Search Results - "Phai, Vu Dinh"
-
1
A Deep Learning Approach to Network Intrusion Detection
Published in IEEE transactions on emerging topics in computational intelligence (01-02-2018)“…Network intrusion detection systems (NIDSs) play a crucial role in defending computer networks. However, there are concerns regarding the feasibility and…”
Get full text
Journal Article -
2
Genetic Programming for storm surge forecasting
Published in Ocean engineering (01-11-2020)“…Storm surge is a genuine common fiasco coming from the ocean. Therefore, an exact forecast of surges is a vital assignment to dodge property misfortunes and to…”
Get full text
Journal Article -
3
Constrained Twin Variational Auto-Encoder for Intrusion Detection in IoT Systems
Published in IEEE internet of things journal (15-04-2024)“…Intrusion detection systems (IDSs) play a critical role in protecting billions of IoT devices from malicious attacks. However, the IDSs for IoT devices face…”
Get full text
Journal Article -
4
Twin Variational Auto-Encoder for Representation Learning in IoT Intrusion Detection
Published in 2022 IEEE Wireless Communications and Networking Conference (WCNC) (10-04-2022)“…Intrusion detection systems (IDSs) play a pivotal role in defending IoT systems. However, developing a robust and efficient IDS is challenging due to the rapid…”
Get full text
Conference Proceeding -
5
Balanced Twin Auto-Encoder for IoT Intrusion Detection
Published in GLOBECOM 2022 - 2022 IEEE Global Communications Conference (04-12-2022)“…Intrusion detection systems (IDSs) provide an ef-fective solution for protecting loT systems. However, due to the massive number of loT devices (in billions)…”
Get full text
Conference Proceeding -
6
Behaviour-aware Malware Classification: Dynamic Feature Selection
Published in 2019 11th International Conference on Knowledge and Systems Engineering (KSE) (01-10-2019)“…Despite the continued advancements in security research, malware persists as being a major threat in this digital age. Malware detection is a primary defence…”
Get full text
Conference Proceeding -
7
Malware detection based on directed multi-edge dataflow graph representation and convolutional neural network
Published in 2019 11th International Conference on Knowledge and Systems Engineering (KSE) (01-10-2019)“…In recent years, malware has grown constantly in both quantity and complexity. Traditional malware detection methods such as string search, hash code…”
Get full text
Conference Proceeding -
8
Deep learning combined with de-noising data for network intrusion detection
Published in 2017 21st Asia Pacific Symposium on Intelligent and Evolutionary Systems (IES) (01-11-2017)“…Anomaly-based Network Intrusion Detection Systems (NIDSs) are a common security defense for modern networks. The success of their operation depends upon vast…”
Get full text
Conference Proceeding -
9
An empirical study of anomaly detection in online games
Published in 2016 3rd National Foundation for Science and Technology Development Conference on Information and Computer Science (NICS) (01-09-2016)“…In data mining, anomaly detection aims to identify the data samples that do not conform to an expected behavior. Anomaly detection has successfully been…”
Get full text
Conference Proceeding -
10
Multiple-Input Auto-Encoder for IoT Intrusion Detection Systems with Heterogeneous Data
Published in ICC 2024 - IEEE International Conference on Communications (09-06-2024)“…Machine learning is a core component of many Intrusion Detection Systems (IDS) for IoT networks. However, developing a robust machine-learning model for IDSs…”
Get full text
Conference Proceeding -
11
Multiple-Input Auto-Encoder Guided Feature Selection for IoT Intrusion Detection Systems
Published 21-03-2024“…While intrusion detection systems (IDSs) benefit from the diversity and generalization of IoT data features, the data diversity (e.g., the heterogeneity and…”
Get full text
Journal Article -
12
Twin Auto-Encoder Model for Learning Separable Representation in Cyberattack Detection
Published 21-03-2024“…Representation Learning (RL) plays a pivotal role in the success of many problems including cyberattack detection. Most of the RL methods for cyberattack…”
Get full text
Journal Article -
13
Constrained Twin Variational Auto-Encoder for Intrusion Detection in IoT Systems
Published 04-12-2023“…Intrusion detection systems (IDSs) play a critical role in protecting billions of IoT devices from malicious attacks. However, the IDSs for IoT devices face…”
Get full text
Journal Article