Wong et al., 2021 - Google Patents
An rfml ecosystem: Considerations for the application of deep learning to spectrum situational awarenessWong et al., 2021
View PDF- Document ID
- 996066013219140130
- Author
- Wong L
- Clark W
- Flowers B
- Buehrer R
- Headley W
- Michaels A
- Publication year
- Publication venue
- IEEE Open Journal of the Communications Society
External Links
Snippet
While deep learning (DL) technologies are now pervasive in state-of-the-art Computer Vision (CV) and Natural Language Processing (NLP) applications, only in recent years have these technologies started to sufficiently mature in applications related to wireless …
- 238000001228 spectrum 0 title abstract description 28
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06N—COMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
- G06N99/00—Subject matter not provided for in other groups of this subclass
- G06N99/005—Learning machines, i.e. computer in which a programme is changed according to experience gained by the machine itself during a complete run
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06K—RECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K9/00—Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
- G06K9/62—Methods or arrangements for recognition using electronic means
- G06K9/6267—Classification techniques
- G06K9/6279—Classification techniques relating to the number of classes
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06K—RECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K9/00—Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
- G06K9/62—Methods or arrangements for recognition using electronic means
- G06K9/6267—Classification techniques
- G06K9/6268—Classification techniques relating to the classification paradigm, e.g. parametric or non-parametric approaches
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06K—RECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K9/00—Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
- G06K9/62—Methods or arrangements for recognition using electronic means
- G06K9/6217—Design or setup of recognition systems and techniques; Extraction of features in feature space; Clustering techniques; Blind source separation
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06N—COMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
- G06N5/00—Computer systems utilising knowledge based models
- G06N5/02—Knowledge representation
- G06N5/022—Knowledge engineering, knowledge acquisition
- G06N5/025—Extracting rules from data
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1425—Traffic logging, e.g. anomaly detection
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/57—Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
- G06F21/577—Assessing vulnerabilities and evaluating computer system security
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1433—Vulnerability analysis
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06N—COMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
- G06N7/00—Computer systems based on specific mathematical models
- G06N7/005—Probabilistic networks
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Wong et al. | An rfml ecosystem: Considerations for the application of deep learning to spectrum situational awareness | |
Wong et al. | The RFML ecosystem: A look at the unique challenges of applying deep learning to radio frequency applications | |
Zhang et al. | Deep learning based attack detection for cyber-physical system cybersecurity: A survey | |
Adesina et al. | Adversarial machine learning in wireless communications using RF data: A review | |
Bangui et al. | A hybrid machine learning model for intrusion detection in VANET | |
Hazman et al. | lIDS-SIoEL: intrusion detection framework for IoT-based smart environments security using ensemble learning | |
Chou et al. | A survey on data-driven network intrusion detection | |
Van Der Heijden et al. | Veremi: A dataset for comparable evaluation of misbehavior detection in vanets | |
Rezaei | Using ensemble learning technique for detecting botnet on IoT | |
Muthubalaji et al. | An intelligent big data security framework based on aefs-kenn algorithms for the detection of cyber-attacks from smart grid systems | |
Gebremariam et al. | Design of advanced intrusion detection systems based on hybrid machine learning techniques in hierarchically wireless sensor networks | |
Vu et al. | Applications of generative AI (GAI) for mobile and wireless networking: A survey | |
Yang et al. | Enabling automl for zero-touch network security: Use-case driven analysis | |
Ibrahim et al. | Intrusion detection system for cloud based software-defined networks | |
Soflaei et al. | Enhancing network intrusion detection: a dual-ensemble approach with CTGAN-balanced data and weak classifiers | |
Rohini et al. | Intrusion detection system with an ensemble learning and feature selection framework for IoT networks | |
AL-Syouf et al. | Machine learning approaches to intrusion detection in unmanned aerial vehicles (UAVs) | |
Peng et al. | Raft: A real-time framework for root cause analysis in 5g and beyond vulnerability detection | |
Saied et al. | A comparative analysis of using ensemble trees for botnet detection and classification in IoT | |
Zheng et al. | Recent advances in automatic modulation classification technology: Methods, results, and prospects | |
Yang et al. | Diving Into Zero-Touch Network Security: Use-Case Driven Analysis | |
El-Shafai et al. | AI-Driven Ensemble Classifier for Jamming Attack Detection in VANETs to Enhance Security in Smart Cities | |
Vu et al. | Enhancing network attack detection across infrastructures: An automatic labeling method and deep learning model with an attention mechanism | |
Ashok et al. | A novel grasshopper optimization-based particle swarm algorithm for effective spectrum sensing in cognitive radio networks | |
Hasan et al. | Adversarial Attacks on Deep Learning-based Network Intrusion Detection Systems: A Taxonomy and Review |