[1] |
沈鑫, 裴庆祺, 刘雪峰 . 区块链技术综述[J]. 网络与信息安全学报, 2016,2(11): 11-20.
|
|
SHEN X , PEI Q Q , LIU X F . Survey of block chain[J]. Chinese Journal of Network and Information Security, 2016,2(11): 11-20.
|
[2] |
STEPHEN R , ALEX A . A review on blockchain security[J]. IOP Conference Series:Materials Science and Engineering, 2018:doi.org/10.1088/1757-899x/396/1/012030.
|
[3] |
韩璇, 袁勇, 王飞跃 . 区块链安全问题:研究现状与展望[J]. 自动化学报, 2019,45(1): 206-225.
|
|
HAN X , YUAN Y , WANG F Y . Security problems on blockchain:the state of the art and future trends[J]. Acta Automatica Sinica, 2019,45(1): 206-225.
|
[4] |
江沛佩, 王骞, 陈艳姣 ,等. 区块链网络安全保障:攻击与防御[J]. 通信学报, 2021,42(1): 151-162.
|
|
JIANG P P , WANG Q , CHEN Y J ,et al. Securing guarantee of the blockchain network:attacks and countermeasures[J]. Journal on Communications, 2021,42(1): 151-162.
|
[5] |
TRAMèR F , BONEH D , PATERSON K G . Remote side-channel attacks on anonymous transactions[C]// Proceedings of the 29th USENIX Conference on Security Symposium. New York:ACM Press, 2020: 2739-2756.
|
[6] |
叶聪聪, 李国强, 蔡鸿明 ,等. 区块链的安全检测模型[J]. 软件学报, 2018,29(5): 1348-1359.
|
|
YE C C , LI G Q , CAI H M ,et al. Security detection model of blockchain[J]. Journal of Software, 2018,29(5): 1348-1359.
|
[7] |
曾诗钦, 霍如, 黄韬 ,等. 区块链技术研究综述:原理、进展与应用[J]. 通信学报, 2020,41(1): 134-151.
|
|
ZENG S Q , HUO R , HUANG T ,et al. Survey of blockchain:principle,progress and application[J]. Journal on Communications, 2020,41(1): 134-151.
|
[8] |
HASSAN M U , REHMANI M H , CHEN J . Anomaly detection in blockchain networks:a comprehensive survey[J]. arXiv Preprint,arXiv:2112.06089, 2021.
|
[9] |
KIM J , NAKASHIMA M , FAN W J ,et al. Anomaly detection based on traffic monitoring for secure blockchain networking[C]// Proceedings of 2021 IEEE International Conference on Blockchain and Cryptocurrency (ICBC). Piscataway:IEEE Press, 2021: 1-9.
|
[10] |
SYARIF I , ZALUSKA E , PRUGEL-BENNETT A ,et al. Application of bagging,boosting and stacking to intrusion detection[C]// Proceedings of International Workshop on Machine Learning and Data Mining in Pattern Recognition. Berlin:Springer, 2012: 593-602.
|
[11] |
凌玥, 刘玉岭, 姜波 ,等. 基于双层异质集成学习器的入侵检测方法[J]. 信息安全学报, 2021,6(3): 16-28.
|
|
LING Y , LIU Y L , JIANG B ,et al. Intrusion detection method based on double-layer heterogeneous ensemble learner[J]. Journal of Cyber Security, 2021,6(3): 16-28.
|
[12] |
GAIKWAD D P , THOOL R C . Intrusion detection system using bagging ensemble method of machine learning[C]// Proceedings of 2015 International Conference on Computing Communication Control and Automation. Piscataway:IEEE Press, 2015: 291-295.
|
[13] |
DONG X B , YU Z W , CAO W M ,et al. A survey on ensemble learning[J]. Frontiers of Computer Science, 2020,14(2): 241-258.
|
[14] |
杨晓晖, 张圣昌 . 基于多粒度级联孤立森林算法的异常检测模型[J]. 通信学报, 2019,40(8): 133-142.
