2020
DOI: 10.1109/tnnls.2019.2933665
|View full text |Cite
|
Sign up to set email alerts
|

SRGC-Nets: Sparse Repeated Group Convolutional Neural Networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
11
0
1

Year Published

2020
2020
2023
2023

Publication Types

Select...
5
2

Relationship

0
7

Authors

Journals

citations
Cited by 29 publications
(12 citation statements)
references
References 27 publications
0
11
0
1
Order By: Relevance
“…By comparing the predicted labels with the true labels, the performance of the shallow learning algorithms can be achieved. The most widely used algorithms include SVM, DT, NB, and Kmeans [39,40]. Buczak et al [39] provided a summary as a survey to describe some machine learning and data mining methods, such as DT, SVM, RF, and NB, which were used for cybersecurity intrusion detection.…”
Section: Related Workmentioning
confidence: 99%
See 3 more Smart Citations
“…By comparing the predicted labels with the true labels, the performance of the shallow learning algorithms can be achieved. The most widely used algorithms include SVM, DT, NB, and Kmeans [39,40]. Buczak et al [39] provided a summary as a survey to describe some machine learning and data mining methods, such as DT, SVM, RF, and NB, which were used for cybersecurity intrusion detection.…”
Section: Related Workmentioning
confidence: 99%
“…The most widely used algorithms include SVM, DT, NB, and Kmeans [39,40]. Buczak et al [39] provided a summary as a survey to describe some machine learning and data mining methods, such as DT, SVM, RF, and NB, which were used for cybersecurity intrusion detection. Kruczkowski and Szynkiewicz [41] used SVM with kernels to build a malware detection model.…”
Section: Related Workmentioning
confidence: 99%
See 2 more Smart Citations
“…FC layers usually contain a large number of neurons, which are fully connected with previous layers through weights. Figure 2 shows a single FC layer architecture [7]. The huge number of weights involved in many modern CNN architectures makes their implementation on a general purpose processor highly challenging due to the high memory and bandwidth requirements [4,7,8].…”
Section: Introductionmentioning
confidence: 99%