[HTML][HTML] A systematic review of data fusion techniques for optimized structural health monitoring

S Hassani, U Dackermann, M Mousavi, J Li - Information Fusion, 2024 - Elsevier
Advancements in structural health monitoring (SHM) techniques have spiked in the past few
decades due to the rapid evolution of novel sensing and data transfer technologies. This …

A comprehensive survey on machine learning for networking: evolution, applications and research opportunities

R Boutaba, MA Salahuddin, N Limam, S Ayoubi… - Journal of Internet …, 2018 - Springer
Abstract Machine Learning (ML) has been enjoying an unprecedented surge in applications
that solve problems and enable automation in diverse domains. Primarily, this is due to the …

A survey on machine learning for data fusion

T Meng, X **g, Z Yan, W Pedrycz - Information Fusion, 2020 - Elsevier
Data fusion is a prevalent way to deal with imperfect raw data for capturing reliable, valuable
and accurate information. Comparing with a range of classical probabilistic data fusion …

TSE-IDS: A two-stage classifier ensemble for intelligent anomaly-based intrusion detection system

BA Tama, M Comuzzi, KH Rhee - IEEE access, 2019 - ieeexplore.ieee.org
Intrusion detection systems (IDSs) play a pivotal role in computer security by discovering
and repealing malicious activities in computer networks. Anomaly-based IDS, in particular …

Dynamic classifier selection: Recent advances and perspectives

RMO Cruz, R Sabourin, GDC Cavalcanti - Information Fusion, 2018 - Elsevier
Abstract Multiple Classifier Systems (MCS) have been widely studied as an alternative for
increasing accuracy in pattern recognition. One of the most promising MCS approaches is …

[KIRJA][B] Ensemble methods: foundations and algorithms

ZH Zhou - 2025 - books.google.com
Ensemble methods that train multiple learners and then combine them to use, with Boosting
and Bagging as representatives, are well-known machine learning approaches. It has …

Network anomaly detection: methods, systems and tools

MH Bhuyan, DK Bhattacharyya… - … surveys & tutorials, 2013 - ieeexplore.ieee.org
Network anomaly detection is an important and dynamic research area. Many network
intrusion detection methods and systems (NIDS) have been proposed in the literature. In this …

CANN: An intrusion detection system based on combining cluster centers and nearest neighbors

WC Lin, SW Ke, CF Tsai - Knowledge-based systems, 2015 - Elsevier
The aim of an intrusion detection systems (IDS) is to detect various types of malicious
network traffic and computer usage, which cannot be detected by a conventional firewall …

Cloud-based cyber-physical intrusion detection for vehicles using deep learning

G Loukas, T Vuong, R Heartfield, G Sakellari… - Ieee …, 2017 - ieeexplore.ieee.org
Detection of cyber attacks against vehicles is of growing interest. As vehicles typically afford
limited processing resources, proposed solutions are rule-based or lightweight machine …

A survey of multiple classifier systems as hybrid systems

M Woźniak, M Grana, E Corchado - Information Fusion, 2014 - Elsevier
A current focus of intense research in pattern classification is the combination of several
classifier systems, which can be built following either the same or different models and/or …