2023
DOI: 10.1016/j.asoc.2022.109960
|View full text |Cite
|
Sign up to set email alerts
|

Intrusion detection model using gene expression programming to optimize parameters of convolutional neural network for energy internet

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
1
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
4
1
1

Relationship

0
6

Authors

Journals

citations
Cited by 11 publications
(2 citation statements)
references
References 41 publications
0
1
0
Order By: Relevance
“…Thus, the dimensionality of the data features needs to be reduced further.KNN + XGBoost [ 64 ] combines the XGBoost algorithm with KNN, which achieves satisfactory results in some cases, but the performance may be degraded in multiclassification prediction. GCNN [ 65 ] optimizes intrusion detection models by improving traditional CNN structures such as Gene Expression Programming (GEP) and fitness functions. Despite some progress, there is still room for improvement in detection accuracy.…”
Section: Resultsmentioning
confidence: 99%
“…Thus, the dimensionality of the data features needs to be reduced further.KNN + XGBoost [ 64 ] combines the XGBoost algorithm with KNN, which achieves satisfactory results in some cases, but the performance may be degraded in multiclassification prediction. GCNN [ 65 ] optimizes intrusion detection models by improving traditional CNN structures such as Gene Expression Programming (GEP) and fitness functions. Despite some progress, there is still room for improvement in detection accuracy.…”
Section: Resultsmentioning
confidence: 99%
“…Networks like CNN have a set of parameters in intrusion detection, and if these parameters are not chosen optimally, then the modeling error increases. In other words, by optimizing deep learning parameters, attacks are detected with less error [28,29]. Another challenge in detecting attacks in SDN networks is that data such as blacklists is exchanged between network switches with methods such as blockchain [30].…”
Section: Introductionmentioning
confidence: 99%