2018 International Conference on Information Networking (ICOIN) 2018
DOI: 10.1109/icoin.2018.8343120
|View full text |Cite
|
Sign up to set email alerts
|

A method for estimating process maliciousness with Seq2Seq model

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2021
2021
2021
2021

Publication Types

Select...
1
1

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(2 citation statements)
references
References 2 publications
0
2
0
Order By: Relevance
“…This makes CNN models robust to input translations [22]. Pooling layers reduce computational burdens by reducing count of connections between convolution layers [23]. Mathematically speaking each CNN layer has a set of kernels which convolve input data.…”
Section: Fig 3 -Tc-cnn Null Value Checksmentioning
confidence: 99%
“…This makes CNN models robust to input translations [22]. Pooling layers reduce computational burdens by reducing count of connections between convolution layers [23]. Mathematically speaking each CNN layer has a set of kernels which convolve input data.…”
Section: Fig 3 -Tc-cnn Null Value Checksmentioning
confidence: 99%
“…Anomaly detection tasks in medical field such as medical image analysis and clinical electroencephalography (EEG) records had great successes with the aid of deep learning techniques in preventing treatments for different medical conditions. These architectures produced outstanding performance using techniques such as Auto-Encoder(AE) [25], Convolutional Neural Network(CNN) [26], Deep Neural Network(DNN) [27], Deep Belief Network(DBN) [28], Long-Short Term Memory(LSTM) [29], Generative Adversarial Network(GAN) [30], and Recurrent Neural Network(RNN) [31].…”
Section: Medical Anomaly Detectionmentioning
confidence: 99%