Skip Content
You are currently on the new version of our website. Access the old version .

45,540 Results Found

  • Review
  • Open Access
12 Citations
8,885 Views
27 Pages

6 December 2019

In this article we want to understand in more detail how learning networks emerge in online networked learning environments. An adage in Networked Learning theory is that networked learning cannot be designed; it can only be designed for. This adage...

  • Article
  • Open Access
1,493 Views
16 Pages

Quotient Network-A Network Similar to ResNet but Learning Quotients

  • Peng Hui,
  • Jiamuyang Zhao,
  • Changxin Li and
  • Qingzhen Zhu

13 November 2024

The emergence of ResNet provides a powerful tool for training extremely deep networks. The core idea behind it is to change the learning goals of the network. It no longer learns new features from scratch but learns the difference between the target...

  • Article
  • Open Access
1 Citations
1,643 Views
21 Pages

16 December 2024

Network dismantling is an important question that has attracted much attention from many different research areas, including the disruption of criminal organizations, the maintenance of stability in sensor networks, and so on. However, almost all cur...

  • Article
  • Open Access
187 Citations
16,544 Views
19 Pages

Deep Q-Learning Based Reinforcement Learning Approach for Network Intrusion Detection

  • Hooman Alavizadeh,
  • Hootan Alavizadeh and
  • Julian Jang-Jaccard

The rise of the new generation of cyber threats demands more sophisticated and intelligent cyber defense solutions equipped with autonomous agents capable of learning to make decisions without the knowledge of human experts. Several reinforcement lea...

  • Article
  • Open Access
2 Citations
2,135 Views
18 Pages

Attribute Network Representation Learning with Dual Autoencoders

  • Jinghong Wang,
  • Zhixia Zhou,
  • Bi Li and
  • Mancai Wu

5 September 2022

The purpose of attribute network representation learning is to learn the low-dimensional dense vector representation of nodes by combining structure and attribute information. The current network representation learning methods have insufficient inte...

  • Article
  • Open Access
7 Citations
3,252 Views
13 Pages

Positive-Unlabeled Learning for Network Link Prediction

  • Shengfeng Gan,
  • Mohammed Alshahrani and
  • Shichao Liu

15 September 2022

Link prediction is an important problem in network data mining, which is dedicated to predicting the potential relationship between nodes in the network. Normally, network link prediction based on supervised classification will be trained on a datase...

  • Article
  • Open Access
5 Citations
4,683 Views
15 Pages

30 June 2020

In this paper, we propose a new network model using variational learning to improve the learning stability of generative adversarial networks (GAN). The proposed method can be easily applied to improve the learning stability of GAN-based models that...

  • Article
  • Open Access
14 Citations
6,849 Views
25 Pages

Attack Graph Generation with Machine Learning for Network Security

  • Kijong Koo,
  • Daesung Moon,
  • Jun-Ho Huh,
  • Se-Hoon Jung and
  • Hansung Lee

Recently, with the discovery of various security threats, diversification of hacking attacks, and changes in the network environment such as the Internet of Things, security threats on the network are increasing. Attack graph is being actively studie...

  • Article
  • Open Access
2,624 Views
14 Pages

17 November 2020

Deep neural networks have achieved high performance in image classification, image generation, voice recognition, natural language processing, etc.; however, they still have confronted several open challenges that need to be solved such as incrementa...

  • Article
  • Open Access
1 Citations
1,014 Views
18 Pages

Network security and intrusion detection and response (IDR) are necessary issues nowadays. Enhancing our cyber defense by discovering advanced machine learning models, such as reinforcement learning and Q-learning, is a crucial security measure. This...

  • Article
  • Open Access
11 Citations
5,294 Views
13 Pages

In this paper, we present a novel incremental learning technique to solve the catastrophic forgetting problem observed in the CNN architectures. We used a progressive deep neural network to incrementally learn new classes while keeping the performanc...

  • Article
  • Open Access
3 Citations
3,642 Views
15 Pages

Deep Learning for Network Intrusion Detection in Virtual Networks

  • Daniel Spiekermann,
  • Tobias Eggendorfer and
  • Jörg Keller

11 September 2024

As organizations increasingly adopt virtualized environments for enhanced flexibility and scalability, securing virtual networks has become a critical part of current infrastructures. This research paper addresses the challenges related to intrusion...

  • Article
  • Open Access
33 Citations
8,970 Views
29 Pages

The concept of edge caching provision in emerging 5G and beyond mobile networks is a promising method to deal both with the traffic congestion problem in the core network, as well as reducing latency to access popular content. In that respect, end us...

