, Internet security threat report, Annual Report -Online, vol.23, 2018.

S. Morgan, 2017 Cybercrime report, cybercrime damages will cost the world us$6 trillion by 2021, 2017.

J. Trull, Top 5 best practices to automate security operations, 2017.

, Ponemon Institute -Benchmark research sponsorded by IBM Security, 2018.

, on the protection of natural persons with regard to the processing of personal data and on the free movement of such data, and repealing Directive 95/46/EC (General Data Protection Regulation), Official Journal of the European Union, vol.119, 2016.

S. Ciccone, Cybersecurity: More threats, but also more opportunities, Paloalot Networks, 2016.

A. Krizhevsky, I. Sutskever, and G. E. Hinton, Imagenet classification with deep convolutional neural networks, Advances in neural information processing systems, pp.1097-1105, 2012.

S. Ren, K. He, R. Girshick, and J. Sun, Faster r-cnn: Towards real-time object detection with region proposal networks, Advances in neural information processing systems, pp.91-99, 2015.

W. Xiong, L. Wu, F. Alleva, J. Droppo, X. Huang et al., The Microsoft 2017 conversational speech recognition system, 2018 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp.5934-5938, 2018.

G. H. Yann-lecun and Y. Bengio, Deep learning, pp.436-444, 2015.

Z. Yuan, Y. Lu, Z. Wang, and Y. Xue, Droid-Sec: deep learning in android malware detection, ACM SIGCOMM Computer Communication Review, vol.44, pp.371-372, 2014.

J. Saxe and K. Berlin, Deep neural network based malware detection using two dimensional binary program features, Malicious and Unwanted Software (MALWARE), 2015 10th International Conference on, pp.11-20, 2015.

M. Armstrong, The future of a.i, Statista Infographics, Statista, Online Report, 2016.

N. Carlini and D. Wagner, Towards evaluating the robustness of neural networks, 2017 IEEE Symposium on Security and Privacy (SP), pp.39-57, 2017.

N. Carlini, P. Mishra, T. Vaidya, Y. Zhang, M. Sherr et al., Hidden voice commands, 25th USENIX Security Symposium (USENIX Security 16, 2016.

Z. Yuan, Y. Lu, Z. Wang, and Y. Xue, Droid-Sec: Deep learning in Android malware detection, SIGCOMM Comput. Commun. Rev, vol.44, issue.4, pp.371-372, 2014.

B. Kolosnjaji, A. Zarras, G. Webster, and C. Eckert, Deep learning for classification of malware system call sequences, AI 2016: Advances in Artificial Intelligence, pp.137-149, 2016.

S. M. Erfani, S. Rajasegarar, S. Karunasekera, and C. Leckie, High-dimensional and large-scale anomaly detection using a linear one-class SVM with deep learning, Pattern Recognition, vol.58, pp.121-134, 2016.

A. Javaid, Q. Niyaz, W. Sun, and M. Alam, A deep learning approach for network intrusion detection system, Proceedings of the 9th EAI International Conference on Bio-inspired Information and Communications Technologies (formerly BIONETICS), pp.21-26, 2016.

R. Sommer and V. Paxson, Outside the closed world: On using machine learning for network intrusion detection, Security and Privacy (SP), 2010 IEEE Symposium on, pp.305-316, 2010.

M. Zolotukhin, T. Hämäläinen, T. Kokkonen, and J. Siltanen, Increasing web service availability by detecting application-layer DDoS attacks in encrypted traffic, Telecommunications (ICT), 2016 23rd International Conference on, pp.1-6, 2016.

X. Yuan, C. Li, and X. Li, Deepdefense: Identifying DDoS attack via deep learning, 2017 IEEE International Conference on Smart Computing (SMARTCOMP)

, IEEE, pp.1-8, 2017.

M. Abadi, A. Chu, I. Goodfellow, H. B. Mcmahan, I. Mironov et al., Deep learning with differential privacy, Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, pp.308-318, 2016.

