2018 37th Chinese Control Conference (CCC) 2018
DOI: 10.23919/chicc.2018.8483324
|View full text |Cite
|
Sign up to set email alerts
|

A Novel Intrusion Detection Scheme Using Cloud Grey Wolf Optimizer

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
4
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
5
1

Relationship

0
6

Authors

Journals

citations
Cited by 9 publications
(4 citation statements)
references
References 8 publications
0
4
0
Order By: Relevance
“…Table 1 is the confusion matrix [21] used, the horizontal is the judgment result of anomaly detection, and the vertical is the true label of the sample in the test set. Accuracy: This indicator indicates the proportion of the number of samples that are abnormal in the detection and the actual abnormal situation to the total number of abnormal samples in the detection, which is calculated as shown in Equation (6). 𝐴𝑐𝑐𝑢𝑟𝑎𝑐𝑦…”
Section: Experiments Setup and Evaluation Metricsmentioning
confidence: 99%
See 2 more Smart Citations
“…Table 1 is the confusion matrix [21] used, the horizontal is the judgment result of anomaly detection, and the vertical is the true label of the sample in the test set. Accuracy: This indicator indicates the proportion of the number of samples that are abnormal in the detection and the actual abnormal situation to the total number of abnormal samples in the detection, which is calculated as shown in Equation (6). 𝐴𝑐𝑐𝑢𝑟𝑎𝑐𝑦…”
Section: Experiments Setup and Evaluation Metricsmentioning
confidence: 99%
“…In addition, a large amount of data generated by the device is unlabeled and private, which makes it difficult for supervised methods. Therefore, unsupervised learning algorithms have been proposed in anomaly detection of devices, such as clustering algorithms [2,3,4], Gaussian mixture model [5], single-classification support vector machine [6,7], generative adversarial network (GAN) [8,9], isolated forest [10,11], reduction and reconstruction method [12], and federated deep learning [13,14]. Among them, literature [2] describes the clustering genetic optimization anomaly detection method based on the idea of density to detect the abnormal situation of energy storage batteries, designs an effective objective function to describe the abnormal state of data, and realizes the abnormal detection of abnormal data.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…e hyperentropy He is the entropy and a measure of uncertainty [21]. Hyperentropy associates fuzziness and randomness, reflecting the degree of dispersion of the cloud droplets, i.e., the thickness of the cloud [22,23], and extends the normal distribution to the generalised normal distribution [24].…”
Section: Preliminariesmentioning
confidence: 99%