Computer Science ›› 2024, Vol. 51 ›› Issue (5): 363-373.doi: 10.11896/jsjkx.230300153
• Information Security • Previous Articles Next Articles
LI Shasha, XING Hongjie
CLC Number:
[1]WELLER-FAHY D J,BORGHETTI B J,SODEMANN A A.A Survey of Distance and Similarity Measures Used Within Network Intrusion Anomaly Detection [J].IEEE Communications Surveys & Tutorials,2014,17(1):70-91. [2]GEBREMESKEL G B,YI C,HE Z,et al.Combined Data Mining Techniques Based Patient Data Outlier Detection for Healthcare Safety [J].International Journal of Intelligent Computing and Cybernetics,2016,9(1):42-68. [3]RAMOTSOELA D,ABU-MAHFOUZ A,HANCKE G.A Survey of Anomaly Detection in Industrial Wireless Sensor Networks With Critical Water System Infrastructure as a Case Study [J].Sensors,2018,18(8):2491. [4]PIMENTEL M A F,CLIFTON D A,Clifton L,et al.A Review of Novelty Detection [J].Signal Processing,2014,99:215-249. [5]ILONEN J,PAALANEN P,KAMARAINEN J K,et al.Gaus-sian Mixture Pdf in One-Class Classification:Computing and Utilizing Confidence Values [C]//Proceedings of the 18th International Conference on Pattern Recognition.Hong Kong:IEEE,2006,2:577-580. [6]ZHANG B W,LIU Z,SANG G M.Anomaly Detection Algo-rithm Based on Kernel Density Fluctuation [J].Computer Engineering and Applications,2021,57(12):132-136. [7]DING P L.Anomaly Detection Based on K-Nearest NeighborIsolation Forest [J].Computer system application,2023,32(2):199-206. [8]FAN R,LI N.K-means Clustering Anomaly Detection Method Based on Feature Selection [J].Network Security Technology and Application,2018(4):25-26. [9]TURKOZ M,KIM S,SON Y,et al.Generalized Support Vector Data Description for Anomaly Detection [J].Pattern Recognition,2020,100:107-119. [10]KITTIDACHANAN K,MINSAN W,PORNNOPPARATH D,et al.Anomaly Detection Based on GS-OCSVM Classification [C]//Proceedings of the International Conference on Know-ledge and Smart Technology.Phuket:IEEE,2020:64-69. [11]SINGH S,MARKOU M.An Approach to Novelty DetectionApplied to the Classification of Image Regions [J].IEEE Tran-sactions on Knowledge and Data Engineering,2004,16(4):396-407. [12]LI W,WANG Y.A Robust Supervised Subspace Learning Approach for Output-Relevant Prediction and Detection Against Outliers [J].Journal of Process Control,2021,106:184-194. [13]CALLEGARI C,GIORDANO S,PAGANO M.An Information-Theoretic Method for the Detection of Anomalies in Network Traffic [J].Computers & Security,2017,70:351-365. [14]HINTON G E,SALAKHUTDINOV R R.Reducing the Dimensionality of Data With Neural Networks [J].Science,2006,313(5786):504-507. [15]GONG D,TAN M,ZHANG Y,et al.Blind Image Deconvolution by Automatic Gradient Activation [C]//Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition.Las Vegas:IEEE,2016:1827-1836. [16]XIA Y,CAO X,WEN F,et al.Learning Discriminative Reconstructions for Unsupervised Outlier Removal [C]//Proceedings of the IEEE International Conference on Computer Vision.Boston:IEEE,2015:1511-1519. [17]GONG D,LIU L,LE V,et al.Memorizing Normality to Detect Anomaly:Memory-Augmented Deep Autoencoder for Unsupervised Anomaly Detection [C]//Proceedings of the IEEE International Conference on Computer Vision.Seoul:IEEE,2019:1705-1714. [18]AN J,CHO S.Variational Autoencoder Based Anomaly Detection Using Reconstruction Probability [J].Special lecture on IE,2015,2(1):1-18. [19]ZHOU C,PAFFENROTH R C.Anomaly Detection With Ro-bust Deep Autoencoders[C]//Proceedings of the 23rd ACM SIGKDD International Conference on Knowledge Discovery and Data Mining.Halifax:IEEE,2017:665-674. [20]SZEGEDY C,ZAREMBA W,SUTSKEVER I,et al.Intriguing,Properties of Neural Networks[C]//Proceedings of the International Conference on Learning Representations.Banff:IEEE:2014. [21]GOODFELLOW I,SHLENS J,SZEGEDY C.Explaining andHarnessing Adversarial Examples[C]//Proceedings of the International Conference on Learning Representations.San Diego:IEEE,2015. [22]SALEHI M,ARYA A,PAJOUM B,et al.Arae:Adversarially Robust Training of Autoencoders Improves