• Complex
  • Title
  • Keyword
  • Abstract
  • Scholars
  • Journal
  • ISSN
  • Conference
成果搜索
High Impact Results & Cited Count Trend for Year Keyword Cloud and Partner Relationship

Query:

学者姓名:刘延华

Refining:

Source

Submit Unfold

Co-

Submit Unfold

Language

Submit

Clean All

Sort by:
Default
  • Default
  • Title
  • Year
  • WOS Cited Count
  • Impact factor
  • Ascending
  • Descending
< Page ,Total 8 >
基于CA-WOA-BP算法的调度数据网鲁棒性预测
期刊论文 | 2025 , 19 (2) , 10-18 | 南方电网技术
Abstract&Keyword Cite

Abstract :

对电力网络鲁棒性进行评估与预测,有利于网络管理人员感知网络系统运行现状,及时采取措施应对可能的风险.为此提出了一种基于改进鲸鱼优化算法的电力调度数据网鲁棒性预测模型.首先,构建了电力调度数据网鲁棒性指标体系,并采用字段提取及公式映射等方法,实现了面向指标体系的数据降维处理;此外,进一步研究了基于混沌映射与自适应权重的WOA-BP改进算法(CA-WOA-BP),实现了电力网络鲁棒性预测方法.实验结果表明,与WOA-BP算法相比,所提出的改进算法加快了预测模型的收敛速度,并克服了陷入局部最优的情况,同时将预测值误差百分比降低了5.3%,有助于用户更准确及时地感知电力调度数据网系统鲁棒性的态势.

Keyword :

混沌映射 混沌映射 电力调度数据网 电力调度数据网 网络鲁棒性预测 网络鲁棒性预测 自适应权重 自适应权重 鲸鱼优化算法 鲸鱼优化算法

Cite:

Copy from the list or Export to your reference management。

GB/T 7714 陈斌 , 李泽科 , 余斯航 et al. 基于CA-WOA-BP算法的调度数据网鲁棒性预测 [J]. | 南方电网技术 , 2025 , 19 (2) : 10-18 .
MLA 陈斌 et al. "基于CA-WOA-BP算法的调度数据网鲁棒性预测" . | 南方电网技术 19 . 2 (2025) : 10-18 .
APA 陈斌 , 李泽科 , 余斯航 , 郭久煜 , 林碧海 , 刘延华 . 基于CA-WOA-BP算法的调度数据网鲁棒性预测 . | 南方电网技术 , 2025 , 19 (2) , 10-18 .
Export to NoteExpress RIS BibTex

Version :

Semi-supervised attack detection in industrial control systems with deviation networks and feature selection SCIE
期刊论文 | 2024 , 80 (10) , 14600-14621 | JOURNAL OF SUPERCOMPUTING
Abstract&Keyword Cite Version(2)

Abstract :

With the rapid development of Industry 4.0, the importance of cyber security for industrial control systems has become increasingly prominent. The complexity and diversity of industrial control systems result in data with high dimensionality and strong correlation, posing significant challenges in obtaining labeled data. However, current intrusion detection methods often demand large amounts of labeled data for effective training. To address this limitation, this paper proposes a semi-supervised anomaly detection framework, called SFSD, which leverages feature selection and deviation networks to detect anomalies in industrial control systems. Specifically, we introduce a feature selection algorithm (IG-PCA) that utilizes information gain and principal component analysis to reduce the dimensionality of features in industrial control data by eliminating redundant features. Then, we propose a semi-supervised learning method based on an improved deviation network, which utilizes an anomaly scoring network to learn end-to-end anomaly scores for the training data, thus assigning anomaly scores to each training data. Finally, using a limited amount of anomaly-labeled data, we design a specific deviation loss function to optimize the anomaly scoring network, enabling a significant score bias between positive and negative samples. Experimental results demonstrate that the proposed SFSD outperforms existing semi-supervised anomaly detection frameworks by improving the accuracy and detection rate by an average of 1-2%. Moreover, SFSD requires less training time compared to existing frameworks, resulting in a training time reduction of approximately 10% or more.

