2022
DOI: 10.1109/tase.2021.3074984
|View full text |Cite
|
Sign up to set email alerts
|

How Deep Is Deep Enough for Deep Belief Network for Approximating Model Predictive Control Law

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
3
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
7

Relationship

0
7

Authors

Journals

citations
Cited by 7 publications
(4 citation statements)
references
References 46 publications
0
3
0
Order By: Relevance
“…Based upon the definition of input and output variables, the entire data-driven power flow calculation model is further constructed using Deep Belief Networks (DBN) (Zhang et al, 2018). DBN, as a form of deep learning, consists of multiple layers of Restricted Boltzmann Machines (RBM) (Zhang et al, 2018;Tao et al, 2020;Wang et al, 2022). In this network architecture, there are connections between layers, but units within each layer are not interconnected.…”
Section: The Establishment Of the Overall Modelmentioning
confidence: 99%
See 1 more Smart Citation
“…Based upon the definition of input and output variables, the entire data-driven power flow calculation model is further constructed using Deep Belief Networks (DBN) (Zhang et al, 2018). DBN, as a form of deep learning, consists of multiple layers of Restricted Boltzmann Machines (RBM) (Zhang et al, 2018;Tao et al, 2020;Wang et al, 2022). In this network architecture, there are connections between layers, but units within each layer are not interconnected.…”
Section: The Establishment Of the Overall Modelmentioning
confidence: 99%
“…In this network architecture, there are connections between layers, but units within each layer are not interconnected. After training the neural network parameters layer by layer, DBNs are effective in fitting a large number of data samples, enabling estimation and prediction tasks (Wang et al, 2022).…”
Section: The Establishment Of the Overall Modelmentioning
confidence: 99%
“…The architecture of a DNN depends significantly upon the complexity of the problem under consideration; it is related to how each layer is implemented, as well as the computational method used in each layer. The most widely used DL approaches are CNNs [40], recurrent neural networks (RNNs) [41], deep belief networks (DBNs) [42], and the recently introduced approach of generative adversarial networks (GANs) [43]. However, the most popular supervised DNNs for image processing, object recognition, image formation, and classification are based on CNN architectures [44].…”
Section: Deep Neural Networkmentioning
confidence: 99%
“…In return, the DNN can provide a probability of each class discriminating normal and attack packets (Deng, Gao, Lu, and Gao, 2018), thus, the sensor can identify malicious attacks on the vehicle (Deng, Gao, Lu, & Gao, 2018;Eziama, Awin, Ahmed, Santos-Jaimes, Pelumi, & Corral-De-Witt, 2020). The research conducted an unsupervised pre-training method of deep belief networks (Wang, Qiao, Liu, and Shen, 2021), to include the stochastic gradient descent method (Sun, Qiao, Liao, and Li, 2020) can extract in-vehicular network packets (Wang, Qiao, Liu, and Shen, 2021;Sun, Quio, Liao, & Li, 2020). The research outlines related work for CAN protocol, which includes intrusion detection and machine learning, deep learning, a proposed technique for a proposed intrusion detection system, CAN packet feature, attack detection, data set, and performance evaluation.…”
Section: Safety Algorithm Contributorsmentioning
confidence: 99%