Novelty Detection [J].Neural Networks,2021,144:726-736. [23]ROBBINS H,MONRO S.A Stochastic Approximation Method [J].The Annals of Mathematical Statistics,1951,22(3):400-407. [24]YAN J L,XU Y,ZHANG S C,et al.A Survey of Adversarial Sample Attack and Defense Research on Image Classification Models [J].Computer Engineering and Application,2022,58(23):24-41. [25]KURAKIN A,GOODFELLOW I J,BENGIO S.Adversarial Examples in the Physical World [M]//Artificial Intelligence Safety and Security.Chapman and Hall/CRC,2018:99-112. [26]XIAO Y,PUN C M.Improving Adversarial Attacks on Deep Neural Networks Via Constricted Gradient-Based Perturbations[J].Information Sciences,2021,571:104-132. [27]MADRY A.MAKELOV A,SCHMIDT L,et al.Towards Deep Learning Models Resistant to Adversarial Attacks [C]//Proceedings of the International Conference on Learning Representations.Vancouver:IEEE,2018. [28]CARLINI N,WAGNER D.Towards Evaluating the Robustness of Neural Networks [C]//2017 IEEE Symposium on Security and Privacy.San Jose:IEEE,2017:39-57. [29]LIN C,HAN S,ZHU J,et al.Sensitive Region-Aware Black-Box Adversarial Attacks[J].Information Sciences,2023,637:118929. [30]PAPERNOT N,MCDANIEL P,GOODFELLOW I,et al.Practical Black-Box Attacks Against Machine Learning [C]//Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security.Dallas:ACM,2017:506-519. [31]ZHOU W,HOU X,CHEN Y,et al.Transferable Adversarial Perturbations [C]//Proceedings of the European Conference on Computer Vision.Munich:Springer,2018:452-467. [32]ZHAO H,CHANG Y K,WANG W J.Overview of Adversarial Attacks And Defense Methods of Deep Neural Networks [J].Computer Science,2022,49(S2):662-672. [33]LIAO F,LIANG M,DONG Y,et al.Defense Against Adversa-rial Attacks Using High-Level Representation Guided Denoiser [C]//Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition.Salt Lake City,IEEE:2018:1778-1787. [34]LIU S J,ZHANG Z X,ZHANG Q J.Adversarial Sample Defense Algorithm Based on Adversarial Training and Image Denoising [J].Computer Engineering and Design,2022,43(11):3093-3100. [35]JIA X,WEI X,CAO X,et al.Comdefend:An Efficient Image Compression Model to Defend Adversarial Examples [C]//Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition.Long Beach:IEEE,2019:6084-6092. [36]PRAKASH A,MORAN N,GARBER S,et al.Deflecting Adversarial Attacks With Pixel Deflection [C]//Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition.Salt Lake City:IEEE,2018:8571-8580. [37]JIA X,ZHANG Y,WU B,et al.LAS-AT:Adversarial Training With Learnable Attack Strategy [C]//Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition.New Orleans:IEEE,2022:13398-13408. [38]PAPERNOT N,MCDANIEL P,WU X,et al.Distillation as aDefense to Adversarial Perturbations Against Deep Neural Networks [C]//Proceedings of the IEEE Symposium on Security and Privacy.San Jose:IEEE,2016:582-597. [39]SAMANGOUEI P,KABKAB M,CHELLAPPA R.Defense-gan:Protecting Classifiers Against Adversarial Attacks Using Generative Models [C]//Proceedings of the International Conference on Learning Representations.Stockholm:ACM,2018. [40]MENG D,CHEN H.Magnet:A Two-Pronged Defense Against Adversarial Examples [C]//Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security.Dallas:ACM,2017:135-147. [41]CHEN R,CHEN J,ZHENG H,et al.Salient Feature Extractorfor Adversarial Defense on Deep Neural Networks[J].Information Sciences,2022,600:118-143. [42]DENG L.The Mnist Database of Handwritten Digit Images for Machine Learning Research [best of the web[J].IEEE Signal Processing Magazine,2012,29(6):141-142. [43]XIAO H,RASUL K,VOLLGRAF R.Fashion-Mnist:A NovelImage Dataset for Benchmarking Machine Learning Algorithms [J].arXiv:1708.07747,2017. [44]THAKKAR V,TEWARY S,CHAKRABORTY C.Batch Normalization in Convolutional Neural Networks-A Comparative Study With CIFAR-10 Data [C]//Proceedings of the International Conference on Emerging Applications of Information Technology.Islamabad:IEEE,2018:1-5. [45]LIU F T,TING K M,ZHOU Z H.Isolation Forest [C]//Proceedings of the EEE International Conference on Data Mining.Pisa:IEEE,2008:413-422. [46]RUFF L,VANDERMEULEN R,GOERNITZ N,et al.DeepOne-Class Classification [C]//Proceedings of the International Conference on Machine Learning.Stockholm:ACM,2018:4393-4402. [47]SCHLEGL T,SEEBÖCK P,WALDSTEIN S M,et al.F-anogan:Fast Unsupervised Anomaly Detection With Generative Adversarial Networks [J].Medical Image Analysis,2019,54:30-44. [48]AKCAY S,ATAPOUR-ABARGHOUEI A,BRECKON T P.Ganomaly:Semi-Supervised Anomaly Detection Via Adversarial Training [C]//Proceedings of the Asian Conference on Compu-ter Vision.Perth:Springer,2019:622-637. [49]ZONG B,SONG Q,MIN M R,et al.Deep Autoencoding Gau-ssian Mixture Model for Unsupervised Anomaly Detection [C]//Proceedings of the International Conference on Learning Representations.Vancouver:IEEE,2018. [50]HE K,ZHANG X,REN S,et al.Delving Deep into Rectifiers:Surpassing Human-Level Performance on Imagenet Classification [C]//Proceedings of the IEEE International Conference on Computer Vision.Santiago:IEEE,2015:1026-1034. [51]DIEDERIK K AND JIMMY B.Adam:A Method for Stochastic Optimization [C]//Proceedings of the International Conference on Learning Representations(ICLR).San Diego:IEEE,2015. [52]FAWCETT T.An Introduction to Roc Analysis [J].PatternRecognition Letters,2006,27(8):861-874. |
[1] | HAN Songyuan, WANG Hongxia, JIANG Ziyu. Robust and Multilayer Excel Document Watermarking for Source Tracing [J]. Computer Science, 2024, 51(5): 374-381. |
[2] | GE Yinchi, ZHANG Hui, SUN Haohang. Differential Privacy Data Synthesis Method Based on Latent Diffusion Model [J]. Computer Science, 2024, 51(3): 30-38. |
[3] | CHEN Jinyin, LI Xiao, JIN Haibo, CHEN Ruoxi, ZHENG Haibin, LI Hu. CheatKD:Knowledge Distillation Backdoor Attack Method Based on Poisoned Neuronal Assimilation [J]. Computer Science, 2024, 51(3): 351-359. |
[4] | HUANG Changxi, ZHAO Chengxin, JIANG Xiaoteng, LING Hefei, LIU Hui. Screen-shooting Resilient DCT Domain Watermarking Method Based on Deep Learning [J]. Computer Science, 2024, 51(2): 343-351. |
[5] | ZHOU Wenhao, HU Hongtao, CHEN Xu, ZHAO Chunhui. Weakly Supervised Video Anomaly Detection Based on Dual Dynamic Memory Network [J]. Computer Science, 2024, 51(1): 243-251. |
[6] | GUO Yuxing, YAO Kaixuan, WANG Zhiqiang, WEN Liangliang, LIANG Jiye. Black-box Graph Adversarial Attacks Based on Topology and Feature Fusion [J]. Computer Science, 2024, 51(1): 355-362. |
[7] | LI Qiaojun, ZHANG Wen, YANG Wei. Fusion Neural Network-based Method for Predicting LncRNA-disease Association [J]. Computer Science, 2023, 50(8): 226-232. |
[8] | ZHOU Fengfan, LING Hefei, ZHANG Jinyuan, XIA Ziwei, SHI Yuxuan, LI Ping. Facial Physical Adversarial Example Performance Prediction Algorithm Based on Multi-modal Feature Fusion [J]. Computer Science, 2023, 50(8): 280-285. |
[9] | LI Hui, LI Wengen, GUAN Jihong. Dually Encoded Semi-supervised Anomaly Detection [J]. Computer Science, 2023, 50(7): 53-59. |
[10] | HENG Hongjun, ZHOU Wenhua. Anomaly Detection Method Based on Context Information Fusion and Noise Adaptation [J]. Computer Science, 2023, 50(7): 237-245. |
[11] | LI Kun, GUO Wei, ZHANG Fan, DU Jiayu, YANG Meiyue. Adversarial Malware Generation Method Based on Genetic Algorithm [J]. Computer Science, 2023, 50(7): 325-331. |
[12] | SUN Kaiwei, WANG Zhihao, LIU Hu, RAN Xue. Maximum Overlap Single Target Tracking Algorithm Based on Attention Mechanism [J]. Computer Science, 2023, 50(6A): 220400023-5. |
[13] | ZHANG Guohua, YAN Xuefeng, GUAN Donghai. Anomaly Detection of Time-series Based on Multi-modal Feature Fusion [J]. Computer Science, 2023, 50(6A): 220700094-7. |
[14] | SUN Xuekui, DAI Hua, ZHOU Jianguo, YANG Geng, CHEN Yanli. LTTFAD:Log Template Topic Feature-based Anomaly Detection [J]. Computer Science, 2023, 50(6): 313-321. |
[15] | ZHAO Song, FU Hao, WANG Hongxing. Pseudo-abnormal Sample Selection for Video Anomaly Detection [J]. Computer Science, 2023, 50(5): 146-154. |
|