Keyword :

Feature selection Feature selection Industrial control systems Industrial control systems Intrusion detection Intrusion detection PCA PCA Semi-supervised learning Semi-supervised learning

Cite:

Copy from the list or Export to your reference management。

GB/T 7714 Liu, Yanhua , Deng, Wentao , Liu, Zhihuang et al. Semi-supervised attack detection in industrial control systems with deviation networks and feature selection [J]. | JOURNAL OF SUPERCOMPUTING , 2024 , 80 (10) : 14600-14621 .
MLA Liu, Yanhua et al. "Semi-supervised attack detection in industrial control systems with deviation networks and feature selection" . | JOURNAL OF SUPERCOMPUTING 80 . 10 (2024) : 14600-14621 .
APA Liu, Yanhua , Deng, Wentao , Liu, Zhihuang , Zeng, Fanhao . Semi-supervised attack detection in industrial control systems with deviation networks and feature selection . | JOURNAL OF SUPERCOMPUTING , 2024 , 80 (10) , 14600-14621 .
Export to NoteExpress RIS BibTex

Version :

Semi-supervised attack detection in industrial control systems with deviation networks and feature selection EI
期刊论文 | 2024 , 80 (10) , 14600-14621 | Journal of Supercomputing
Semi-supervised attack detection in industrial control systems with deviation networks and feature selection Scopus
期刊论文 | 2024 , 80 (10) , 14600-14621 | Journal of Supercomputing
SeCoSe: Toward Searchable and Communicable Healthcare Service Seeking in Flexible and Secure EHR Sharing SCIE
期刊论文 | 2024 , 19 , 4999-5014 | IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY
Abstract&Keyword Cite Version(2)

Abstract :

Cloud-assisted electronic health record (EHR) sharing plays an important role in modern healthcare systems but faces threats of distrust and non-traceability. The advent of blockchain offers an attractive solution to overcome this issue. Many efforts are devoted to promoting secure, flexible, and multi-featured blockchain-based EHR sharing. Yet, the problem of seeking out suitable healthcare providers and communicating information beyond the EHR has unfortunately been ignored. In this paper, we propose SeCoSe, a novel EHR sharing scheme to address these concerns. SeCoSe enables patients and their general practitioners to autonomously seek out and stay in touch with their preferred healthcare professionals. Specifically, a searchable and repeatable transformation identity-based encryption (SRTIBE) is proposed to achieve dynamic and flexible authorization updates. Moreover, we design attribute-identity mapping contracts and evidence-based contracts on the blockchain to enable on-demand retrieval of anonymous identities and ensure tamper resistance and traceability of system transactions. Furthermore, we employ the advanced messages on-chain protocol (AMOP) to facilitate the online communication of off-chain messages. Detailed security analysis and extensive evaluations demonstrate that SeCoSe is privacy-secure, traceable, and attack-resistant. SeCoSe has lower overhead for repeated authorization and transformation, on-chain transactions can be responded to within seconds, and online communication can handle the transmission of 49,000 messages in about 6 seconds.

Keyword :

blockchain blockchain Electronic health records Electronic health records healthcare service seeking healthcare service seeking identity-based encryption identity-based encryption smart contract smart contract

Cite:

Copy from the list or Export to your reference management。

GB/T 7714 Liu, Zhihuang , Hu, Ling , Cai, Zhiping et al. SeCoSe: Toward Searchable and Communicable Healthcare Service Seeking in Flexible and Secure EHR Sharing [J]. | IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY , 2024 , 19 : 4999-5014 .
MLA Liu, Zhihuang et al. "SeCoSe: Toward Searchable and Communicable Healthcare Service Seeking in Flexible and Secure EHR Sharing" . | IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY 19 (2024) : 4999-5014 .
APA Liu, Zhihuang , Hu, Ling , Cai, Zhiping , Liu, Ximeng , Liu, Yanhua . SeCoSe: Toward Searchable and Communicable Healthcare Service Seeking in Flexible and Secure EHR Sharing . | IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY , 2024 , 19 , 4999-5014 .
Export to NoteExpress RIS BibTex

Version :

SeCoSe: Toward Searchable and Communicable Healthcare Service Seeking in Flexible and Secure EHR Sharing EI
期刊论文 | 2024 , 19 , 4999-5014 | IEEE Transactions on Information Forensics and Security
SeCoSe: Toward Searchable and Communicable Healthcare Service Seeking in Flexible and Secure EHR Sharing Scopus
期刊论文 | 2024 , 19 , 4999-5014 | IEEE Transactions on Information Forensics and Security
Blockchain and trusted reputation assessment-based incentive mechanism for healthcare services SCIE
期刊论文 | 2024 , 154 , 59-71 | FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE
WoS CC Cited Count: 4
Abstract&Keyword Cite Version(2)

