2024
DOI: 10.1109/tdsc.2022.3195534
|View full text |Cite
|
Sign up to set email alerts
|

Handling Labeled Data Insufficiency: Semi-supervised Learning with Self-Training Mixup Decision Tree for Classification of Network Attacking Traffic

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2024
2024
2024
2024

Publication Types

Select...
3
2
1

Relationship

0
6

Authors

Journals

citations
Cited by 7 publications
(3 citation statements)
references
References 0 publications
0
3
0
Order By: Relevance
“…There are two main categories of NODS; supervised and unsupervised. If a system utilizes both supervised and unsupervised features, it is classified as semi-supervised [32] Supervised NODSs use labeled data to train a model that can then be used to detect outliers in new, unlabeled data sets. These systems are based on supervised learning techniques, such as decision trees, neural networks, and support vector machines (SVMs) [33].…”
Section: Network Outlier Detection System (Nods)mentioning
confidence: 99%
See 1 more Smart Citation
“…There are two main categories of NODS; supervised and unsupervised. If a system utilizes both supervised and unsupervised features, it is classified as semi-supervised [32] Supervised NODSs use labeled data to train a model that can then be used to detect outliers in new, unlabeled data sets. These systems are based on supervised learning techniques, such as decision trees, neural networks, and support vector machines (SVMs) [33].…”
Section: Network Outlier Detection System (Nods)mentioning
confidence: 99%
“…These techniques are used to identify patterns in the data that indicate the presence of outliers. In decision tree-based NODSs, the data is split into multiple nodes based on the value of a certain feature [32,34]. The nodes are then classified as outliers or inliers.…”
Section: Network Outlier Detection System (Nods)mentioning
confidence: 99%
“…For training, semi-supervised learning [32], a technique used in intrusion detection and classification, blends labeled and unlabeled data [41]. This strategy seeks to capitalize on the advantages of both supervised and unsupervised learning approaches [42].…”
Section: State Of the Artmentioning
confidence: 99%