期刊文献+
共找到9篇文章
< 1 >
每页显示 20 50 100
Improved Dragonfly Optimizer for Intrusion Detection Using Deep Clustering CNN-PSO Classifier
1
作者 K.S.Bhuvaneshwari K.Venkatachalam +2 位作者 S.Hubalovsky P.Trojovsky P.Prabu 《Computers, Materials & Continua》 SCIE EI 2022年第3期5949-5965,共17页
With the rapid growth of internet based services and the data generated on these services are attracted by the attackers to intrude the networking services and information.Based on the characteristics of these intrude... With the rapid growth of internet based services and the data generated on these services are attracted by the attackers to intrude the networking services and information.Based on the characteristics of these intruders,many researchers attempted to aim to detect the intrusion with the help of automating process.Since,the large volume of data is generated and transferred through network,the security and performance are remained an issue.IDS(Intrusion Detection System)was developed to detect and prevent the intruders and secure the network systems.The performance and loss are still an issue because of the features space grows while detecting the intruders.In this paper,deep clustering based CNN have been used to detect the intruders with the help of Meta heuristic algorithms for feature selection and preprocessing.The proposed system includes three phases such as preprocessing,feature selection and classification.In the first phase,KDD dataset is preprocessed by using Binning normalization and Eigen-PCA based discretization method.In second phase,feature selection is performed by using Information Gain based Dragonfly Optimizer(IGDFO).Finally,Deep clustering based Convolutional Neural Network(CCNN)classifier optimized with Particle Swarm Optimization(PSO)identifies intrusion attacks efficiently.The clustering loss and network loss can be reduced with the optimization algorithm.We evaluate the proposed IDS model with the NSL-KDD dataset in terms of evaluation metrics.The experimental results show that proposed system achieves better performance compared with the existing system in terms of accuracy,precision,recall,f-measure and false detection rate. 展开更多
关键词 Intrusion detection system binning normalization deep clustering convolutional neural network information gain dragonfly optimizer
下载PDF
Identification of High-Risk Scenarios for Cascading Failures in New Energy Power Grids Based on Deep Embedding Clustering Algorithms
2
作者 Xueting Cheng Ziqi Zhang +1 位作者 Yueshuang Bao Huiping Zheng 《Energy Engineering》 EI 2023年第11期2517-2529,共13页
At present,the proportion of new energy in the power grid is increasing,and the random fluctuations in power output increase the risk of cascading failures in the power grid.In this paper,we propose a method for ident... At present,the proportion of new energy in the power grid is increasing,and the random fluctuations in power output increase the risk of cascading failures in the power grid.In this paper,we propose a method for identifying high-risk scenarios of interlocking faults in new energy power grids based on a deep embedding clustering(DEC)algorithm and apply it in a risk assessment of cascading failures in different operating scenarios for new energy power grids.First,considering the real-time operation status and system structure of new energy power grids,the scenario cascading failure risk indicator is established.Based on this indicator,the risk of cascading failure is calculated for the scenario set,the scenarios are clustered based on the DEC algorithm,and the scenarios with the highest indicators are selected as the significant risk scenario set.The results of simulations with an example power grid show that our method can effectively identify scenarios with a high risk of cascading failures from a large number of scenarios. 展开更多
关键词 New energy power system deep embedding clustering algorithms cascading failures
下载PDF
Deep Learning-Based Algorithm for Multi-Type Defects Detection in Solar Cells with Aerial EL Images for Photovoltaic Plants
3
作者 Wuqin Tang Qiang Yang Wenjun Yan 《Computer Modeling in Engineering & Sciences》 SCIE EI 2022年第3期1423-1439,共17页