Abstract :

Blockchain-based healthcare IoT technology research enhances security for smart healthcare services such as real-time monitoring and remote disease diagnosis. To incentivize positive behavior among participants within a blockchain-based smart healthcare system, existing efforts employ benefit distribution and reputation assessment methods to enhance performance. Yet, there remains a significant gap in multidimensional assessment strategies and consensus improvements in addressing complex healthcare scenarios. In this paper, we propose a blockchain and trusted reputation assessment-based incentive mechanism for healthcare services (BtRaI). BtRaI provides a realistic and comprehensive reputation assessment with feedback to motivate blockchain consensus node participation, thus effectively defending against malicious behavior in the healthcare service system. Specifically, BtRaI first introduces multiple moderation factors for comprehensive multidimensional reputation assessment and credibly records the assessment results on the blockchain. Then, we propose an improved PBFT algorithm, grounded in the reputation assessment, to augment blockchain consensus efficiency. Finally, BtRaI designs a token-based reward and punishment mechanism to motivate honest participation in the blockchain, inhibit potential misbehavior, and promote enhanced service quality in the healthcare system. Theoretical analysis and simulation experiments conducted across various scenarios demonstrate that BtRaI effectively suppresses malicious attacks in healthcare services, improves blockchain node fault tolerance rates, and achieves blockchain transaction processing efficiency within 0.5 s in a 100-node consortium chain. BtRaI's reputation assessment and token incentive mechanism, characterized by realistic differentiation granularity and change curves, are well-suited for dynamic and complex healthcare service environments.

Keyword :

Blockchain Blockchain Consensus mechanism Consensus mechanism Healthcare Internet of Things Healthcare Internet of Things Incentive mechanism Incentive mechanism PBFT algorithm PBFT algorithm Reputation assessment Reputation assessment

Cite:

Copy from the list or Export to your reference management。

GB/T 7714 Liu, Yanhua , Liu, Zhihuang , Zhang, Qiu et al. Blockchain and trusted reputation assessment-based incentive mechanism for healthcare services [J]. | FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE , 2024 , 154 : 59-71 .
MLA Liu, Yanhua et al. "Blockchain and trusted reputation assessment-based incentive mechanism for healthcare services" . | FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE 154 (2024) : 59-71 .
APA Liu, Yanhua , Liu, Zhihuang , Zhang, Qiu , Su, Jinshu , Cai, Zhiping , Li, Xiaoyan . Blockchain and trusted reputation assessment-based incentive mechanism for healthcare services . | FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE , 2024 , 154 , 59-71 .
Export to NoteExpress RIS BibTex

Version :

Blockchain and trusted reputation assessment-based incentive mechanism for healthcare services EI
期刊论文 | 2024 , 154 , 59-71 | Future Generation Computer Systems
Blockchain and trusted reputation assessment-based incentive mechanism for healthcare services Scopus
期刊论文 | 2024 , 154 , 59-71 | Future Generation Computer Systems
基于联邦增量学习的SDN环境下DDoS攻击检测模型
期刊论文 | 2024 , 47 (12) , 2852-2866 | 计算机学报
Abstract&Keyword Cite Version(1)

Abstract :