  • Article
  • Open Access
3,141 Views
19 Pages

An Optimized Network Representation Learning Algorithm Using Multi-Relational Data

  • Zhonglin Ye,
  • Haixing Zhao,
  • Ke Zhang,
  • Yu Zhu and
  • Zhaoyang Wang

Representation learning aims to encode the relationships of research objects into low-dimensional, compressible, and distributed representation vectors. The purpose of network representation learning is to learn the structural relationships between n...

  • Article
  • Open Access
324 Views
17 Pages

Artificial Intelligence (AI) has seen rapid advancements in recent times, finding applications across various sectors and achieving notable successes. However, current AI models based on Deep Convolutional Neural Networks (DNNs) face numerous challen...

  • Article
  • Open Access
3 Citations
1,777 Views
25 Pages

Conventional supervised machine learning is widely used for intrusion detection without packet payload inspection, showing good accuracy in detecting known attacks. However, these methods require large labeled datasets, which are scarce due to privac...

  • Article
  • Open Access
2 Citations
4,873 Views
18 Pages

Multi-View Network Representation Learning Algorithm Research

  • Zhonglin Ye,
  • Haixing Zhao,
  • Ke Zhang and
  • Yu Zhu

12 March 2019

Network representation learning is a key research field in network data mining. In this paper, we propose a novel multi-view network representation algorithm (MVNR), which embeds multi-scale relations of network vertices into the low dimensional repr...

  • Article
  • Open Access
1 Citations
1,306 Views
23 Pages

In 5G and beyond 5G networks, function placement is a crucial strategy for enhancing the flexibility and efficiency of the Radio Access Network (RAN). However, demonstrating optimal function splitting and placement to meet diverse user demands remain...

  • Article
  • Open Access
5 Citations
3,030 Views
17 Pages

13 October 2022

Deep reinforcement learning (DRL) algorithms interact with the environment and have achieved considerable success in several decision-making problems. However, DRL requires a significant number of data before it can achieve adequate performance. More...

  • Article
  • Open Access
2 Citations
3,734 Views
15 Pages

Orthogonal Neural Network: An Analytical Model for Deep Learning

  • Yonghao Pan,
  • Hongtao Yu,
  • Shaomei Li and
  • Ruiyang Huang

14 February 2024

In the current deep learning model, the computation between each feature and parameter is defined in the real number field. This, together with the nonlinearity of the deep learning model, makes it difficult to analyze the relationship between the va...

  • Article
  • Open Access
3 Citations
3,095 Views
14 Pages

28 September 2023

In this study, a target-network update of deep reinforcement learning (DRL) based on mutual information (MI) and rewards is proposed. In DRL, updating the target network from the Q network was used to reduce training diversity and contribute to the s...

  • Article
  • Open Access
9 Citations
4,555 Views
16 Pages

Hybrid Optimization Algorithm for Bayesian Network Structure Learning

  • Xingping Sun,
  • Chang Chen,
  • Lu Wang,
  • Hongwei Kang,
  • Yong Shen and
  • Qingyi Chen

24 September 2019

Since the beginning of the 21st century, research on artificial intelligence has made great progress. Bayesian networks have gradually become one of the hotspots and important achievements in artificial intelligence research. Establishing an effectiv...

  • Article
  • Open Access
4 Citations
2,238 Views
14 Pages

Ship Network Traffic Engineering Based on Reinforcement Learning

  • Xinduoji Yang,
  • Minghui Liu,
  • Xinxin Wang,
  • Bingyu Hu,
  • Meng Liu and
  • Xiaomin Wang

This research addresses multiple challenges faced by ship networks, including limited bandwidth, unstable network connections, high latency, and command priority. To solve these problems, we used reinforcement learning-based methods to simulate traff...

  • Article
  • Open Access
21 Citations
8,881 Views
20 Pages

22 February 2020

The Max-cut problem is a well-known combinatorial optimization problem, which has many real-world applications. However, the problem has been proven to be non-deterministic polynomial-hard (NP-hard), which means that exact solution algorithms are not...

  • Article
  • Open Access
6 Citations
2,370 Views
27 Pages

Network Intrusion Detection Based on Deep Belief Network Broad Equalization Learning System

  • Miaolei Deng,
  • Chuanchuan Sun,
  • Yupei Kan,
  • Haihang Xu,
  • Xin Zhou and
  • Shaojun Fan

Network intrusion detection systems are an important defense technology to guarantee information security and protect a network from attacks. In recent years, the broad learning system has attracted much attention and has been introduced into intrusi...

  • Article
  • Open Access
111 Citations
20,800 Views
23 Pages

20 December 2019

Penetration testing (also known as pentesting or PT) is a common practice for actively assessing the defenses of a computer network by planning and executing all possible attacks to discover and exploit existing vulnerabilities. Current penetration t...

  • Review
  • Open Access
1 Citations
2,322 Views
23 Pages

17 September 2025

Kalman filter is a widely used estimation algorithm with numerous applications, including parameter estimation, classification, prediction, pattern recognition, tuning, and filtering. Recently, it has gained attention in artificial intelligence and m...

