Skip to main content

Showing 1–4 of 4 results for author: Junior, L A P

  1. Generalizing intrusion detection for heterogeneous networks: A stacked-unsupervised federated learning approach

    Authors: Gustavo de Carvalho Bertoli, Lourenço Alves Pereira Junior, Aldri Luiz dos Santos, Osamu Saotome

    Abstract: The constantly evolving digital transformation imposes new requirements on our society. Aspects relating to reliance on the networking domain and the difficulty of achieving security by design pose a challenge today. As a result, data-centric and machine-learning approaches arose as feasible solutions for securing large networks. Although, in the network security domain, ML-based solutions face a… ▽ More

    Submitted 28 November, 2022; v1 submitted 1 September, 2022; originally announced September 2022.

    Comments: Preprint (Under revision), 35 pages. Added repository link, see https://github.com/c2dc/fl-unsup-nids

  2. arXiv:2111.06161  [pdf, other

    cs.NI cs.LG cs.SI

    Understanding mobility in networks: A node embedding approach

    Authors: Matheus F. C. Barros, Carlos H. G. Ferreira, Bruno Pereira dos Santos, Lourenço A. P. Júnior, Marco Mellia, Jussara M. Almeida

    Abstract: Motivated by the growing number of mobile devices capable of connecting and exchanging messages, we propose a methodology aiming to model and analyze node mobility in networks. We note that many existing solutions in the literature rely on topological measurements calculated directly on the graph of node contacts, aiming to capture the notion of the node's importance in terms of connectivity and m… ▽ More

    Submitted 11 November, 2021; originally announced November 2021.

  3. arXiv:2110.13655  [pdf, other

    cs.CR cs.AI cs.LG

    Bridging the gap to real-world for network intrusion detection systems with data-centric approach

    Authors: Gustavo de Carvalho Bertoli, Lourenço Alves Pereira Junior, Filipe Alves Neto Verri, Aldri Luiz dos Santos, Osamu Saotome

    Abstract: Most research using machine learning (ML) for network intrusion detection systems (NIDS) uses well-established datasets such as KDD-CUP99, NSL-KDD, UNSW-NB15, and CICIDS-2017. In this context, the possibilities of machine learning techniques are explored, aiming for metrics improvements compared to the published baselines (model-centric approach). However, those datasets present some limitations a… ▽ More

    Submitted 8 January, 2022; v1 submitted 25 October, 2021; originally announced October 2021.

    Comments: Camera-ready version from Data-centric AI workshop at NeurIPS 2021, see https://datacentricai.org/papers/104_CameraReady_dcaicamera-ready.pdf

  4. arXiv:1608.07719  [pdf, ps, other

    cs.LG

    Temperature-Based Deep Boltzmann Machines

    Authors: Leandro Aparecido Passos Junior, Joao Paulo Papa

    Abstract: Deep learning techniques have been paramount in the last years, mainly due to their outstanding results in a number of applications, that range from speech recognition to face-based user identification. Despite other techniques employed for such purposes, Deep Boltzmann Machines are among the most used ones, which are composed of layers of Restricted Boltzmann Machines (RBMs) stacked on top of eac… ▽ More

    Submitted 3 September, 2016; v1 submitted 27 August, 2016; originally announced August 2016.

    Comments: Submitted to Neural Processing Letters