|
|
YANG X H , ZHANG S C . Anomaly detection model based on multi-grained cascade isolation forest algorithm[J]. Journal on Communications, 2019,40(8): 133-142.
|
[15] |
黄金超, 马颖华, 齐开悦 ,等. 一种基于集成学习的入侵检测算法[J]. 上海交通大学学报, 2018,52(10): 1382-1387.
|
|
HUANG J C , MA Y H , QI K Y ,et al. An ensemble-based intrusion detection algorithm[J]. Journal of Shanghai Jiao Tong University, 2018,52(10): 1382-1387.
|
[16] |
李小剑, 谢晓尧, 徐洋 . 网络流量异常检测方法:SSAE-IWELMAdaBoost[J]. 武汉大学学报(理学版), 2020,66(2): 126-134.
|
|
LI X J , XIE X Y , XU Y . Network traffic anomaly detection method:SSAE-IWELM-AdaBoost[J]. Journal of Wuhan University (Natural Science Edition), 2020,66(2): 126-134.
|
[17] |
ZHANG J Q , WANG Z Z , MENG J J ,et al. Boosting positive and unlabeled learning for anomaly detection with multi-features[J]. IEEE Transactions on Multimedia, 2019,21(5): 1332-1344.
|
[18] |
刘金平, 何捷舟, 马天雨 ,等. 基于KELM选择性集成的复杂网络环境入侵检测[J]. 电子学报, 2019,47(5): 1070-1078.
|
|
LIU J P , HE J Z , MA T Y ,et al. Selective ensemble of KELM-based complex network intrusion detection[J]. Acta Electronica Sinica, 2019,47(5): 1070-1078.
|
[19] |
REDDY D K K , BEHERA H S , PRATYUSHA G M S ,et al. Ensemble bagging approach for IoT sensor based anomaly detection[C]// Proceedings of the Intelligent Computing in Control and Communication. Berlin:Springer, 2021: 647-665.
|
[20] |
OFORI-BOATENG D , DOMINGUEZ I S , AKCORA C ,et al. Topological anomaly detection in dynamic multilayer blockchain networks[C]// Joint European Conference on Machine Learning and Knowledge Discovery in Databases. Berlin:Springer, 2021: 788-804.
|
[21] |
ZHANG R , ZHANG G F , LIU L ,et al. Anomaly detection in bitcoin information networks with multi-constrained meta path[J]. Journal of Systems Architecture, 2020:doi.org/10.1016/j.sysarc.2020.101829.
|
[22] |
JOHNSON R , ZHANG T . Accelerating stochastic gradient descent using predictive variance reduction[C]// Proceedings of the 26th International Conference on Neural Information Processing Systems. New York:ACM Press, 2013: 315-323.
|
[23] |
钱景辉, 梁栋 . 一种基于多标记的局部离群点检测算法[J]. 微电子学与计算机, 2017,34(10): 110-114.
|
|
QIAN J H , LIANG D . Local outlier detection algorithm based on multi-label learning[J]. Microelectronics & Computer, 2017,34(10): 110-114.
|
[24] |
DAI Q Y , ZHANG B , DONG S Q . A DDoS-attack detection method oriented to the blockchain network layer[J]. Security and Communication Networks, 2022,2022: 1-18.
|
[25] |
DAI Q Y , ZHANG B , DONG S Q . Eclipse attack detection for blockchain network layer based on deep feature extraction[J]. Wireless Communications and Mobile Computing, 2022,2022: 1-19.
|
[26] |
XU G , GUO B , SU C ,et al. Am I eclipsed? a smart detector of eclipse attacks for Ethereum[J]. Computers & Security, 2020,88: 101604.
|
[27] |
LAURENS V D M , HINTON G . Viualizing data using t-SNE[J]. Journal of Machine Learning Research, 2008,9(2605): 2579-2605.
|