SMOTE for learning from imbalanced data: progress and challenges, marking the 15-year anniversary

A Fernández, S Garcia, F Herrera, NV Chawla - Journal of artificial …, 2018 - jair.org
The Synthetic Minority Oversampling Technique (SMOTE) preprocessing algorithm is
considered" de facto" standard in the framework of learning from imbalanced data. This is …

I-SiamIDS: an improved Siam-IDS for handling class imbalance in network-based intrusion detection systems

P Bedi, N Gupta, V **dal - Applied Intelligence, 2021 - Springer
Abstract Network-based Intrusion Detection Systems (NIDSs) identify malicious activities by
analyzing network traffic. NIDSs are trained with the samples of benign and intrusive …

A smart anomaly-based intrusion detection system for the Internet of Things (IoT) network using GWO–PSO–RF model

PK Keserwani, MC Govil, ES Pilli, P Govil - Journal of Reliable Intelligent …, 2021 - Springer
Abstract The Internet of Things (IoT) is adding the advancement in the technology for
creating smart environments to facilitate humans for various works. The technological …

[PDF][PDF] Benchmark Datasets for Network Intrusion Detection: A Review.

Y Hamid, VR Balasaraswathi, L Journaux… - Int. J. Netw …, 2018 - researchgate.net
Abstract Network Intrusion Detection is the process of monitoring the events occurring in a
computer system or the network and analyzing them for the signs of possible intrusions. An …

Wavelet neural network model for network intrusion detection system

Y Hamid, FA Shah, M Sugumaran - International Journal of Information …, 2019 - Springer
Abstract Network Intrusion Detection is the process of analyzing the network traffic so as to
unearth any unsafe and possibly disastrous exchanges happening over the network. In the …

A t-SNE based non linear dimension reduction for network intrusion detection

Y Hamid, M Sugumaran - International Journal of Information Technology, 2020 - Springer
With the increased dependence on the internet for day to day activities, the need to keep the
networks secure has become more vital. The quest of securing the computer systems and …

Features extraction on IoT intrusion detection system using principal components analysis (PCA)

B Purnama, EA Winanto, D Stiawan… - 2020 7th …, 2020 - ieeexplore.ieee.org
Feature extraction solves the problem of finding the most efficient and comprehensive set of
features. A Principle Component Analysis (PCA) feature extraction algorithm is applied to …

[HTML][HTML] TEDLESS–Text detection using least-square SVM from natural scene

LM Francis, N Sreenath - Journal of King Saud University-Computer and …, 2020 - Elsevier
Text detection from the natural scene is considered to be a challenging problem due to the
complex background, varied light intensity at different locations, a large variety of colors …

Enhanced Deep Learning Intrusion Detection in IoT Heterogeneous Network with Feature Extraction

S Sharipuddin, EA Winanto… - … Journal of Electrical …, 2021 - section.iaesonline.com
Heterogeneous network is one of the challenges that must be overcome in Internet of Thing
Intrusion Detection System (IoT IDS). The difficulty of the IDS significantly is caused by …

Oil spill detection based on texture analysis: how does feature importance matter in classification?

RN Vasconcelos, CAD Lentini… - … Journal of Remote …, 2022 - Taylor & Francis
Oil spill map** and detection represent a relevant issue from an environmental point of
view, given the effects on marine ecosystems. This study presents a new feature space …