SDN是一种被广泛应用的网络范式.面对DDoS攻击等网络安全威胁,在SDN中集成高效的DDoS攻击检测方法尤为重要.由于SDN集中控制的特性,集中式DDoS攻击检测方法在SDN环境中存在较高的安全风险,使得SDN的控制平面安全性受到了巨大挑战.此外,SDN环境中流量数据不断增加,导致复杂流量特征的更复杂化、不同实体之间严重的Non-IID分布等问题.这些问题对现有的基于联邦学习的检测模型准确性与鲁棒性的进一步提高造成严重阻碍.针对上述问题,本文提出了一种基于联邦增量学习的SDN环境下DDoS攻击检测模型.首先,为解决集中式DDoS攻击检测的安全风险与数据增量带来的Non-IID分布问题,本文提出了一种基于联邦增量学习的加权聚合算法,使用动态调整聚合权重的方式个性化适应不同子数据集增量情况,提高增量聚合效率.其次,针对SDN环境中复杂的流量特征,本文设计了一种基于LSTM的DDoS攻击检测方法,通过统计SDN环境中流量数据的时序特征,提取并学习数据的时序关特征的相关性,实现对流量特征数据的实时检测.最后,本文结合SDN集中管控特点,实现了SDN环境下的DDoS实时防御决策,根据DDoS攻击检测结果与网络实体信息,实现流规则实时下发,达到有效阻断DDoS攻击流量、保护拓扑重要实体并维护拓扑流量稳定的效果.本文将提出的模型在增量式DDoS攻击检测任务上与FedAvg、FA-FedAvg和FIL-IIoT三种方法进行性能对比实验.实验结果表明,本文提出方法相比于其他方法,在DDoS攻击检测准确率上提升5.06%~12.62%,F1-Score提升0.0565~0.1410.

Keyword :

DDoS攻击检测 DDoS攻击检测 网络安全 网络安全 联邦增量学习 联邦增量学习 联邦学习 联邦学习 软件定义网络 软件定义网络

Cite:

Copy from the list or Export to your reference management。

GB/T 7714 刘延华 , 方文昱 , 郭文忠 et al. 基于联邦增量学习的SDN环境下DDoS攻击检测模型 [J]. | 计算机学报 , 2024 , 47 (12) : 2852-2866 .
MLA 刘延华 et al. "基于联邦增量学习的SDN环境下DDoS攻击检测模型" . | 计算机学报 47 . 12 (2024) : 2852-2866 .
APA 刘延华 , 方文昱 , 郭文忠 , 赵宝康 , 黄维 . 基于联邦增量学习的SDN环境下DDoS攻击检测模型 . | 计算机学报 , 2024 , 47 (12) , 2852-2866 .
Export to NoteExpress RIS BibTex

Version :

基于联邦增量学习的SDN环境下DDoS攻击检测模型 Scopus
期刊论文 | 2024 , 47 (12) , 2852-2866 | 计算机学报
A Multimodal Knowledge Representation Method for Fake News Detection CPCI-S
期刊论文 | 2024 , 360-364 | 2024 4TH INTERNATIONAL CONFERENCE ON COMPUTER, CONTROL AND ROBOTICS, ICCCR 2024
Abstract&Keyword Cite Version(2)

Abstract :

To address the key challenge encountered in fake news detection, i.e., multimodal data is difficult to be effectively semantically represented due to its intrinsic heterogeneity, this paper proposes a multimodal knowledge representation method for fake news detection. First, visual feature extraction is performed for fake news image data, the relevant images are sliced into multiple blocks, and then visual modal features are obtained by linear projection layer mapping. This simplifies the feature extraction process and reduces the computational cost, which helps to improve the fake news recognition performance. Second, to meet the actual fake news detection needs, a long text representation method based on topic words is investigated for the text data in fake news. Finally, the multimodal representation of the same fake news data is optimized by establishing a connection between two different modalities, visual and text, and inputting it into a BiLSTM-Attention based network to achieve the fusion of multimodal features. The experiment selects the same fake news data of EANN model and uses four classical classification methods to verify the effect of knowledge representation and compare it with the fusion model ViLT which is not optimized for long text. The experiment proves that the accuracy rate of fake news detection using the multimodal representation proposed in this paper is improved by 7.4% compared to the EANN model, and by 9.3% compared to the ViLT representation.

Keyword :

fake news detection fake news detection feature extraction feature extraction feature fusion feature fusion multimodal representation multimodal representation

Cite:

Copy from the list or Export to your reference management。

GB/T 7714 Zeng, Fanhao , Yao, Jiaxin , Xu, Yijie et al. A Multimodal Knowledge Representation Method for Fake News Detection [J]. | 2024 4TH INTERNATIONAL CONFERENCE ON COMPUTER, CONTROL AND ROBOTICS, ICCCR 2024 , 2024 : 360-364 .
MLA Zeng, Fanhao et al. "A Multimodal Knowledge Representation Method for Fake News Detection" . | 2024 4TH INTERNATIONAL CONFERENCE ON COMPUTER, CONTROL AND ROBOTICS, ICCCR 2024 (2024) : 360-364 .
APA Zeng, Fanhao , Yao, Jiaxin , Xu, Yijie , Liu, Yanhua . A Multimodal Knowledge Representation Method for Fake News Detection . | 2024 4TH INTERNATIONAL CONFERENCE ON COMPUTER, CONTROL AND ROBOTICS, ICCCR 2024 , 2024 , 360-364 .
Export to NoteExpress RIS BibTex