Defects detection with Electroluminescence(EL)image for photovoltaic(PV)module has become a standard test procedure during the process of production,installation,and operation of solar modules.There are some typical d... Defects detection with Electroluminescence(EL)image for photovoltaic(PV)module has become a standard test procedure during the process of production,installation,and operation of solar modules.There are some typical defects types,such as crack,finger interruption,that can be recognized with high accuracy.However,due to the complexity of EL images and the limitation of the dataset,it is hard to label all types of defects during the inspection process.The unknown or unlabeled create significant difficulties in the practical application of the automatic defects detection technique.To address the problem,we proposed an evolutionary algorithm combined with traditional image processing technology,deep learning,transfer learning,and deep clustering,which can recognize the unknown or unlabeled in the original dataset defects automatically along with the increasing of the dataset size.Specifically,we first propose a deep learning-based features extractor and defects classifier.Then,the unlabeled defects can be classified by the deep clustering algorithm and stored separately to update the original database without human intervention.When the number of unknown images reaches the preset values,transfer learning is introduced to train the classifier with the updated database.The fine-tuned model can detect new defects with high accuracy.Finally,numerical results confirm that the proposed solution can carry out efficient and accurate defect detection automatically using electroluminescence images. 展开更多
关键词 Electroluminescence images deep clustering automatic defect classification transfer learning
下载PDF
Contrastive Consistency and Attentive Complementarity for Deep Multi-View Subspace Clustering
4
作者 Jiao Wang Bin Wu Hongying Zhang 《Computers, Materials & Continua》 SCIE EI 2024年第4期143-160,共18页
Deep multi-view subspace clustering (DMVSC) based on self-expression has attracted increasing attention dueto its outstanding performance and nonlinear application. However, most existing methods neglect that viewpriv... Deep multi-view subspace clustering (DMVSC) based on self-expression has attracted increasing attention dueto its outstanding performance and nonlinear application. However, most existing methods neglect that viewprivatemeaningless information or noise may interfere with the learning of self-expression, which may lead to thedegeneration of clustering performance. In this paper, we propose a novel framework of Contrastive Consistencyand Attentive Complementarity (CCAC) for DMVsSC. CCAC aligns all the self-expressions of multiple viewsand fuses them based on their discrimination, so that it can effectively explore consistent and complementaryinformation for achieving precise clustering. Specifically, the view-specific self-expression is learned by a selfexpressionlayer embedded into the auto-encoder network for each view. To guarantee consistency across views andreduce the effect of view-private information or noise, we align all the view-specific self-expressions by contrastivelearning. The aligned self-expressions are assigned adaptive weights by channel attention mechanism according totheir discrimination. Then they are fused by convolution kernel to obtain consensus self-expression withmaximumcomplementarity ofmultiple views. Extensive experimental results on four benchmark datasets and one large-scaledataset of the CCAC method outperformother state-of-the-artmethods, demonstrating its clustering effectiveness. 展开更多
关键词 deep multi-view subspace clustering contrastive learning adaptive fusion self-expression learning
下载PDF
Study on Recognition Method of Similar Weather Scenes in Terminal Area
5
作者 Ligang Yuan Jiazhi Jin +2 位作者 Yan Xu Ningning Zhang Bing Zhang 《Computer Systems Science & Engineering》 SCIE EI 2023年第2期1171-1185,共15页
Weather is a key factor affecting the control of air traffic.Accurate recognition and classification of similar weather scenes in the terminal area is helpful for rapid decision-making in air trafficflow management.Curren... Weather is a key factor affecting the control of air traffic.Accurate recognition and classification of similar weather scenes in the terminal area is helpful for rapid decision-making in air trafficflow management.Current researches mostly use traditional machine learning methods to extract features of weather scenes,and clustering algorithms to divide similar scenes.Inspired by the excellent performance of deep learning in image recognition,this paper proposes a terminal area similar weather scene classification method based on improved deep convolution embedded clustering(IDCEC),which uses the com-bination of the encoding layer and the decoding layer to reduce the dimensionality of the weather image,retaining useful information to the greatest extent,and then uses the combination of the pre-trained encoding layer and the clustering layer to train the clustering model of the similar scenes in the terminal area.Finally,term-inal area of Guangzhou Airport is selected as the research object,the method pro-posed in this article is used to classify historical weather data in similar scenes,and the performance is compared with other state-of-the-art methods.The experi-mental results show that the proposed IDCEC method can identify similar scenes more accurately based on the spatial distribution characteristics and severity of weather;at the same time,compared with the actualflight volume in the Guangz-hou terminal area,IDCEC's recognition results of similar weather scenes are con-sistent with the recognition of experts in thefield. 展开更多