P. Li, J. Li, Z. Huang, T. Li, C. Gao et al., Multi-key privacy-preserving deep learning in cloud computing, Future Generation Computer Systems, vol.74, pp.76-85, 2017.

R. Shokri and V. Shmatikov, Privacy-preserving deep learning, Proceedings of the 22nd ACM SIGSAC conference on computer and communications security, pp.1310-1321, 2015.

J. Yu, B. Zhang, Z. Kuang, D. Lin, and J. Fan, iPrivacy: image privacy protection by identifying sensitive objects via deep multi-task learning, IEEE Transactions on Information Forensics and Security, vol.12, issue.5, pp.1005-1016, 2017.

Z. Fadlullah, F. Tang, B. Mao, N. Kato, O. Akashi et al., State-of-the-art deep learning: Evolving machine intelligence toward tomorrow's intelligent network traffic control systems, IEEE Communications Surveys & Tutorials, vol.19, issue.4, pp.2432-2455, 2017.

Y. Bengio, A. Courville, and P. Vincent, Representation learning: A review and new perspective, pp.1798-1828, 2013.

Y. Bengio, Deep learning of representations: Looking forward, International Conference on Statistical Language and Speech Processing, pp.1-37, 2013.

, Deep learning of representations for unsupervised and transfer learning, Proceedings of ICML Workshop on Unsupervised and Transfer Learning, ser. Proceedings of Machine Learning Research, vol.27, pp.17-36, 2012.

X. Chen and X. Lin, Big data deep learning: Challenges and perspectives, pp.514-525, 2014.

Y. A. Lecun, L. Bottou, G. B. Orr, and K. Müller, Efficient backprop, Neural networks: Tricks of the trade, pp.9-48, 2012.

S. Ioffe and C. Szegedy, Batch normalization: Accelerating deep network training by reducing internal covariate shift, 2015.

N. Srivastava and R. Salakhutdinov, Multimodal learning with Deep Boltzmann Machines, pp.2949-2980, 2014.

J. Ngiam, A. Khosla, M. Kim, J. Nam, H. Lee et al., Multimodal deep learning, Proceedings of the 28th international conference on machine learning, pp.689-696, 2011.

I. Arel, D. C. Rose, and T. P. Karnowski, Deep machine learning-A new frontier in artificial intelligence research, pp.13-18, 2010.

I. S. Józefowicz and W. Zaremba, An empirical exploration of recurrent network architectures, ICML, 2015.

D. Maclaurin, D. Duvenaud, and R. Adams, Gradient-based hyperparameter optimization through reversible learning, International Conference on Machine Learning, pp.2113-2122, 2015.

Y. B. and J. Bergstra, Random search for hyper-parameter optimization, JMLR, pp.281-305, 2012.

M. Denil, B. Shakibi, L. Dinh, and N. D. Freitas, Predicting parameters in deep learning, pp.2148-2156, 2013.

S. Geman, E. Bienenstock, and R. Doursat, Neural networks and the bias/variance dilemma, Neural computation, vol.4, issue.1, pp.1-58, 1992.

L. Prechelt, Automatic early stopping using cross validation: quantifying the criteria, Neural Networks, vol.11, issue.4, pp.761-767, 1998.

A. Paszke, S. Gross, S. Chintala, G. Chanan, E. Yang et al., Automatic differentiation in PyTorch, 31st Conference on Neural Information Processing Systems (NIPS), 2017.

G. Zhong, L. Wang, X. Ling, and J. Dong, An overview on data representation learning: From traditional feature learning to recent deep learning, The Journal of Finance and Data Science, vol.2, issue.4, pp.265-278, 2016.

Y. Jia, E. Shelhamer, J. Donahue, S. Karayev, J. Long et al., Caffe: Convolutional architecture for fast feature embedding, pp.675-678, 2014.

N. Papernot, P. Mcdaniel, S. Jha, M. Fredrikson, Z. B. Celik et al., The limitations of deep learning in adversarial settings, 2016 IEEE European Symposium on Security and Privacy (EuroS P), pp.372-387, 2016.