Version :

A Multimodal Knowledge Representation Method for Fake News Detection EI
会议论文 | 2024 , 360-364
A Multimodal Knowledge Representation Method for Fake News Detection Scopus
其他 | 2024 , 360-364 | 2024 4th International Conference on Computer, Control and Robotics, ICCCR 2024
IGED: Towards Intelligent DDoS Detection Model Using Improved Generalized Entropy and DNN SCIE
期刊论文 | 2024 , 80 (2) | CMC-COMPUTERS MATERIALS & CONTINUA
Abstract&Keyword Cite Version(2)

Abstract :

As the scale of the networks continually expands, the detection of distributed denial of service (DDoS) attacks has become increasingly vital. We propose an intelligent detection model named IGED by using improved generalized entropy and deep neural network (DNN). The initial detection is based on improved generalized entropy to filter out as much normal traffic as possible, thereby reducing data volume. Then the fine detection is based on DNN to perform precise DDoS detection on the filtered suspicious traffic, enhancing the neural network's generalization capabilities. Experimental results show that the proposed method can efficiently distinguish normal traffic from DDoS traffic. Compared with the benchmark methods, our method reaches 99.9% on low-rate DDoS (LDDoS), flooded DDoS and CICDDoS2019 datasets in terms of both accuracy and efficiency in identifying attack flows while reducing the time by 17%, 31% and 8%.

Keyword :

DDoS DDoS DNN DNN improved generalized entropy improved generalized entropy real-time real-time

Cite:

Copy from the list or Export to your reference management。

GB/T 7714 Liu, Yanhua , Han, Yuting , Chen, Hui et al. IGED: Towards Intelligent DDoS Detection Model Using Improved Generalized Entropy and DNN [J]. | CMC-COMPUTERS MATERIALS & CONTINUA , 2024 , 80 (2) .
MLA Liu, Yanhua et al. "IGED: Towards Intelligent DDoS Detection Model Using Improved Generalized Entropy and DNN" . | CMC-COMPUTERS MATERIALS & CONTINUA 80 . 2 (2024) .
APA Liu, Yanhua , Han, Yuting , Chen, Hui , Zhao, Baokang , Wang, Xiaofeng , Liu, Ximeng . IGED: Towards Intelligent DDoS Detection Model Using Improved Generalized Entropy and DNN . | CMC-COMPUTERS MATERIALS & CONTINUA , 2024 , 80 (2) .
Export to NoteExpress RIS BibTex

Version :

IGED: Towards Intelligent DDoS Detection Model Using Improved Generalized Entropy and DNN Scopus
期刊论文 | 2024 , 80 (2) , 1851-1866 | Computers, Materials and Continua
IGED: Towards Intelligent DDoS Detection Model Using Improved Generalized Entropy and DNN EI
期刊论文 | 2024 , 80 (2) , 1851-1866 | Computers, Materials and Continua
Network intrusion detection via tri-broad learning system based on spatial-temporal granularity SCIE
期刊论文 | 2023 , 79 (8) , 9180-9205 | JOURNAL OF SUPERCOMPUTING
WoS CC Cited Count: 2
Abstract&Keyword Cite Version(2)

Abstract :

Network intrusion detection system plays a crucial role in protecting the integrity and availability of sensitive assets, where the detected traffic data contain a large amount of time, space, and statistical information. However, existing research lacks the utilization of spatial-temporal multi-granularity data features and the mutual support among different data features, thus making it difficult to specifically and accurately identify anomalies. Considering the distinctions among different granularities, we propose a framework called tri-broad learning system (TBLS), which can learn and integrate the three granular features. To explore the spatial-temporal connotation of the traffic information accurately, a feature dataset containing three granularities is constructed according to the characteristics of time, space, and data content. In this way, we use broad learning basic units to extract abstract features of different granularities and then express these features in different feature spaces to enhance them separately. We use a normal distribution initialization method in BLS to optimize the weights of feature nodes and enhancement nodes for better detection accuracy. The merits of our proposed model are exhibited on the UNSW-NB15, CIC-IDS-2017, CIC-DDoS-2019, and mixed traffic datasets. Experimental results show that TBLS outperforms the typical BLS in terms of various evaluation metrics and time consumption. Compared with other machine learning methods, TBLS achieves better performance metrics.

