Towards asynchronous federated learning based threat detection: A DC-Adam approach
Published 2021 View Full Article
- Home
- Publications
- Publication Search
- Publication Details
Title
Towards asynchronous federated learning based threat detection: A DC-Adam approach
Authors
Keywords
Distributed threat detection, Federated learning, Cloud computing security, Edge computing security, Non-IID data
Journal
COMPUTERS & SECURITY
Volume 108, Issue -, Pages 102344
Publisher
Elsevier BV
Online
2021-05-27
DOI
10.1016/j.cose.2021.102344
References
Ask authors/readers for more resources
Related references
Note: Only part of the references are listed.- LSTM Based Phishing Detection for Big Email Data
- (2020) Qi Li et al. IEEE Transactions on Big Data
- Adaptive Federated Learning in Resource Constrained Edge Computing Systems
- (2019) Shiqiang Wang et al. IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS
- Outlier Dirichlet Mixture Mechanism: Adversarial Statistical Learning for Anomaly Detection in the Fog
- (2019) Nour Moustafa et al. IEEE Transactions on Information Forensics and Security
- Anomaly detection for wind turbines based on the reconstruction of condition parameters using stacked denoising autoencoders
- (2019) Junsheng Chen et al. RENEWABLE ENERGY
- On security challenges and open issues in Internet of Things
- (2018) Kewei Sha et al. Future Generation Computer Systems-The International Journal of eScience
- Data Integrity Attacks against Dynamic Route Guidance in Transportation-based Cyber-Physical Systems: Modeling, Analysis, and Defense
- (2018) Jie Lin et al. IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY
- A Survey on the Edge Computing for the Internet of Things
- (2018) Wei Yu et al. IEEE Access
- A Survey of Deep Learning: Platforms, Applications and Emerging Research Trends
- (2018) William Grant Hatcher et al. IEEE Access
- Fog/Edge Computing-Based IoT (FECIoT): Architecture, Applications, and Research Issues
- (2018) Babatunji Omoniwa et al. IEEE Internet of Things Journal
- A secure end-to-end IoT solution
- (2017) Avijit Mathur et al. SENSORS AND ACTUATORS A-PHYSICAL
- A Survey on Internet of Things: Architecture, Enabling Technologies, Security and Privacy, and Applications
- (2017) Jie Lin et al. IEEE Internet of Things Journal
- A New Deep-Q-Learning-Based Transmission Scheduling Mechanism for the Cognitive Internet of Things
- (2017) Jiang Zhu et al. IEEE Internet of Things Journal
- A Survey of Data Mining and Machine Learning Methods for Cyber Security Intrusion Detection
- (2016) Anna L. Buczak et al. IEEE Communications Surveys and Tutorials
- Towards Multistep Electricity Prices in Smart Grid Electricity Markets
- (2016) Jie Lin et al. IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS
- Internet of Things and Big Data Analytics for Smart and Connected Communities
- (2016) Yunchuan Sun et al. IEEE Access
- Behavior Rule Specification-Based Intrusion Detection for Safety Critical Medical Cyber Physical Systems
- (2015) Robert Mitchell et al. IEEE Transactions on Dependable and Secure Computing
- Internet of Things in Industries: A Survey
- (2014) Li Da Xu et al. IEEE Transactions on Industrial Informatics
- An integrated detection system against false data injection attacks in the Smart Grid
- (2014) Wei Yu et al. Security and Communication Networks
- Internet of Things for Smart Cities
- (2014) Andrea Zanella et al. IEEE Internet of Things Journal
- On False Data-Injection Attacks against Power System State Estimation: Modeling and Countermeasures
- (2013) Qingyu Yang et al. IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS
Publish scientific posters with Peeref
Peeref publishes scientific posters from all research disciplines. Our Diamond Open Access policy means free access to content and no publication fees for authors.
Learn MoreBecome a Peeref-certified reviewer
The Peeref Institute provides free reviewer training that teaches the core competencies of the academic peer review process.
Get Started