2022
DOI: 10.1016/j.future.2022.03.007
|View full text |Cite
|
Sign up to set email alerts
|

On IoT intrusion detection based on data augmentation for enhancing learning on unbalanced samples

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
12
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
7
2

Relationship

2
7

Authors

Journals

citations
Cited by 38 publications
(21 citation statements)
references
References 44 publications
0
12
0
Order By: Relevance
“…In the process of the long-term monitoring of towers, it was found that the original dataset composed of fault information has the following characteristics: the number of samples generated by normal operation of towers is much larger than the number of samples where faults occur, the frequency of occurrence of various types of mechanical faults is different, and it is impossible to artificially control the number of samples generated by each type of fault, resulting in a poorly balanced dataset which is difficult to use directly in the machine learning process. Thus, the SMOTE algorithm was chosen to process the original dataset [22]. There are three steps in the process of implementing the SMOTE algorithm.…”
Section: Construction Of Tower Mechanical Failure Dataset Based On Sm...mentioning
confidence: 99%
“…In the process of the long-term monitoring of towers, it was found that the original dataset composed of fault information has the following characteristics: the number of samples generated by normal operation of towers is much larger than the number of samples where faults occur, the frequency of occurrence of various types of mechanical faults is different, and it is impossible to artificially control the number of samples generated by each type of fault, resulting in a poorly balanced dataset which is difficult to use directly in the machine learning process. Thus, the SMOTE algorithm was chosen to process the original dataset [22]. There are three steps in the process of implementing the SMOTE algorithm.…”
Section: Construction Of Tower Mechanical Failure Dataset Based On Sm...mentioning
confidence: 99%
“…To improve learning from imbalanced samples, Zhang et al [48] presented IoT intrusion detection based on data augmentation.…”
Section: Literature Reviewmentioning
confidence: 99%
“…To accurately evaluate the effectiveness of HXG-BLSTM, we conducted in-depth comparison with the most recent DL algorithms that were employed in the cyber threat detection literature. In this comparison, we used deep learning algorithms from earlier studies such as [11], [28], [10], [32], [1], [9], BWO-CONV-LSTM [27], [48], [45], [6], [18], [21], [42], and [1]. The results of the comparison for deep learning approaches are shown in Table 9.…”
Section: Hxgblstm Vs Other Algorithmsmentioning
confidence: 99%
“…Therefore, many methods have been proposed to solve the problem of insufficient training datasets. For example, data augmentation methods [4], generative adversarial networks [5], and small sample learning techniques [6], etc.…”
Section: Introductionmentioning
confidence: 99%