Keyword :

Broad learning system Broad learning system Network intrusion detection Network intrusion detection Spatial-temporal multi-granularity Spatial-temporal multi-granularity Traffic information Traffic information

Cite:

Copy from the list or Export to your reference management。

GB/T 7714 Li, Jieling , Zhang, Hao , Liu, Zhihuang et al. Network intrusion detection via tri-broad learning system based on spatial-temporal granularity [J]. | JOURNAL OF SUPERCOMPUTING , 2023 , 79 (8) : 9180-9205 .
MLA Li, Jieling et al. "Network intrusion detection via tri-broad learning system based on spatial-temporal granularity" . | JOURNAL OF SUPERCOMPUTING 79 . 8 (2023) : 9180-9205 .
APA Li, Jieling , Zhang, Hao , Liu, Zhihuang , Liu, Yanhua . Network intrusion detection via tri-broad learning system based on spatial-temporal granularity . | JOURNAL OF SUPERCOMPUTING , 2023 , 79 (8) , 9180-9205 .
Export to NoteExpress RIS BibTex

Version :

Network intrusion detection via tri-broad learning system based on spatial-temporal granularity EI
期刊论文 | 2023 , 79 (8) , 9180-9205 | Journal of Supercomputing
Network intrusion detection via tri-broad learning system based on spatial-temporal granularity Scopus
期刊论文 | 2023 , 79 (8) , 9180-9205 | Journal of Supercomputing
A Web Back-End Database Leakage Incident Reconstruction Framework Over Unlabeled Logs SCIE
期刊论文 | 2023 , 11 (1) , 237-252 | IEEE TRANSACTIONS ON EMERGING TOPICS IN COMPUTING
Abstract&Keyword Cite Version(2)

Abstract :

In this article, we propose a web back-end database leakage incident reconstruction framework (WeB-DLIR) over unlabeled logs, designed to improve the intelligence and automation of reconstructing web back-end database leakage incidents triggered by web-based attacks in unannotated logging environments. Using WeB-DLIR, analysts can reduce the manual workload of tracing and responding to data leakage incidents. Specifically, we first design web front-end and back-end anomaly identification methods based on neural network models with a pruning strategy and fine-grained grouping clustering analysis, respectively, for completely identifying web-related abnormal events in unlabeled logs. To remove redundant abnormal events and reduce subsequent inspection work for false alarm cases, we then propose an anomaly detection result decision fusion method (DFADR). Moreover, to visualize the attack chain reflected by abnormal events, based on the decision fusion results, we propose an attack graph modeling method that can reflect the basic process of data leakage from multiple perspectives. Finally, based on the modeling results, the topology of the data leakage scenario reconstruction can be completed by further auditing the relevant logs. Experimental results using real-world datasets show that the proposed WeB-DLIR is efficient and feasible for practical applications.

Keyword :

anomaly detection anomaly detection attack modeling attack modeling incident reconstruction incident reconstruction unlabeled logs unlabeled logs Web-related data leakage Web-related data leakage

Cite:

Copy from the list or Export to your reference management。

GB/T 7714 Liu, Yanhua , Liu, Zhihuang , Liu, Ximeng et al. A Web Back-End Database Leakage Incident Reconstruction Framework Over Unlabeled Logs [J]. | IEEE TRANSACTIONS ON EMERGING TOPICS IN COMPUTING , 2023 , 11 (1) : 237-252 .
MLA Liu, Yanhua et al. "A Web Back-End Database Leakage Incident Reconstruction Framework Over Unlabeled Logs" . | IEEE TRANSACTIONS ON EMERGING TOPICS IN COMPUTING 11 . 1 (2023) : 237-252 .
APA Liu, Yanhua , Liu, Zhihuang , Liu, Ximeng , Guo, Wenzhong . A Web Back-End Database Leakage Incident Reconstruction Framework Over Unlabeled Logs . | IEEE TRANSACTIONS ON EMERGING TOPICS IN COMPUTING , 2023 , 11 (1) , 237-252 .
Export to NoteExpress RIS BibTex

