[1] |
MANIMURUGAN S . IoT-fog-cloud model for anomaly detection using improved Na?ve Bayes and principal component analysis[J]. Journal of Ambient Intelligence and Humanized Computing, 2021: 1-10.
|
[2] |
LIU H Y , LANG B . Machine learning and deep learning methods for intrusion detection systems:a survey[J]. Applied Sciences, 2019,9(20): 4396.
|
[3] |
BUCZAK A L , GUVEN E . A survey of data mining and machine learning methods for cyber security intrusion detection[J]. IEEE Communications Surveys & Tutorials, 2015,18(2): 1153-1176.
|
[4] |
THANIGAIVELAN N K , NIGUSSIE E , KANTH R K ,et al. Distributed internal anomaly detection system for Internet-ofThings[C]// Proceedings of 2016 13th IEEE Annual Consumer Communications & Networking Conference (CCNC). 2016: 319-320.
|
[5] |
DIRO A , CHILAMKURTI N . Leveraging LSTM networks for attack detection in fog-to-things communications[C]// Proceedings of IEEE Communications Magazine. 2018: 124-130.
|
[6] |
DIRO A A , CHILAMKURTI N . Distributed attack detection scheme using deep learning approach for Internet of things[J]. Future Generation Computer Systems, 2018,82: 761-768.
|
[7] |
LAWAL M A , SHAIKH R A , HASSAN S R . An anomaly mitigation framework for IoT using fog computing[J]. Electronics, 2020,9(10): 1565.
|
[8] |
MALEH Y , ABDELLAHEZZATI W . Lightweight intrusion detection scheme for wireless sensor networks[J]. International Journal of Computer Science, 2015,42: 1-8.
|
[9] |
AN X S , ZHOU X W , LYU X ,et al. Sample selected extreme learning machine based intrusion detection in fog computing and MEC[J]. Wireless Communications and Mobile Computing, 2018,2018: 1-10.
|
[10] |
DAO T N , LEE H . Stacked autoencoder-based probabilistic feature extraction for on-device network intrusion detection[J]. IEEE Internet of Things Journal, 2022,9(16): 14438-14451.
|
[11] |
NGUYEN X H , NGUYEN X D , HUYNH H H ,et al. Realguard:a lightweight network intrusion detection system for IoT gateways[J]. Sensors (Basel,Switzerland), 2022,22(2): 432.
|
[12] |
彭媛媛 . 基于一维卷积神经网络的轻量级物联网入侵检测方法研究[D]. 成都:电子科技大学, 2022.
|
|
PENG Y Y . A lightweight IoT intrusion detection method based on one-dimensional convolutional neural network[D]. Chengdu:University of Electronic Science and Technology of China, 2022.
|
[13] |
THAKKAR A , LOHIYA R . A review on machine learning and deep learning perspectives of IDS for IoT:recent updates,security issues,and challenges[J]. Archives of Computational Methods in Engineering, 2021,28(4): 3211-3243.
|
[14] |
ZHAO R J , LI Z J , XUE Z ,et al. A novel approach based on lightweight deep neural network for network intrusion detection[C]// Proceedings of 2021 IEEE Wireless Communications and Networking Conference (WCNC). 2021: 1-6.
|
[15] |
CHOUDHARY T , MISHRA V , GOSWAMI A ,et al. A comprehensive survey on model compression and acceleration[J]. Artificial Intelligence Review, 2020,53(7): 5113-5155.
|
[16] |
GONG Y C , LIU L , YANG M ,et al. Compressing deep convolutional networks using vector quantization[J]. arXiv Preprint arXiv:1412.6115, 2014.
|
[17] |
GUPTA S , AGRAWAL A , GOPALAKRISHNAN K ,et al. Deep learning with limited numerical precision[C]// Proceedings of the 32nd International Conference on Machine Learning. 2015: 1737-1746.
|
[18] |
VANHOUCKE V , SENIOR A , MAO M . Improving the speed of neural networks on CPUs[C]// Proceedings of Deep Learning and Unsupervised Feature Learning Workshop. 2011: 1-8.
|
[19] |
HASSIBI B , STORK D G . Second order derivatives for network pruning:optimal brain surgeon[C]// Proceedings of Advances in Neural Information Processing Systems. 1992: 164-171.
|
[20] |
HAN S , POOL J , TRAN J ,et al. Learning both weights and connections for efficient neural networks[C]// Proceedings of the 28th International Conference on Neural Information Processing Systems. 2015: 1135-1143.
|
[21] |
LI H , KADAV A , DURDANOVIC I ,et al. Pruning filters for efficient ConvNets[J]. arXiv Preprint arXiv:1608.08710, 2016.
|
[22] |
IANDOLA F N , HAN Song , MOSKEWICZ M W ,et al. SqueezeNet:AlexNet-level accuracy with 50x fewer parameters and< 0.5 MB model size[J]. arXiv Preprint arXiv:1602.07360, 2016.
|
[23] |
HOWARD A G , ZHU M L , CHEN B ,et al. MobileNets:efficient convolutional neural networks for mobile vision applications[J]. arXiv Preprint arXiv:1704.04861, 2017.
|
[24] |
HINTON G , VINYALS O , DEAN J . Distilling the knowledge in a neural network[J]. arXiv Preprint arXiv:1503.02531, 2015.
|
[25] |
ROMERO A , BALLAS N , KAHOU S E ,et al. FitNets:Hints for thin deep nets[J]. arXiv Preprint arXiv:1412.6550, 2014.
|
[26] |
MOLCHANOV P , TYREE S , KARRAS T ,et al. Pruning convolutional neural networks for resource efficient inference[C]// Proceedings of 5th International Conference on Learning Representations (ICLR). 2019.
|
[27] |
MOLCHANOV P , MALLYA A , TYREE S ,et al. Importance estimation for neural network pruning[C]// Proceedings of 2019 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR). 2020: 11256-11264.
|
[28] |
WANG W , ZHU L Q , GUO B Q . Reliable identification of redundant kernels for convolutional neural network compression[J]. Journal of Visual Communication and Image Representation, 2019,63:102582.
|