• No results found

Detecting Network Intrusion through a Deep Learning Approach

N/A
N/A
Protected

Academic year: 2020

Share "Detecting Network Intrusion through a Deep Learning Approach"

Copied!
5
0
0

Loading.... (view fulltext now)

Full text

Loading

Figure

Figure 1: Two-staged process of self-taught learning: a) Unsupervised Feature Learning (UFL) on unlabeled data
Table 1: Traffic records distribution in the training and test data for normal and attack traffic Track Training Test
Figure 4: Precision, Recall, and F-Measure values using self-taught learning (STL) and soft-max regression (SMR)

References

Related documents

In recent years, deep artificial neural networks (including recurrent ones) have won numerous contests in pattern recognition and machine learning.. This historical survey

Basic Concepts Articial Intelligence Machine Learning Deep Learning Neural Models for Representation Learning General Architecture Convolutional Neural Network Recurrent Neural

而这正是在用一个采样取代了期望, ,以后得到的 CD-k 更新(等式(5.27))。这说 明 CD-k 的偏置为 。实验和理论都显示相比于

Yann LeCun
 Aaron Courville
 Olivier Delalleau
 Dumitru Erhan
 Pascal Vincent
 Geoffrey Hinton
 Joseph Turian
 Hugo Larochelle
 Nicolas Le Roux
.. Jerome Louradour


To achieve our aim of training supervised machine learning models for machine reading and comprehension, we must first find data.... Supervised Reading Comprehension: MCTest

RECURSIVE DEEP LEARNING FOR NATURAL LANGUAGE PROCESSING AND COMPUTER VISION A DISSERTATION SUBMITTED TO THE DEPARTMENT OF COMPUTER SCIENCE AND THE COMMITTEE ON GRADUATE STUDIES OF

Analysis or PCA (Pearson, 1901; Hotelling, 1933) is probably the oldest and most widely used. Interestingly, PCA may be reinterpreted from the three different viewpoints from

Hotelling, 1933), to illustrate the probabilistic, auto-encoder and manifold views of representation-learning. The three interpretations of PCA are the following: a) it is related