, Internet security threat report, Annual Report -Online, vol.23, 2018.
2017 Cybercrime report, cybercrime damages will cost the world us$6 trillion by 2021, 2017. ,
Top 5 best practices to automate security operations, 2017. ,
, Ponemon Institute -Benchmark research sponsorded by IBM Security, 2018.
, on the protection of natural persons with regard to the processing of personal data and on the free movement of such data, and repealing Directive 95/46/EC (General Data Protection Regulation), Official Journal of the European Union, vol.119, 2016.
Cybersecurity: More threats, but also more opportunities, Paloalot Networks, 2016. ,
Imagenet classification with deep convolutional neural networks, Advances in neural information processing systems, pp.1097-1105, 2012. ,
Faster r-cnn: Towards real-time object detection with region proposal networks, Advances in neural information processing systems, pp.91-99, 2015. ,
The Microsoft 2017 conversational speech recognition system, 2018 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp.5934-5938, 2018. ,
Deep learning, pp.436-444, 2015. ,
Droid-Sec: deep learning in android malware detection, ACM SIGCOMM Computer Communication Review, vol.44, pp.371-372, 2014. ,
Deep neural network based malware detection using two dimensional binary program features, Malicious and Unwanted Software (MALWARE), 2015 10th International Conference on, pp.11-20, 2015. ,
The future of a.i, Statista Infographics, Statista, Online Report, 2016. ,
Towards evaluating the robustness of neural networks, 2017 IEEE Symposium on Security and Privacy (SP), pp.39-57, 2017. ,
Hidden voice commands, 25th USENIX Security Symposium (USENIX Security 16, 2016. ,
Droid-Sec: Deep learning in Android malware detection, SIGCOMM Comput. Commun. Rev, vol.44, issue.4, pp.371-372, 2014. ,
Deep learning for classification of malware system call sequences, AI 2016: Advances in Artificial Intelligence, pp.137-149, 2016. ,
High-dimensional and large-scale anomaly detection using a linear one-class SVM with deep learning, Pattern Recognition, vol.58, pp.121-134, 2016. ,
A deep learning approach for network intrusion detection system, Proceedings of the 9th EAI International Conference on Bio-inspired Information and Communications Technologies (formerly BIONETICS), pp.21-26, 2016. ,
Outside the closed world: On using machine learning for network intrusion detection, Security and Privacy (SP), 2010 IEEE Symposium on, pp.305-316, 2010. ,
Increasing web service availability by detecting application-layer DDoS attacks in encrypted traffic, Telecommunications (ICT), 2016 23rd International Conference on, pp.1-6, 2016. ,
Deepdefense: Identifying DDoS attack via deep learning, 2017 IEEE International Conference on Smart Computing (SMARTCOMP) ,
, IEEE, pp.1-8, 2017.
Deep learning with differential privacy, Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, pp.308-318, 2016. ,
Multi-key privacy-preserving deep learning in cloud computing, Future Generation Computer Systems, vol.74, pp.76-85, 2017. ,
Privacy-preserving deep learning, Proceedings of the 22nd ACM SIGSAC conference on computer and communications security, pp.1310-1321, 2015. ,
iPrivacy: image privacy protection by identifying sensitive objects via deep multi-task learning, IEEE Transactions on Information Forensics and Security, vol.12, issue.5, pp.1005-1016, 2017. ,
State-of-the-art deep learning: Evolving machine intelligence toward tomorrow's intelligent network traffic control systems, IEEE Communications Surveys & Tutorials, vol.19, issue.4, pp.2432-2455, 2017. ,
Representation learning: A review and new perspective, pp.1798-1828, 2013. ,
Deep learning of representations: Looking forward, International Conference on Statistical Language and Speech Processing, pp.1-37, 2013. ,
, Deep learning of representations for unsupervised and transfer learning, Proceedings of ICML Workshop on Unsupervised and Transfer Learning, ser. Proceedings of Machine Learning Research, vol.27, pp.17-36, 2012.
Big data deep learning: Challenges and perspectives, pp.514-525, 2014. ,
Efficient backprop, Neural networks: Tricks of the trade, pp.9-48, 2012. ,
Batch normalization: Accelerating deep network training by reducing internal covariate shift, 2015. ,
Multimodal learning with Deep Boltzmann Machines, pp.2949-2980, 2014. ,
Multimodal deep learning, Proceedings of the 28th international conference on machine learning, pp.689-696, 2011. ,
Deep machine learning-A new frontier in artificial intelligence research, pp.13-18, 2010. ,
An empirical exploration of recurrent network architectures, ICML, 2015. ,
Gradient-based hyperparameter optimization through reversible learning, International Conference on Machine Learning, pp.2113-2122, 2015. ,
Random search for hyper-parameter optimization, JMLR, pp.281-305, 2012. ,
Predicting parameters in deep learning, pp.2148-2156, 2013. ,
Neural networks and the bias/variance dilemma, Neural computation, vol.4, issue.1, pp.1-58, 1992. ,
Automatic early stopping using cross validation: quantifying the criteria, Neural Networks, vol.11, issue.4, pp.761-767, 1998. ,
Automatic differentiation in PyTorch, 31st Conference on Neural Information Processing Systems (NIPS), 2017. ,
An overview on data representation learning: From traditional feature learning to recent deep learning, The Journal of Finance and Data Science, vol.2, issue.4, pp.265-278, 2016. ,
Caffe: Convolutional architecture for fast feature embedding, pp.675-678, 2014. ,
The limitations of deep learning in adversarial settings, 2016 IEEE European Symposium on Security and Privacy (EuroS P), pp.372-387, 2016. ,