Computer Science ›› 2021, Vol. 48 ›› Issue (7): 47-54.doi: 10.11896/jsjkx.210400021
Special Issue: Artificial Intelligence Security
• Artificial Intelligence Security • Previous Articles Next Articles
LI Bei-bei, SONG Jia-rui, DU Qing-yun, HE Jun-jiang
CLC Number:
[1]ZHOU W G. Analysis of Hidden Dangers of Industrial Internet of Things and Exploration of Protection Strategies[J].Electro-nics World,2019(21):13-18. [2]LING M H,YAU K L A,QADIR J,et al.Application of reinforcement learning for security enhancement in cognitive radio networks[J].Applied Soft Computing,2015,37:809-829. [3]LU X,XIAO L,XU T,et al.Reinforcement Learning BasedPHY Authentication for VANETs[J].IEEE Transactions on Vehicular Technology,2020,69(3):3068-3079. [4]LOPEZ-MARTIN M,CARRO B,SANCHEZ-ESGUEVILLASA.Application of deep reinforcement learning to intrusion detection for supervised problems[J].Expert Systems with Applications,2020,141:112963. [5]HSU Y F,MATSUOKA M.A Deep Reinforcement LearningApproach for Anomaly Network Intrusion Detection System[C]//2020 IEEE 9th International Conference on Cloud Networking (CloudNet).2020:1-6. [6]PENG A N,ZHOU W,JIA Y,et al. Overview of Research on Security of Internet of Things Operating System[J]. Journal on Communications,2018,39(3):22-34. [7]AL-HAWAWREH M,MOUSTAFA N,SITNIKOVA E.Identification of malicious activities in industrial internet of things based on deep learning models[J].Journal of Information Secu-rity and Applications,2018,41:1-11. [8]ROY B,CHEUNG H.A Deep Learning Approach for Intrusion Detection in Internet of Things using Bi-Directional Long Short-Term Memory Recurrent Neural Network[C]//28th International Telecommunication Networks and Applications Confe-rence (ITNAC).2018:1-6. [9]YANG H,CHENG L,CHUAH M C.Deep-Learning-BasedNetwork Intrusion Detection for SCADA Systems[C]//2019 IEEE Conference on Communications and Network Security (CNS).Washington,DC,USA:IEEE,2019:3-5. [10]ISMAIL M,SHAABAN M,NAIDU M,et al.Deep LearningDetection of Electricity Theft Cyber-Attacks in Renewable Distributed Generation[C]//IEEE Transactions on Smart Grid,2020:3428-3431. [11]LI B,WU Y,SONG J,et al.DeepFed:Federated Deep Learning for Intrusion Detection in Industrial Cyber-Physical Systems[J].IEEE Transactions on Industrial Informatics,2021,17(8):5615-5624. [12]KURT M N,OGUNDIJO O,LI C,et al.Online Cyber-Attack Detection in Smart Grid:A Reinforcement Learning Approach[J].IEEE Transactions on Smart Grid,2019,10(5):5174-5185. [13]SETHI K,EDUPUGANTI S,KUMAR R,et al.A context-aware robust intrusion detection system:a reinforcement learning-based approach[J].International Journal of Information Security,2020,19:657-678. [14]OTOUM S,KANTARCI B,MOUFTAH H.Empowering Reinforcement Learning on Big Sensed Data for Intrusion Detection[C]//2019 IEEE International Conference on Communications(ICC 2019).2019:1-7. [15]CAMINERO G,LOPEZ-MARTIN M,CARRO B.Adversarialenvironment reinforcement learning algorithm for intrusion detection[J].Computer Networks,2019,159:96-109. [16]SONG J,LI B,WU Y,et al.ReAL:A New ResNet-ALSTM Based Intrusion Detection System for the Internet of Energy[C]//2020 IEEE 45th Conference on Local Computer Networks (LCN).2020:491-496. [17]NAHLER G.Pearson correlation coefficient[J].Dictionary of Pharmaceutical Medicine,2009,1025:132-132. [18]WANG H,CHEN H Y,LIU S F.Intrusion Detection SystemBased on Improved Naive Bayes Algorithm[J].Computer Scien-ce,2014,41(4):111-115,119. [19]WU Y,MANSIMOV E,LIAO S.Scalable Trust-Region Method for Deep Reinforcement Learning Using Kronecker-Factored Approximation[C]//Proceedings of the 31st International Conference on Neural Information Processing Systems.California:Curran Associates Inc,2017:5285-5294. [20]MNIH V,BADIA A P,MIRZA M,et al.Asynchronous Me-thods for Deep Reinforcement Learning[C]//International Conference on Machine Learning(PMLR 2016).2016:1928-1937. [21]SCHULMAN J,WOLSKI F,DHARIWAL P.Proximal Policy Optimization Algorithms[EB/OL].http://arxiv.org/abs/1707.06347. [22]HILL A.Stable-baselines[EB/OL].