共 34 条
[2]
Aledhari M, 2020, IEEE ACCESS, V8, P140699, DOI [10.1109/access.2020.3013541, 10.1109/ACCESS.2020.3013541]
[3]
[Anonymous], 2009, Proceedings of the 2009 ACM symposium on Applied Computing, SAC'09
[4]
Arasteh H, 2016, 2016 IEEE 16TH INTERNATIONAL CONFERENCE ON ENVIRONMENT AND ELECTRICAL ENGINEERING (EEEIC)
[5]
Aris A, 2015, SIG PROCESS COMMUN, P903, DOI 10.1109/SIU.2015.7129976
[6]
Babu B S., 2016, International Journal of Science and Research (IJSR), V5, P322, DOI DOI 10.21275/V5I2.NOV161096
[7]
Bonawitz K., 2016, P NEURIPS WORKSH PRI
[8]
Bonawitz K, 2019, Proc Mach Learn, V1, P374, DOI DOI 10.48550/ARXIV.1902.01046
[9]
Network Intrusion Detection for IoT Security Based on Learning Techniques
[J].
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS,
2019, 21 (03)
:2671-2701
[10]
Intrusion Detection for Wireless Edge Networks Based on Federated Learning
[J].
IEEE ACCESS,
2020, 8 (08)
:217463-217472