Version :

A Web Back-End Database Leakage Incident Reconstruction Framework Over Unlabeled Logs EI
期刊论文 | 2023 , 11 (1) , 237-252 | IEEE Transactions on Emerging Topics in Computing
A Web Back-End Database Leakage Incident Reconstruction Framework Over Unlabeled Logs Scopus
期刊论文 | 2023 , 11 (1) , 237-252 | IEEE Transactions on Emerging Topics in Computing
A network anomaly detection algorithm based on semi-supervised learning and adaptive multiclass balancing SCIE
期刊论文 | 2023 , 79 (18) , 20445-20480 | JOURNAL OF SUPERCOMPUTING
WoS CC Cited Count: 3
Abstract&Keyword Cite Version(2)

Abstract :

With the rapid development of network technology, the Internet has brought significant convenience to various sectors of society, holding a prominent position. Due to the unpredictable and severe consequences resulting from malicious attacks, the detection of anomalous network traffic has garnered considerable attention from researchers over the past few decades. Accurately labeling a sufficient amount of network traffic data as a training dataset within a short period of time is a challenging task, given the rapid and massive generation of network traffic data. Furthermore, the proportion of malicious attack traffic is relatively small compared to the overall traffic data, and the distribution of traffic data across different types of malicious attacks also varies significantly. To address the aforementioned challenges, this paper presents a novel network anomaly detection algorithm based on semi-supervised learning and adaptive multiclass balancing. Building upon the assumption of consistent distribution between labeled and unlabeled data, this paper introduces the multiclass split balancing strategy and the adaptive confidence threshold function. These innovative approaches aim to tackle the issue of the multiclass imbalanced in traffic data. By leveraging the mutually beneficial relationship between semi-supervised learning and ensemble learning, this paper presents the collaborative rotation forest algorithm. This algorithm is specifically designed to enhance performance of anomaly detection in an environment with label inadequacy. Several comparative experiments conducted on the NSL-KDD, UNSW-NB15, and ToN-IoT demonstrate that the proposed algorithm achieves significant improvements in performance. Specifically, it enhances precision by 1.5-5.7%, recall by 1.5-5.7%, and F-Measure by 1.4-4.3% compared to the state-of-the-art algorithms.

Keyword :

Anomaly detection Anomaly detection Class imbalance Class imbalance Ensemble learning Ensemble learning Network intrusion detection Network intrusion detection Semi-supervised learning Semi-supervised learning

Cite:

Copy from the list or Export to your reference management。

GB/T 7714 Zhang, Hao , Xiao, Zude , Gu, Jason et al. A network anomaly detection algorithm based on semi-supervised learning and adaptive multiclass balancing [J]. | JOURNAL OF SUPERCOMPUTING , 2023 , 79 (18) : 20445-20480 .
MLA Zhang, Hao et al. "A network anomaly detection algorithm based on semi-supervised learning and adaptive multiclass balancing" . | JOURNAL OF SUPERCOMPUTING 79 . 18 (2023) : 20445-20480 .
APA Zhang, Hao , Xiao, Zude , Gu, Jason , Liu, Yanhua . A network anomaly detection algorithm based on semi-supervised learning and adaptive multiclass balancing . | JOURNAL OF SUPERCOMPUTING , 2023 , 79 (18) , 20445-20480 .
Export to NoteExpress RIS BibTex

Version :

A network anomaly detection algorithm based on semi-supervised learning and adaptive multiclass balancing Scopus
期刊论文 | 2023 , 79 (18) , 20445-20480 | Journal of Supercomputing
A network anomaly detection algorithm based on semi-supervised learning and adaptive multiclass balancing EI
期刊论文 | 2023 , 79 (18) , 20445-20480 | Journal of Supercomputing
10| 20| 50 per page
< Page ,Total 8 >

Export

Results:

Selected

to

Format:
Online/Total:138/10115087
Address:FZU Library(No.2 Xuyuan Road, Fuzhou, Fujian, PRC Post Code:350116) Contact Us:0591-22865326
Copyright:FZU Library Technical Support:Beijing Aegean Software Co., Ltd. 闽ICP备05005463号-1