关键词 Air traffic terminal area similar scenes deep embedding clustering
下载PDF
Dynamic Intelligent Supply-Demand Adaptation Model Towards Intelligent Cloud Manufacturing
6
作者 Yanfei Sun Feng Qiao +4 位作者 Wei Wang Bin Xu Jianming Zhu Romany Fouad Mansour Jin Qi 《Computers, Materials & Continua》 SCIE EI 2022年第8期2825-2843,共19页
As a new mode and means of smart manufacturing,smart cloud manufacturing(SCM)faces great challenges in massive supply and demand,dynamic resource collaboration and intelligent adaptation.To address the problem,this pa... As a new mode and means of smart manufacturing,smart cloud manufacturing(SCM)faces great challenges in massive supply and demand,dynamic resource collaboration and intelligent adaptation.To address the problem,this paper proposes an SCM-oriented dynamic supply-demand(SD)intelligent adaptation model for massive manufacturing services.In this model,a collaborative network model is established based on the properties of both the supply-demand and their relationships;in addition,an algorithm based on deep graph clustering(DGC)and aligned sampling(AS)is used to divide and conquer the large adaptation domain to solve the problem of the slow computational speed caused by the high complexity of spatiotemporal search in the collaborative network model.At the same time,an intelligent supply-demand adaptation method driven by the quality of service(QoS)is established,in which the experiences of adaptation are shared among adaptation subdomains through deep reinforcement learning(DRL)powered by a transfer mechanism to improve the poor adaptation results caused by dynamic uncertainty.The results show that the model and the solution proposed in this paper can performcollaborative and intelligent supply-demand adaptation for themassive and dynamic resources in SCM through autonomous learning and can effectively performglobal supply-demand matching and optimal resource allocation. 展开更多
关键词 Smart Cloud Manufacturing supply and demand sides dynamic adaptation deep Graph clustering transfer learning reinforcement learning
下载PDF
CDEC:a constrained deep embedded clustering
7
作者 Elham Amirizadeh Reza Boostani 《International Journal of Intelligent Computing and Cybernetics》 EI 2021年第4期686-701,共16页
Purpose-The aim of this study is to propose a deep neural network(DNN)method that uses side information to improve clustering results for big datasets;also,the authors show that applying this information improves the ... Purpose-The aim of this study is to propose a deep neural network(DNN)method that uses side information to improve clustering results for big datasets;also,the authors show that applying this information improves the performance of clustering and also increase the speed of the network training convergence.Design/methodology/approach-In data mining,semisupervised learning is an interesting approach because good performance can be achieved with a small subset of labeled data;one reason is that the data labeling is expensive,and semisupervised learning does not need all labels.One type of semisupervised learning is constrained clustering;this type of learning does not use class labels for clustering.Instead,it uses information of some pairs of instances(side information),and these instances maybe are in the same cluster(must-link[ML])or in different clusters(cannot-link[CL]).Constrained clustering was studied extensively;however,little works have focused on constrained clustering for big datasets.In this paper,the authors have presented a constrained clustering for big datasets,and the method uses a DNN.The authors inject the constraints(ML and CL)to this DNN to promote the clustering performance and call it constrained deep embedded clustering(CDEC).In this manner,an autoencoder was implemented to elicit informative low dimensional features in the latent space and then retrain the encoder network using a proposed Kullback-Leibler divergence objective function,which captures the constraints in order to cluster the projected samples.The proposed CDEC has been compared with the adversarial autoencoder,constrained 1-spectral clustering and autoencoder t k-means was applied to the known MNIST,Reuters-10k and USPS datasets,and their performance were assessed in terms of clustering accuracy.Empirical results confirmed the statistical superiority of CDEC in terms of clustering accuracy to the counterparts.Findings-First of all,this is the first DNN-constrained clustering that uses side information to improve the performance of clustering without using labels in big datasets with high dimension.Second,the author defined a formula to inject side information to the DNN.Third,the proposed method improves clustering performance and network convergence speed.Originality/value-Little works have focused on constrained clustering for big datasets;also,the studies in DNNs for clustering,with specific loss function that simultaneously extract features and clustering the data,are rare.The method improves the performance of big data clustering without using labels,and it is important because the data labeling is expensive and time-consuming,especially for big datasets. 展开更多