(2021).https://stablebase-lines.readthedocs.io/en/master/. [23]MORRIS T,GAO W.Industrial Control System Traffic DataSets for Intrusion Detection Research[C]//International Conference on Critical Infrastructure Protection.Berlin,Heidelberg:Springer,2014:65-78. [24]VAN HASSELT H,GUEZ A,SILVER D.Deep Reinforcement Learning with Double Q-learning[EB/OL].http://arxiv.org/abs/1509.06461v2. [25]MIRZA A,COSAN S.Computer network intrusion detectionusing sequential LSTM Neural Networks autoencoders[C]//2018 26th Signal Processing and Communications Applications Conference (SIU).Izmir,Turkey:IEEE,2018:2-5. [26]MELIBOYEV A,ALIKHANOV J,KIM W.1D CNN BasedNetwork Intrusion Detection with Normalization on Imbalanced Data[EB/OL].http://arxiv.org/abs/2003.00476v2. [27]YIN C L,ZHU Y F,FEI J L,et al.A Deep Learning Approach for Intrusion Detection Using Recurrent Neural Networks[J].IEEE Access,2017,5:21954-21961. |
[1] | WANG Lei, LI Xiao-yu. LBS Mobile Privacy Protection Scheme Based on Random Onion Routing [J]. Computer Science, 2022, 49(9): 347-354. |
[2] | YU Bin, LI Xue-hua, PAN Chun-yu, LI Na. Edge-Cloud Collaborative Resource Allocation Algorithm Based on Deep Reinforcement Learning [J]. Computer Science, 2022, 49(7): 248-253. |
[3] | LI Meng-fei, MAO Ying-chi, TU Zi-jian, WANG Xuan, XU Shu-fang. Server-reliability Task Offloading Strategy Based on Deep Deterministic Policy Gradient [J]. Computer Science, 2022, 49(7): 271-279. |
[4] | TAO Li-jing, QIU Han, ZHU Jun-hu, LI Hang-tian. Model for the Description of Trainee Behavior for Cyber Security Exercises Assessment [J]. Computer Science, 2022, 49(6A): 480-484. |
[5] | WEI Hui, CHEN Ze-mao, ZHANG Li-qiang. Anomaly Detection Framework of System Call Trace Based on Sequence and Frequency Patterns [J]. Computer Science, 2022, 49(6): 350-355. |
[6] | XIE Wan-cheng, LI Bin, DAI Yue-yue. PPO Based Task Offloading Scheme in Aerial Reconfigurable Intelligent Surface-assisted Edge Computing [J]. Computer Science, 2022, 49(6): 3-11. |
[7] | Ran WANG, Jiang-tian NIE, Yang ZHANG, Kun ZHU. Clustering-based Demand Response for Intelligent Energy Management in 6G-enabled Smart Grids [J]. Computer Science, 2022, 49(6): 44-54. |
[8] | HONG Zhi-li, LAI Jun, CAO Lei, CHEN Xi-liang, XU Zhi-xiong. Study on Intelligent Recommendation Method of Dueling Network Reinforcement Learning Based on Regret Exploration [J]. Computer Science, 2022, 49(6): 149-157. |
[9] | LI Peng, YI Xiu-wen, QI De-kang, DUAN Zhe-wen, LI Tian-rui. Heating Strategy Optimization Method Based on Deep Learning [J]. Computer Science, 2022, 49(4): 263-268. |
[10] | OUYANG Zhuo, ZHOU Si-yuan, LYU Yong, TAN Guo-ping, ZHANG Yue, XIANG Liang-liang. DRL-based Vehicle Control Strategy for Signal-free Intersections [J]. Computer Science, 2022, 49(3): 46-51. |
[11] | DAI Shan-shan, LIU Quan. Action Constrained Deep Reinforcement Learning Based Safe Automatic Driving Method [J]. Computer Science, 2021, 48(9): 235-243. |
[12] | CHENG Zhao-wei, SHEN Hang, WANG Yue, WANG Min, BAI Guang-wei. Deep Reinforcement Learning Based UAV Assisted SVC Video Multicast [J]. Computer Science, 2021, 48(9): 271-277. |
[13] | ZHOU Shi-cheng, LIU Jing-ju, ZHONG Xiao-feng, LU Can-ju. Intelligent Penetration Testing Path Discovery Based on Deep Reinforcement Learning [J]. Computer Science, 2021, 48(7): 40-46. |
[14] | LIANG Jun-bin, ZHANG Hai-han, JIANG Chan, WANG Tian-shu. Research Progress of Task Offloading Based on Deep Reinforcement Learning in Mobile Edge Computing [J]. Computer Science, 2021, 48(7): 316-323. |
[15] | WANG Ying-kai, WANG Qing-shan. Reinforcement Learning Based Energy Allocation Strategy for Multi-access Wireless Communications with Energy Harvesting [J]. Computer Science, 2021, 48(7): 333-339. |
|