1. C. Dong and L. Zhao, “Sensor Network Security Defense Strategy based on Attack Graph and Improved Binary PSO,”Safety Science, Vol. 117, pp. 81-87, 2019 2. T. Zhang and Q. Liao, “Dynamic Link Anomaly Analysis for Network Security Management,” Journal of Network and Systems Management, Vol. 27, No. 3, pp. 600-624, 2019 3. M. A.AydN, A H. Zaim, and K. G. Ceylan, “A Hybrid Intrusion Detection System Design for Computer Network Security,” Computers and Electrical Engineering, Vol. 35, No. 3, pp. 517-526, 2009 4. S. Xie, Y. Xie, T. Huang, W. Gui,C. Yang, “Generalized Predictive Control for Industrial Processes based on Neuron Adaptive Splitting and Merging RBF Neural Network,” IEEE Transactions on Industrial Electronics, Vol. 66, No. 2, pp. 1192-1202, 2019 5. X. Xu, D. Shan, S. Li, T. Sun, P. Xiao,J. Fan, “Multi-Label Learning Method based on ML-RBF and Laplacian ELM,”Neurocomputing, Vol. 331, pp. 213-219, 2019 6. L. Wan, X. Li,Z. Qin, “Prediction Method for Network Security Situation based on Generalized RBF Neural Network,” Command Information System and Technology, Vol. 82, No. 10, pp. 1329-1336, 2015 7. H. Fei and J. He, “Prediction Model of Network Security Situation based on Elman Neural Network,” inProceedings of 2017 International Conference on Computer Engineering and Networks, pp. 137-143, IEEE, 2017 8. P. Xiao, M. Xian,H. Wang, “Network Security Situation Prediction Method based on MEA-BP,” inProceedings of 2017 International Conference on Computational Intelligence and Communication Technology, pp. 88-95, IEEE, 2017 9. F. W. Li, X. Y. Zhang, J. Zhu,Q. Huang, “Network Security Situation Prediction based on APDE-RBF Neural Network,” Systems Engineering and Electronics, Vol. 38, No. 12, pp. 2869-2875, 2016 10. F. He, Y. Zhang, D. Liu, Y. Dong,C. Wu, “Mixed Wavelet-based Neural Network Model for Cyber Security Situation Prediction using MODWT and Hurst Exponent Analysis,” inProceedings of 2017 International Conference on Network and System Security, pp. 165-173, IEEE, 2017 11. I. Sharafaldin, A. H. Lashkari,A. A. Ghorbani, “An Evaluation Framework for Network Security Visualizations,”Computers and Security, Vol. 84, pp. 70-92, 2019 12. F. Liu, S. Li, L. Zhang, C. Zhou, R. Ye,Y. Wang, “3DCNN-DQN-RNN: A Deep Reinforcement Learning Framework for Semantic Parsing of Large-scale 3D Point Clouds,” inProceedings of 2017 IEEE International Conference on Computer Vision, pp. 144-153, IEEE, 2017 13. L. Zhang, G. Zhu, P. Shen,J. Song, “Learning Spatiotemporal Features using 3DCNN and Convolutional LSTM for Gesture Recognition,” inProceedings of 2017 IEEE International Conference on Computer Vision Workshop, pp. 1-12, IEEE, 2017 14. N. L. Hakim, T. K. Shih, S. P. K.Arachchi, W. Aditya, Y. C. Chen, and C. Y. Lin, “Dynamic Hand Gesture Recognition using 3DCNN and LSTM with FSM Context-Aware Model,” Sensors, Vol. 19, No. 24, pp. 5429, 2019 15. A. Krizhevsky, I. Sutskever,G. E. Hinton, “ImageNet Classification with Deep Convolutional Neural Networks,” inProceedings of 2012 International Conference on Neural Information and Processing Systems, pp. 176-185, NIPS, 2012 16. C. Shih, P. Huang, E. Yen,P. Tsung, “Vehicle Speed Prediction with RNN and Attention Model under Multiple Scenarios,” inProceedings of 2019 International Conference on Intelligent Transportation Systems, pp. 1763-1774, IEEE, 2019 17. Y. Tang, Y. Huang, Z. Wu, H. Meng,L. Cai, “Question Detection from Acoustic Features using Recurrent Neural Network with Gated Recurrent Unit,” inProceedings of 2016 IEEE International Conference on Acoustics, Speech and Signal Processing, pp. 675-683, IEEE, 2016 18. X. Sun, Y. Gao, R. Sutcliffe, S. X. Guo,J. Feng, “Word Representation Learning based on Bidirectional Grus with Drop Loss for Sentiment Classification,” IEEE Transactions on Systems, Man, and Cybernetics: Systems, Vol. 3, No. 99, pp. 1-11, 2019 19. P. T. D.Boer, D. P. Kroese, S. Mannor, and R. Y. Rubinstein, “A Tutorial on the Cross-Entropy Method,” Annals of Operations Research, Vol. 134, No. 1, pp. 19-67, 2005 20. D. P. Kingma and J. Ba, “Adam: A Method for Stochastic Optimization,” arXiv:1412.6980, 2014 21. L. Liu, F. X. Wu,J. Wang, “Efficient Multi-Kernel DCNN with Pixel Dropout for Stroke MRI Segmentation,”Neurocomputing, Vol. 350, pp. 117-127, 2019 22. D. Duvenaud, D. Maclaurin,R. Adams, “Early Stopping as Nonparametric Variational Inference,” in Proceedings of2016 International Conference on Artificial Intelligence and Statistics, pp. 1070-1077, 2016 23. S. Ioffe and C. Szegedy, “Batch Normalization: Accelerating Deep Network Training by Reducing Internal Covariate Shift,” arXiv:1502.03167, 2015 24. L. Spitzner, “The Honeynet Project: Trapping the Hackers,” IEEE Security and Privacy, Vol. 1, No. 2, pp. 15-23, 2003 25. X. Z. Chen, Q. H. Zheng, X. H. Guan,C. G. Lin, “Quantitative Hierarchical Threat Evaluation Model for Network Security,” Journal of Software, Vol. 17, No. 4, pp. 885-897, 2006 26. “SiLK: Reference Data,” (http:// tools.netsa.cert.org/silk/referencedata.html, 2018 27. S. Rosset and A. Inger, “KDD-Cup 99: Knowledge Discovery in a Charitable Organization's Donor Database,” ACM SIGKDD Explorations Newsletter, Vol. 1, No. 2, pp. 85-90, 2000 |