Deep learning network security

The explosion of data usage has contributed to the requirement of processing extensive amount of data for most of the applications on smart devices and edge- and fog- computing nodes. Due to the scale and complexity of the tasks, decision support systems can greatly benefit from the use of machin...

Full description

Saved in:
Bibliographic Details
Main Authors: Wang, Si, Chang, Chip-Hong
Other Authors: C. H. Chang
Format: Book Chapter
Language:English
Published: The Institution of Engineering and Technology 2021
Subjects:
Online Access:https://digital-library.theiet.org/content/books/cs/pbcs066e
https://hdl.handle.net/10356/152816
Tags: Add Tag
No Tags, Be the first to tag this record!
Institution: Nanyang Technological University
Language: English
id sg-ntu-dr.10356-152816
record_format dspace
spelling sg-ntu-dr.10356-1528162023-03-24T13:10:56Z Deep learning network security Wang, Si Chang, Chip-Hong C. H. Chang Y. Cao School of Electrical and Electronic Engineering Engineering::Electrical and electronic engineering Deep Learning Network Security The explosion of data usage has contributed to the requirement of processing extensive amount of data for most of the applications on smart devices and edge- and fog- computing nodes. Due to the scale and complexity of the tasks, decision support systems can greatly benefit from the use of machine learning (ML) techniques to correlate multimodal sensing to make accurate predictions and powerful inferences. Traditional ML algorithms have to be fed with previously extracted features. These features are usually identified in advance to reduce the complexity of the data and increase the visibility of the patterns to the learning algorithms [1]. Furthermore, in some circumstances, like multiple object detection, the task needs to be divided into parts and solved individually and the partial results are combined at the final stage. The required human intervention and discontinuity in the process of accomplishing the tasks contribute to the reduced efficiency of the conventional ML algorithms in the face of massive raw data and intricate tasks. Deep learning (DL), also referred to as deep neural network (DNN), has overcome the weakness of the need for human’s participation on effective feature identification and hard-core feature extraction. It learns the high-level features from raw data in an incremental manner and solves the problems end-to-end. As a result, DL has now become a preferred option for handling majority of the challenging tasks in image classification [2], speech recognition and language processing [3]. 2021-10-05T00:08:38Z 2021-10-05T00:08:38Z 2020 Book Chapter Wang, S. & Chang, C. (2020). Deep learning network security. C. H. Chang & Y. Cao (Eds.), Frontiers in Hardware Security and Trust: Theory, design and practice (pp. 197-240). The Institution of Engineering and Technology. https://hdl.handle.net/10356/152816 978-1-78-561927-4 https://digital-library.theiet.org/content/books/cs/pbcs066e https://hdl.handle.net/10356/152816 10.1049/PBCS066E_ch9 197 240 en Frontiers in Hardware Security and Trust: Theory, design and practice © 2021 The Institution of Engineering and Technology. All rights reserved. The Institution of Engineering and Technology
institution Nanyang Technological University
building NTU Library
continent Asia
country Singapore
Singapore
content_provider NTU Library
collection DR-NTU
language English
topic Engineering::Electrical and electronic engineering
Deep Learning
Network Security
spellingShingle Engineering::Electrical and electronic engineering
Deep Learning
Network Security
Wang, Si
Chang, Chip-Hong
Deep learning network security
description The explosion of data usage has contributed to the requirement of processing extensive amount of data for most of the applications on smart devices and edge- and fog- computing nodes. Due to the scale and complexity of the tasks, decision support systems can greatly benefit from the use of machine learning (ML) techniques to correlate multimodal sensing to make accurate predictions and powerful inferences. Traditional ML algorithms have to be fed with previously extracted features. These features are usually identified in advance to reduce the complexity of the data and increase the visibility of the patterns to the learning algorithms [1]. Furthermore, in some circumstances, like multiple object detection, the task needs to be divided into parts and solved individually and the partial results are combined at the final stage. The required human intervention and discontinuity in the process of accomplishing the tasks contribute to the reduced efficiency of the conventional ML algorithms in the face of massive raw data and intricate tasks. Deep learning (DL), also referred to as deep neural network (DNN), has overcome the weakness of the need for human’s participation on effective feature identification and hard-core feature extraction. It learns the high-level features from raw data in an incremental manner and solves the problems end-to-end. As a result, DL has now become a preferred option for handling majority of the challenging tasks in image classification [2], speech recognition and language processing [3].
author2 C. H. Chang
author_facet C. H. Chang
Wang, Si
Chang, Chip-Hong
format Book Chapter
author Wang, Si
Chang, Chip-Hong
author_sort Wang, Si
title Deep learning network security
title_short Deep learning network security
title_full Deep learning network security
title_fullStr Deep learning network security
title_full_unstemmed Deep learning network security
title_sort deep learning network security
publisher The Institution of Engineering and Technology
publishDate 2021
url https://digital-library.theiet.org/content/books/cs/pbcs066e
https://hdl.handle.net/10356/152816
_version_ 1761781274284916736