Deep learning network security
The explosion of data usage has contributed to the requirement of processing extensive amount of data for most of the applications on smart devices and edge- and fog- computing nodes. Due to the scale and complexity of the tasks, decision support systems can greatly benefit from the use of machin...
Saved in:
Main Authors: | , |
---|---|
Other Authors: | |
Format: | Book Chapter |
Language: | English |
Published: |
The Institution of Engineering and Technology
2021
|
Subjects: | |
Online Access: | https://digital-library.theiet.org/content/books/cs/pbcs066e https://hdl.handle.net/10356/152816 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Institution: | Nanyang Technological University |
Language: | English |
id |
sg-ntu-dr.10356-152816 |
---|---|
record_format |
dspace |
spelling |
sg-ntu-dr.10356-1528162023-03-24T13:10:56Z Deep learning network security Wang, Si Chang, Chip-Hong C. H. Chang Y. Cao School of Electrical and Electronic Engineering Engineering::Electrical and electronic engineering Deep Learning Network Security The explosion of data usage has contributed to the requirement of processing extensive amount of data for most of the applications on smart devices and edge- and fog- computing nodes. Due to the scale and complexity of the tasks, decision support systems can greatly benefit from the use of machine learning (ML) techniques to correlate multimodal sensing to make accurate predictions and powerful inferences. Traditional ML algorithms have to be fed with previously extracted features. These features are usually identified in advance to reduce the complexity of the data and increase the visibility of the patterns to the learning algorithms [1]. Furthermore, in some circumstances, like multiple object detection, the task needs to be divided into parts and solved individually and the partial results are combined at the final stage. The required human intervention and discontinuity in the process of accomplishing the tasks contribute to the reduced efficiency of the conventional ML algorithms in the face of massive raw data and intricate tasks. Deep learning (DL), also referred to as deep neural network (DNN), has overcome the weakness of the need for human’s participation on effective feature identification and hard-core feature extraction. It learns the high-level features from raw data in an incremental manner and solves the problems end-to-end. As a result, DL has now become a preferred option for handling majority of the challenging tasks in image classification [2], speech recognition and language processing [3]. 2021-10-05T00:08:38Z 2021-10-05T00:08:38Z 2020 Book Chapter Wang, S. & Chang, C. (2020). Deep learning network security. C. H. Chang & Y. Cao (Eds.), Frontiers in Hardware Security and Trust: Theory, design and practice (pp. 197-240). The Institution of Engineering and Technology. https://hdl.handle.net/10356/152816 978-1-78-561927-4 https://digital-library.theiet.org/content/books/cs/pbcs066e https://hdl.handle.net/10356/152816 10.1049/PBCS066E_ch9 197 240 en Frontiers in Hardware Security and Trust: Theory, design and practice © 2021 The Institution of Engineering and Technology. All rights reserved. The Institution of Engineering and Technology |
institution |
Nanyang Technological University |
building |
NTU Library |
continent |
Asia |
country |
Singapore Singapore |
content_provider |
NTU Library |
collection |
DR-NTU |
language |
English |
topic |
Engineering::Electrical and electronic engineering Deep Learning Network Security |
spellingShingle |
Engineering::Electrical and electronic engineering Deep Learning Network Security Wang, Si Chang, Chip-Hong Deep learning network security |
description |
The explosion of data usage has contributed to the requirement of processing extensive
amount of data for most of the applications on smart devices and edge- and fog-
computing nodes. Due to the scale and complexity of the tasks, decision support
systems can greatly benefit from the use of machine learning (ML) techniques to
correlate multimodal sensing to make accurate predictions and powerful inferences.
Traditional ML algorithms have to be fed with previously extracted features. These
features are usually identified in advance to reduce the complexity of the data and
increase the visibility of the patterns to the learning algorithms [1]. Furthermore, in
some circumstances, like multiple object detection, the task needs to be divided into
parts and solved individually and the partial results are combined at the final stage.
The required human intervention and discontinuity in the process of accomplishing
the tasks contribute to the reduced efficiency of the conventional ML algorithms in
the face of massive raw data and intricate tasks. Deep learning (DL), also referred to
as deep neural network (DNN), has overcome the weakness of the need for human’s
participation on effective feature identification and hard-core feature extraction. It
learns the high-level features from raw data in an incremental manner and solves the
problems end-to-end. As a result, DL has now become a preferred option for handling
majority of the challenging tasks in image classification [2], speech recognition and
language processing [3]. |
author2 |
C. H. Chang |
author_facet |
C. H. Chang Wang, Si Chang, Chip-Hong |
format |
Book Chapter |
author |
Wang, Si Chang, Chip-Hong |
author_sort |
Wang, Si |
title |
Deep learning network security |
title_short |
Deep learning network security |
title_full |
Deep learning network security |
title_fullStr |
Deep learning network security |
title_full_unstemmed |
Deep learning network security |
title_sort |
deep learning network security |
publisher |
The Institution of Engineering and Technology |
publishDate |
2021 |
url |
https://digital-library.theiet.org/content/books/cs/pbcs066e https://hdl.handle.net/10356/152816 |
_version_ |
1761781274284916736 |