2022
DOI: 10.11591/ijece.v12i4.pp4031-4041
|View full text |Cite
|
Sign up to set email alerts
|

Hyperparameter optimization using custom genetic algorithm for classification of benign and malicious traffic on internet of things–23 dataset

Abstract: Hyperparameter optimization is one of the main challenges in deep learning despite its successful exploration in many areas such as image classification, speech recognition, natural language processing, and fraud detections. Hyperparameters are critical as they control the learning rate of a model and should be tuned to improve performance. Tuning the hyperparameters manually with default values is a challenging and time-intensive task. Though the time and efforts spent on tuning the hyperparameters are decrea… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
4
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
5
2
1

Relationship

0
8

Authors

Journals

citations
Cited by 10 publications
(4 citation statements)
references
References 28 publications
0
4
0
Order By: Relevance
“…There are many advantages to using this method, including its simplicity, adaptability, and ability to discover the global optimum solution while avoiding the local optimum [28]. Although the aforementioned list of optimization strategies is driven by hunting, they won't be imitating leadership qualities.…”
Section: Related Workmentioning
confidence: 99%
“…There are many advantages to using this method, including its simplicity, adaptability, and ability to discover the global optimum solution while avoiding the local optimum [28]. Although the aforementioned list of optimization strategies is driven by hunting, they won't be imitating leadership qualities.…”
Section: Related Workmentioning
confidence: 99%
“…Furthermore, Al-Shabi and Abuhamdah [47] conducted a study using deep learning methods to discover abnormal behaviors in internet networks. It is worth mentioning that many intelligent methods have been used to increase the information security, see [48]- [52]. Because attacks that use viruses intelligently, a novel study of information security has been conducted [53].…”
Section: Figure 2 Overview Of Grey Hole Attack [19]mentioning
confidence: 99%
“…HPT with the classical method and parameter optimization [13][14][15][16]: The fine-tuning of weights and biases (parameters) can provide useful information about the problem, but their size and initial value rely on HPT. Moreover, the number of parameters in deep neural networks (DNNs) and high dimensional datasets is enormous, and calculating the optimum value of these parameters is complicated, not easily implemented, and requires computational systems with remarkable capabilities.…”
Section: Introductionmentioning
confidence: 99%