关键词 deep neural networks clustering Constrained clustering Big data Denoising autoencoder Kullback-Leibler divergence Constrained deep embedded clustering(CDEC)
原文传递
Automated extraction of attributes from natural language attribute-based access control(ABAC)Policies 被引量:3
8
作者 Manar Alohaly Hassan Takabi Eduardo Blanco 《Cybersecurity》 CSCD 2019年第1期38-62,共25页
The National Institute of Standards and Technology(NIST)has identified natural language policies as the preferred expression of policy and implicitly called for an automated translation of ABAC natural language access... The National Institute of Standards and Technology(NIST)has identified natural language policies as the preferred expression of policy and implicitly called for an automated translation of ABAC natural language access control policy(NLACP)to a machine-readable form.To study the automation process,we consider the hierarchical ABAC model as our reference model since it better reflects the requirements of real-world organizations.Therefore,this paper focuses on the questions of:how can we automatically infer the hierarchical structure of an ABAC model given NLACPs;and,how can we extract and define the set of authorization attributes based on the resulting structure.To address these questions,we propose an approach built upon recent advancements in natural language processing and machine learning techniques.For such a solution,the lack of appropriate data often poses a bottleneck.Therefore,we decouple the primary contributions of this work into:(1)developing a practical framework to extract authorization attributes of hierarchical ABAC system from natural language artifacts,and(2)generating a set of realistic synthetic natural language access control policies(NLACPs)to evaluate the proposed framework.Our experimental results are promising as we achieved-in average-an F1-score of 0.96 when extracting attributes values of subjects,and 0.91 when extracting the values of objects’attributes from natural language access control policies. 展开更多
关键词 Attribute-based access control(ABAC)policy authoring natural language processing relation extraction clustering deep learning
原文传递
Automated extraction of attributes from natural language attribute-based access control(ABAC)Policies
9
作者 Manar Alohaly Hassan Takabi Eduardo Blanco 《Cybersecurity》 2018年第1期313-337,共25页
The National Institute of Standards and Technology(NIST)has identified natural language policies as the preferred expression of policy and implicitly called for an automated translation of ABAC natural language access... The National Institute of Standards and Technology(NIST)has identified natural language policies as the preferred expression of policy and implicitly called for an automated translation of ABAC natural language access control policy(NLACP)to a machine-readable form.To study the automation process,we consider the hierarchical ABAC model as our reference model since it better reflects the requirements of real-world organizations.Therefore,this paper focuses on the questions of:how can we automatically infer the hierarchical structure of an ABAC model given NLACPs;and,how can we extract and define the set of authorization attributes based on the resulting structure.To address these questions,we propose an approach built upon recent advancements in natural language processing and machine learning techniques.For such a solution,the lack of appropriate data often poses a bottleneck.Therefore,we decouple the primary contributions of this work into:(1)developing a practical framework to extract authorization attributes of hierarchical ABAC system from natural language artifacts,and(2)generating a set of realistic synthetic natural language access control policies(NLACPs)to evaluate the proposed framework.Our experimental results are promising as we achieved-in average-an F1-score of 0.96 when extracting attributes values of subjects,and 0.91 when extracting the values of objects’attributes from natural language access control policies. 展开更多
关键词 Attribute-based access control(ABAC)policy authoring natural language processing relation extraction clustering deep learning
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部