Proceedings of the 2019 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining 2019
DOI: 10.1145/3341161.3343533
|View full text |Cite
|
Sign up to set email alerts
|

A comparative study to deep learning for pattern recognition, by using online and batch learning; taking cybersecurity as a case

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2023
2023
2023
2023

Publication Types

Select...
1

Relationship

0
1

Authors

Journals

citations
Cited by 1 publication
(2 citation statements)
references
References 8 publications
0
2
0
Order By: Relevance
“…That is, the training dataset is having the target vector. Whereas in Unsupervised Learning, algorithms learn from the training data but without any target vector available (Sharma et al, 2016;Martínez et al, 2019;Apruzzese et al, 2018;Hu and Tan, 2017;Yavanoglu and Aydos, 2017;Djellali et al, 2019). Different algorithms and computation approaches are used in supervised techniques.…”
Section: Machine Learning-based Approaches For Cyber Security Problemsmentioning
confidence: 99%
See 1 more Smart Citation
“…That is, the training dataset is having the target vector. Whereas in Unsupervised Learning, algorithms learn from the training data but without any target vector available (Sharma et al, 2016;Martínez et al, 2019;Apruzzese et al, 2018;Hu and Tan, 2017;Yavanoglu and Aydos, 2017;Djellali et al, 2019). Different algorithms and computation approaches are used in supervised techniques.…”
Section: Machine Learning-based Approaches For Cyber Security Problemsmentioning
confidence: 99%
“…With these experiments, (Alom et al, 2015) could identify unknown attacks and, after 50 iterations, achieved 97.5% of accuracy. Djellali et al (2019), designed two deep learning techniques as Batch Gradient Descent and Stochastic Gradient Descent which are compared and tested on a resampling method for cybersecurity. Batch Gradient Descent is an iterative technique that uses complete input training patterns in order to optimize a cost function.…”
Section: Deep Learning Solutions To Cyber Securitymentioning
confidence: 99%