2020
DOI: 10.1016/j.cose.2020.101752
|View full text |Cite
|
Sign up to set email alerts
|

A deep learning method with wrapper based feature extraction for wireless intrusion detection system

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
124
0
2

Year Published

2020
2020
2024
2024

Publication Types

Select...
7

Relationship

0
7

Authors

Journals

citations
Cited by 255 publications
(126 citation statements)
references
References 22 publications
0
124
0
2
Order By: Relevance
“…Alipourfard et al [87] worked on the hyperspectral images high dimensionality and proposed a system to reduce it. The proposed system was a combination of CNN and the subspace feature extraction method.…”
Section: Sellami and Farahmentioning
confidence: 99%
See 1 more Smart Citation
“…Alipourfard et al [87] worked on the hyperspectral images high dimensionality and proposed a system to reduce it. The proposed system was a combination of CNN and the subspace feature extraction method.…”
Section: Sellami and Farahmentioning
confidence: 99%
“…On the other hand, 21 feature extraction methods have been reviewed in this study and summarized in Table IV. Among them 7 methods ( [92], [77], [82], [84], [87], [88], and [91]) depended on deep learning (CNN and DNN). CNN and LBP were used in research [92] and achieved high-efficiency accuracy.…”
Section: Sellami and Farahmentioning
confidence: 99%
“…After pre-training process, the fine-tuning procedure is used to adjust the parameters such as the weights and biases. Take the hth hidden layer as an example, and define the learning rate as  , the weight matrix and the bias vector of it can be updated as follows: is the activation probability of the jth element of the ( 1)  h th hidden layer, and…”
Section: The Fine-tuning Process Of Cdbnmentioning
confidence: 99%
“…With the extensive popularization of Wireless Local Area Networks (WLAN) technology used in hardware devices, the IEEE 802.11 protocol based short-distance transmission wireless network is facing great security challenges [1]. Any illegal users may have access to the local area network through the wireless access point [2,3].…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation