Advertisement

Deep Learning

  • Kwangjo Kim
  • Muhamad Erza Aminanto
  • Harry Chandra Tanuwidjaja
Chapter
  • 2k Downloads
Part of the SpringerBriefs on Cyber Security Systems and Networks book series (BRIEFSCSSN)

Abstract

This chapter defines a brief history and definition of deep learning. Due to a variety of models belonging to deep learning, we classify deep learning models into a tree which has three branches: generative, discriminative, and hybrid. In each model, we show some learning model examples in order to see the difference among three models.

References

  1. 1.
    M. E. Aminanto and K. Kim, “Deep learning in intrusion detection system: An overview,” International Research Conference on Engineering and Technology 2016, Bali, Indonesia, June 28–30, 2016.Google Scholar
  2. 2.
    L. Deng, “A tutorial survey of architectures, algorithms, and applications for deep learning,” APSIPA Transactions on Signal and Information Processing, vol. 3, 2014.Google Scholar
  3. 3.
    L. Deng, D. Yu, et al., “Deep learning: methods and applications,” Foundations and Trends® in Signal Processing, vol. 7, no. 3–4, pp. 197–387, 2014.MathSciNetCrossRefGoogle Scholar
  4. 4.
    A. Dimokranitou, “Adversarial autoencoders for anomalous event detection in images,” Ph.D. dissertation, Purdue University, 2017.Google Scholar
  5. 5.
    Z. Wang, “The applications of deep learning on traffic identification,” in Conf. BlackHat, Las Vegas, USA. UBM, 2015.Google Scholar
  6. 6.
    P. Vincent, H. Larochelle, I. Lajoie, Y. Bengio, and P.-A. Manzagol, “Stacked denoising autoencoders: Learning useful representations in a deep network with a local denoising criterion,” Journal of Machine Learning Research, vol. 11, no. Dec, pp. 3371–3408, 2010.Google Scholar
  7. 7.
    Y. Bengio, P. Lamblin, D. Popovici, H. Larochelle, et al., “Greedy layer-wise training of deep networks,” Advances in neural information processing systems, vol. 19, pp. 153–160, Sep 2007.Google Scholar
  8. 8.
    Y. Bengio, Y. LeCun, et al., “Scaling learning algorithms towards AI,” Large-scale kernel machines, vol. 34, no. 5, pp. 1–41, 2007.Google Scholar
  9. 9.
    R. Salakhutdinov and G. Hinton, “Deep boltzmann machines,” Artificial Intelligence and Statistics, pp. 448–455, 2009.Google Scholar
  10. 10.
    M. Salama, H. Eid, R. Ramadan, A. Darwish, and A. Hassanien, “Hybrid intelligent intrusion detection scheme,” Soft computing in industrial applications, pp. 293–303, 2011.Google Scholar
  11. 11.
    H. Poon and P. Domingos, “Sum-product networks: A new deep architecture,” in Computer Vision Workshops (ICCV Workshops), 2011 IEEE International Conference on. IEEE, 2011, pp. 689–690.Google Scholar
  12. 12.
    R. C. Staudemeyer, “Applying long short-term memory recurrent neural networks to intrusion detection,” South African Computer Journal, vol. 56, no. 1, pp. 136–154, 2015.Google Scholar
  13. 13.
    C. Olah, “Understanding LSTM networks,” http://colah.github.io/posts/2015-08-Understanding-LSTMs/, 2015, [Online; accessed 20-February-2018].
  14. 14.
    S. Hochreiter and J. Schmidhuber, “Long short-term memory,” Neural computation, vol. 9, no. 8, pp. 1735–1780, 1997.CrossRefGoogle Scholar
  15. 15.
    J. Kim, J. Kim, H. L. T. Thu, and H. Kim, “Long short term memory recurrent neural network classifier for intrusion detection,” in Platform Technology and Service (PlatCon), 2016 International Conference on. IEEE, 2016, pp. 1–5.Google Scholar
  16. 16.
    Y. LeCun, L. Bottou, Y. Bengio, and P. Haffner, “Gradient-based learning applied to document recognition,” Proceedings of the IEEE, vol. 86, no. 11, pp. 2278–2324, 1998.CrossRefGoogle Scholar
  17. 17.
    M. A. Nielsen, “Neural networks and deep learning,” 2015.Google Scholar
  18. 18.
    D. Silver, A. Huang, C. J. Maddison, A. Guez, L. Sifre, G. Van Den Driessche, J. Schrittwieser, I. Antonoglou, V. Panneershelvam, M. Lanctot, et al., “Mastering the game of Go with deep neural networks and tree search,” Nature, vol. 529, no. 7587, pp. 484–489, 2016.CrossRefGoogle Scholar
  19. 19.
    A. Graves, “Sequence transduction with recurrent neural networks,” arXiv preprint arXiv:1211.3711, 2012.Google Scholar
  20. 20.
    I. Goodfellow, J. Pouget-Abadie, M. Mirza, B. Xu, D. Warde-Farley, S. Ozair, A. Courville, and Y. Bengio, “Generative adversarial nets,” in Advances in neural information processing systems, 2014, pp. 2672–2680.Google Scholar

Copyright information

© The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd., part of Springer Nature 2018

Authors and Affiliations

  • Kwangjo Kim
    • 1
  • Muhamad Erza Aminanto
    • 1
  • Harry Chandra Tanuwidjaja
    • 1
  1. 1.School of Computing (SoC)Korea Advanced Institute of Science and TechnologyDaejeonKorea (Republic of)

Personalised recommendations