  • Article
  • Open Access
2 Citations
2,585 Views
19 Pages

Social Network Forensics Analysis Model Based on Network Representation Learning

  • Kuo Zhao,
  • Huajian Zhang,
  • Jiaxin Li,
  • Qifu Pan,
  • Li Lai,
  • Yike Nie and
  • Zhongfei Zhang

7 July 2024

The rapid evolution of computer technology and social networks has led to massive data generation through interpersonal communications, necessitating improved methods for information mining and relational analysis in areas such as criminal activity....

  • Article
  • Open Access
7 Citations
3,829 Views
23 Pages

Timeslot Scheduling with Reinforcement Learning Using a Double Deep Q-Network

  • Jihye Ryu,
  • Juhyeok Kwon,
  • Jeong-Dong Ryoo,
  • Taesik Cheung and
  • Jinoo Joung

20 February 2023

Adopting reinforcement learning in the network scheduling area is getting more attention than ever because of its flexibility in adapting to the dynamic changes of network traffic and network status. In this study, a timeslot scheduling algorithm for...

  • Article
  • Open Access
158 Citations
11,128 Views
20 Pages

A Deep Learning Ensemble for Network Anomaly and Cyber-Attack Detection

  • Vibekananda Dutta,
  • Michał Choraś,
  • Marek Pawlicki and
  • Rafał Kozik

15 August 2020

Currently, expert systems and applied machine learning algorithms are widely used to automate network intrusion detection. In critical infrastructure applications of communication technologies, the interaction among various industrial control systems...

  • Article
  • Open Access
3 Citations
2,622 Views
13 Pages

Network Representation Learning Algorithm Based on Complete Subgraph Folding

  • Dongming Chen,
  • Mingshuo Nie,
  • Jiarui Yan,
  • Dongqi Wang and
  • Qianqian Gan

13 February 2022

Network representation learning is a machine learning method that maps network topology and node information into low-dimensional vector space. Network representation learning enables the reduction of temporal and spatial complexity in the downstream...

  • Article
  • Open Access
30 Citations
4,835 Views
28 Pages

16 November 2020

Oil and Gas organizations are dependent on their IT infrastructure, which is a small part of their industrial automation infrastructure, to function effectively. The oil and gas (O&G) organizations industrial automation infrastructure landscape i...

  • Article
  • Open Access
18 Citations
6,184 Views
14 Pages

Neural Network-Based Learning from Demonstration of an Autonomous Ground Robot

  • Yiwei Fu,
  • Devesh K. Jha,
  • Zeyu Zhang,
  • Zhenyuan Yuan and
  • Asok Ray

This paper presents and experimentally validates a concept of end-to-end imitation learning for autonomous systems by using a composite architecture of convolutional neural network (ConvNet) and Long Short Term Memory (LSTM) neural network. In partic...

  • Article
  • Open Access
23 Citations
5,629 Views
18 Pages

Benchmarking Deep Learning Methods for Behaviour-Based Network Intrusion Detection

  • Mário Antunes,
  • Luís Oliveira,
  • Afonso Seguro,
  • João Veríssimo,
  • Ruben Salgado and
  • Tiago Murteira

Network security encloses a wide set of technologies dealing with intrusions detection. Despite the massive adoption of signature-based network intrusion detection systems (IDSs), they fail in detecting zero-day attacks and previously unseen vulnerab...

  • Article
  • Open Access
87 Citations
12,472 Views
16 Pages

Comparison of Machine Learning and Deep Learning Models for Network Intrusion Detection Systems

  • Niraj Thapa,
  • Zhipeng Liu,
  • Dukka B. KC,
  • Balakrishna Gokaraju and
  • Kaushik Roy

30 September 2020

The development of robust anomaly-based network detection systems, which are preferred over static signal-based network intrusion, is vital for cybersecurity. The development of a flexible and dynamic security system is required to tackle the new att...

  • Article
  • Open Access
40 Citations
5,245 Views
21 Pages

4 November 2021

Hydrogel has a complex network structure with inhomogeneous and random distribution of polymer chains. Much effort has been paid to fully understand the relationship between mesoscopic network structure and macroscopic mechanical properties of hydrog...

  • Article
  • Open Access
1 Citations
1,183 Views
34 Pages

DQKNet: Deep Quasiconformal Kernel Network Learning for Image Classification

  • Jia Zhai,
  • Zikai Zhang,
  • Fan Ye,
  • Ziquan Wang and
  • Dan Guo

24 October 2024

Compared to traditional technology, image classification technology possesses a superior capability for quantitative analysis of the target and background, and holds significant applications in the domains of ground target reconnaissance, marine envi...

