1. Strategic Support Force Information Engineering University, Zhengzhou 450001, China 2. Institute of Information Engineering, Chinese Academy of Sciences, Beijing 100093, China
X, Sun S, Ma Y, Li D, Wang Z, Li N, Wang G Gui . Enhanced echo-state restricted Boltzmann machines for network traffic prediction. IEEE Internet of Things Journal, 2020, 7( 2): 1287–1297
2
S I, Popoola R, Ande B, Adebisi G, Gui M, Hammoudeh O Jogunola . Federated deep learning for zero-day botnet attack detection in IoT-edge devices. IEEE Internet of Things Journal, 2022, 9( 5): 3930–3944
3
M, Ring S, Wunderlich D, Scheuring D, Landes A Hotho . A survey of network-based intrusion detection data sets. Computers & Security, 2019, 86: 147–167
4
B, Han Q, Yao X, Yu G, Niu M, Xu W, Hu I W, Tsang M Sugiyama . Co-teaching: robust training of deep neural networks with extremely noisy labels. In: Proceedings of the 32nd International Conference on Neural Information Processing Systems. 2018, 8536−8546
5
X, Yu B, Han J, Yao G, Niu I W, Tsang M Sugiyama . How does disagreement help generalization against label corruption? In: Proceedings of the 36th International Conference on Machine Learning. 2019, 7164−7173
6
C, Tan J, Xia L, Wu S Z Li . Co-learning: learning from noisy labels with self-supervision. In: Proceedings of the 29th ACM International Conference on Multimedia. 2021, 1405−1413
7
Aceto G, Ciuonzo D, Montieri A, Pescapé A. DISTILLER: encrypted traffic classification via multimodal multitask deep learning. Journal of Network and Computer Applications, 2021, 183−184: 102985
8
A, Nascita A, Montieri G, Aceto D, Ciuonzo V, Persico A Pescapé . XAI meets mobile traffic classification: understanding and improving multimodal deep learning architectures. IEEE Transactions on Network and Service Management, 2021, 18( 4): 4225–4246
9
I, Sharafaldin A H, Lashkari A A Ghorbani . Toward generating a new intrusion detection dataset and intrusion traffic characterization. In: Proceedings of the 4th International Conference on Information Systems Security and Privacy. 2018, 108−116
10
M, MontazeriShatoori L, Davidson G, Kaur A H Lashkari . Detection of DoH tunnels using time-series classification of encrypted traffic. In: Proceedings of the 5th Cyber Science and Technology Congress. 2020, 63−70