
CLC Number:
[1]HE K M,ZHANG X Y,REN S Q,et al.Identity Mappings in Deep Residual Networks[C]//Proceedings of the European Conference on Computer Vision(ECCV).2016:630-645. [2]LOPEZ-MARTIN M,CARRO B,SANCHEZ-ESGUEVILLASA,et al.Network Traffic Classifier With Convolutional and Recurrent Neural Networks for Internet of Things[J].IEEE Access,2017,5:18042-18050. [3]CHUNG J Y,GULCEHRE C,CHO K,et al.Empirical Evaluation of Gated Recurrent Neural Networks on Sequence Modeling[J].arXiv:1412.3555,2014. [4]ZHENG C,XUE M Y,HONG T T,et al.DC-BiGRU_CNNModel for Short-text Classification[J].Computer Science,2019,46(11):186-192. [5]BAHDANAU D,CHO K,BENGIO Y.Neural Machine Translation by Jointly Learning to Align and Translate[J].arXiv:1409.0473,2014. [6]MAO J W,HU Y Q,JIANG D,et al.CBFS:A Clustering-Based Feature Selection Mechanism for Network Anomaly Detection[J].IEEE Access,2020,8:116216-116225. [7]MONSHIZADEH M,KHATRI V,GAMDOU M,et al.Improving Data Generalization With Variational Autoencoders for Network Traffic Anomaly Detection [J].IEEE Access,2021,9:56893-56907. [8]CHEN W X,LYU F,WU F,et al.Sequential Message Characterization for Early Classification of Encrypted Internet Traffic [J].IEEE Transactions on Vehicular Technology,2021,70(4):3746-3760. [9]LI D Q,WANG X,YU B,et al.Network Traffic Classification Method Based on One-Dimensional Convolution Neural Network[J].Computer Engineering and Applications,2020,56(3):94-99. [10]ISLAM F U,LIU G J,ZHAI J T,et al.VoIP Traffic Detection in Tunneled and Anonymous Networks Using Deep Learning [J].IEEE Access,2021,9:59783-59799. [11]FENG W B,HONG Z,WU L F,et al.Network Protocol Recognition Based on Convolutional Neural Network[J].China Communications,2020,17(4):125-139. [12]MA R L,QIN S J.Identification of unknown protocol trafficbased on deep learning[C]//2017 3rd IEEE International Conference on Computer and Communications(ICCC).2017:1195-1198. [13]WANG Y,ZHOU H Y,FENG H,et al.Network traffic classification method basing on CNN[J].Journal on Communications,2018,39(1):14-23. [14]RAN J,CHEN Y X,LI S L.Three-dimensional convolutional neural network based traffic classification for wireless communications[C]//2018 IEEE Global Conference on Signal and Information Processing(GlobalSIP).2018:624-627. [15]LIPPMAN R,CUNNINGHAM R,FRIED D,et al.Results of the DARPA 1998 offline intrusion detection evalution[OL].https://ll.mit.edu/ideval/files/RAID_1999a.pdf. [16]SHIRAVI A,SHIRAVI H,TAVALLAEE M,et al.Toward developing a systematic approach to generate benchmark datasets for intrusion detection[J].Computers & Security,2012,31(3):357-374. |
[1] | LIU Jie-ling, LING Xiao-bo, ZHANG Lei, WANG Bo, WANG Zhi-liang, LI Zi-mu, ZHANG Hui, YANG Jia-hai, WU Cheng-nan. Network Security Risk Assessment Framework Based on Tactical Correlation [J]. Computer Science, 2022, 49(9): 306-311. |
[2] | WANG Xin-tong, WANG Xuan, SUN Zhi-xin. Network Traffic Anomaly Detection Method Based on Multi-scale Memory Residual Network [J]. Computer Science, 2022, 49(8): 314-322. |
[3] | PENG Shuang, WU Jiang-jiang, CHEN Hao, DU Chun, LI Jun. Satellite Onboard Observation Task Planning Based on Attention Neural Network [J]. Computer Science, 2022, 49(7): 242-247. |
[4] | ZHAO Dong-mei, WU Ya-xing, ZHANG Hong-bin. Network Security Situation Prediction Based on IPSO-BiLSTM [J]. Computer Science, 2022, 49(7): 357-362. |
[5] | DENG Kai, YANG Pin, LI Yi-zhou, YANG Xing, ZENG Fan-rui, ZHANG Zhen-yu. Fast and Transmissible Domain Knowledge Graph Construction Method [J]. Computer Science, 2022, 49(6A): 100-108. |
[6] | DU Hong-yi, YANG Hua, LIU Yan-hong, YANG Hong-peng. Nonlinear Dynamics Information Dissemination Model Based on Network Media [J]. Computer Science, 2022, 49(6A): 280-284. |
[7] | GAO Rong-hua, BAI Qiang, WANG Rong, WU Hua-rui, SUN Xiang. Multi-tree Network Multi-crop Early Disease Recognition Method Based on Improved Attention Mechanism [J]. Computer Science, 2022, 49(6A): 363-369. |
[8] | LYU Peng-peng, WANG Shao-ying, ZHOU Wen-fang, LIAN Yang-yang, GAO Li-fang. Quantitative Method of Power Information Network Security Situation Based on Evolutionary Neural Network [J]. Computer Science, 2022, 49(6A): 588-593. |
[9] | HAN Hong-qi, RAN Ya-xin, ZHANG Yun-liang, GUI Jie, GAO Xiong, YI Meng-lin. Study on Cross-media Information Retrieval Based on Common Subspace Classification Learning [J]. Computer Science, 2022, 49(5): 33-42. |
[10] | ZHAO Ren-xing, XU Pin-jie, LIU Yao. ECG-based Atrial Fibrillation Detection Based on Deep Convolutional Residual Neural Network [J]. Computer Science, 2022, 49(5): 186-193. |
[11] | YU Xin, LIN Zhi-liang. Novel Neural Network for Dealing with a Kind of Non-smooth Pseudoconvex Optimization Problems [J]. Computer Science, 2022, 49(5): 227-234. |
[12] | AN Xin, DAI Zi-biao, LI Yang, SUN Xiao, REN Fu-ji. End-to-End Speech Synthesis Based on BERT [J]. Computer Science, 2022, 49(4): 221-226. |
[13] | QU Zhong, CHEN Wen. Concrete Pavement Crack Detection Based on Dilated Convolution and Multi-features Fusion [J]. Computer Science, 2022, 49(3): 192-196. |
[14] | SHI Yu-tao, SUN Xiao. Conversational Comprehension Model for Question Generation [J]. Computer Science, 2022, 49(3): 232-238. |
[15] | LI Hao, CAO Shu-yu, CHEN Ya-qing, ZHANG Min. User Trajectory Identification Model via Attention Mechanism [J]. Computer Science, 2022, 49(3): 308-312. |
|