[go: up one dir, main page]

Wong et al., 2021 - Google Patents

An rfml ecosystem: Considerations for the application of deep learning to spectrum situational awareness

Wong et al., 2021

View PDF
Document ID
996066013219140130
Author
Wong L
Clark W
Flowers B
Buehrer R
Headley W
Michaels A
Publication year
Publication venue
IEEE Open Journal of the Communications Society

External Links

Snippet

While deep learning (DL) technologies are now pervasive in state-of-the-art Computer Vision (CV) and Natural Language Processing (NLP) applications, only in recent years have these technologies started to sufficiently mature in applications related to wireless …
Continue reading at ieeexplore.ieee.org (PDF) (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06NCOMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
    • G06N99/00Subject matter not provided for in other groups of this subclass
    • G06N99/005Learning machines, i.e. computer in which a programme is changed according to experience gained by the machine itself during a complete run
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06KRECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K9/00Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
    • G06K9/62Methods or arrangements for recognition using electronic means
    • G06K9/6267Classification techniques
    • G06K9/6279Classification techniques relating to the number of classes
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06KRECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K9/00Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
    • G06K9/62Methods or arrangements for recognition using electronic means
    • G06K9/6267Classification techniques
    • G06K9/6268Classification techniques relating to the classification paradigm, e.g. parametric or non-parametric approaches
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06KRECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K9/00Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
    • G06K9/62Methods or arrangements for recognition using electronic means
    • G06K9/6217Design or setup of recognition systems and techniques; Extraction of features in feature space; Clustering techniques; Blind source separation
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06NCOMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
    • G06N5/00Computer systems utilising knowledge based models
    • G06N5/02Knowledge representation
    • G06N5/022Knowledge engineering, knowledge acquisition
    • G06N5/025Extracting rules from data
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1425Traffic logging, e.g. anomaly detection
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/57Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
    • G06F21/577Assessing vulnerabilities and evaluating computer system security
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1433Vulnerability analysis
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06NCOMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
    • G06N7/00Computer systems based on specific mathematical models
    • G06N7/005Probabilistic networks

Similar Documents

Publication Publication Date Title
Wong et al. An rfml ecosystem: Considerations for the application of deep learning to spectrum situational awareness
Wong et al. The RFML ecosystem: A look at the unique challenges of applying deep learning to radio frequency applications
Zhang et al. Deep learning based attack detection for cyber-physical system cybersecurity: A survey
Adesina et al. Adversarial machine learning in wireless communications using RF data: A review
Bangui et al. A hybrid machine learning model for intrusion detection in VANET
Hazman et al. lIDS-SIoEL: intrusion detection framework for IoT-based smart environments security using ensemble learning
Chou et al. A survey on data-driven network intrusion detection
Van Der Heijden et al. Veremi: A dataset for comparable evaluation of misbehavior detection in vanets
Rezaei Using ensemble learning technique for detecting botnet on IoT
Muthubalaji et al. An intelligent big data security framework based on aefs-kenn algorithms for the detection of cyber-attacks from smart grid systems
Gebremariam et al. Design of advanced intrusion detection systems based on hybrid machine learning techniques in hierarchically wireless sensor networks
Vu et al. Applications of generative AI (GAI) for mobile and wireless networking: A survey
Yang et al. Enabling automl for zero-touch network security: Use-case driven analysis
Ibrahim et al. Intrusion detection system for cloud based software-defined networks
Soflaei et al. Enhancing network intrusion detection: a dual-ensemble approach with CTGAN-balanced data and weak classifiers
Rohini et al. Intrusion detection system with an ensemble learning and feature selection framework for IoT networks
AL-Syouf et al. Machine learning approaches to intrusion detection in unmanned aerial vehicles (UAVs)
Peng et al. Raft: A real-time framework for root cause analysis in 5g and beyond vulnerability detection
Saied et al. A comparative analysis of using ensemble trees for botnet detection and classification in IoT
Zheng et al. Recent advances in automatic modulation classification technology: Methods, results, and prospects
Yang et al. Diving Into Zero-Touch Network Security: Use-Case Driven Analysis
El-Shafai et al. AI-Driven Ensemble Classifier for Jamming Attack Detection in VANETs to Enhance Security in Smart Cities
Vu et al. Enhancing network attack detection across infrastructures: An automatic labeling method and deep learning model with an attention mechanism
Ashok et al. A novel grasshopper optimization-based particle swarm algorithm for effective spectrum sensing in cognitive radio networks
Hasan et al. Adversarial Attacks on Deep Learning-based Network Intrusion Detection Systems: A Taxonomy and Review