  • Article
  • Open Access
2 Citations
1,423 Views
21 Pages

Background/Objectives: Metabolomics has recently emerged as a key tool in the biological sciences, offering insights into metabolic pathways and processes. Over the last decade, network-based machine learning approaches have gained significant popula...

  • Article
  • Open Access
45 Citations
4,147 Views
19 Pages

Identification of disease-associated miRNAs (disease miRNAs) are critical for understanding etiology and pathogenesis. Most previous methods focus on integrating similarities and associating information contained in heterogeneous miRNA-disease networ...

  • Feature Paper
  • Article
  • Open Access
7 Citations
5,347 Views
21 Pages

Modular Dynamic Neural Network: A Continual Learning Architecture

  • Daniel Turner,
  • Pedro J. S. Cardoso and
  • João M. F. Rodrigues

18 December 2021

Learning to recognize a new object after having learned to recognize other objects may be a simple task for a human, but not for machines. The present go-to approaches for teaching a machine to recognize a set of objects are based on the use of deep...

  • Article
  • Open Access
18 Citations
5,710 Views
17 Pages

Self-Improving Generative Artificial Neural Network for Pseudorehearsal Incremental Class Learning

  • Diego Mellado,
  • Carolina Saavedra,
  • Steren Chabert,
  • Romina Torres and
  • Rodrigo Salas

1 October 2019

Deep learning models are part of the family of artificial neural networks and, as such, they suffer catastrophic interference when learning sequentially. In addition, the greater number of these models have a rigid architecture which prevents the inc...

  • Article
  • Open Access
1 Citations
3,759 Views
13 Pages

Improving Spiking Neural Network Performance with Auxiliary Learning

  • Paolo G. Cachi,
  • Sebastián Ventura and
  • Krzysztof J. Cios

The use of back propagation through the time learning rule enabled the supervised training of deep spiking neural networks to process temporal neuromorphic data. However, their performance is still below non-spiking neural networks. Previous work poi...

  • Article
  • Open Access
1,295 Citations
35,050 Views
16 Pages

10 April 2017

This paper proposes a convolutional neural network (CNN)-based method that learns traffic as images and predicts large-scale, network-wide traffic speed with a high accuracy. Spatiotemporal traffic dynamics are converted to images describing the time...

  • Article
  • Open Access
2 Citations
2,479 Views
12 Pages

18 July 2022

Learning the conditional probability table (CPT) parameters of Bayesian networks (BNs) is a key challenge in real-world decision support applications, especially when there are limited data available. The traditional approach to this challenge is int...

  • Article
  • Open Access
2 Citations
2,341 Views
12 Pages

28 September 2022

Signed network embedding concentrates on learning fixed-length representations for nodes in signed networks with positive and negative links, which contributes to many downstream tasks in social media, such as link prediction. However, most signed ne...

  • Article
  • Open Access
1,916 Views
15 Pages

Anonymous Networking Detection in Cryptocurrency Using Network Fingerprinting and Machine Learning

  • Amanul Islam,
  • Nazmus Sakib,
  • Kelei Zhang,
  • Simeon Wuthier and
  • Sang-Yoon Chang

Cryptocurrency such as Bitcoin supports anonymous routing (Tor and I2P) due to the application requirements of anonymity and censorship resistance. In permissionless and open networking for cryptocurrency, an adversary can spoof to pretend to use Tor...

  • Article
  • Open Access
5 Citations
3,761 Views
11 Pages

Gradient-Free Neural Network Training via Synaptic-Level Reinforcement Learning

  • Aman Bhargava,
  • Mohammad R. Rezaei and
  • Milad Lankarany

12 April 2022

An ongoing challenge in neural information processing is the following question: how do neurons adjust their connectivity to improve network-level task performance over time (i.e., actualize learning)? It is widely believed that there is a consistent...

  • Article
  • Open Access
111 Citations
12,419 Views
16 Pages

HDLNIDS: Hybrid Deep-Learning-Based Network Intrusion Detection System

  • Emad Ul Haq Qazi,
  • Muhammad Hamza Faheem and
  • Tanveer Zia

14 April 2023

Attacks on networks are currently the most pressing issue confronting modern society. Network risks affect all networks, from small to large. An intrusion detection system must be present for detecting and mitigating hostile attacks inside networks....

  • Article
  • Open Access
16 Citations
4,413 Views
22 Pages

16 October 2019

Deep learning (DL)-based paradigms have recently made many advances in image pansharpening. However, most of the existing methods directly downscale the multispectral (MSI) and panchromatic (PAN) images with default blur kernel to construct the train...

  • Article
  • Open Access
120 Citations
17,380 Views
14 Pages

10 August 2022

The connectivity of devices through the internet plays a remarkable role in our daily lives. Many network-based applications are utilized in different domains, e.g., health care, smart environments, and businesses. These applications offer a wide ran...

of 911