edge network has been discussed. It has covered the
importance of edge computing for medical
application along with detection of anomalies using
the two deep learning models like DNN and GAN. In
the results, the accuracy of GAN appears better than
DNN with lesser loss and seems better in detecting
anomalies than DNN. In the future scope, same could
be implemented using fuzzy neural classifier to get
better results than the DNN and GAN.
ACKNOWLEDGEMENTS
We gratefully acknowledge to Dr. Bhushan Jadhav
at Thadomal Shahani Engineering College who
helped and support during the research process. Their
contributions were instrumental in shaping the
direction and scope of this work. Additionally, we
acknowledge the reviewers whose thoughtful
comments and suggestions greatly enhanced the
clarity and depth of the manuscript. Lastly, we
express our appreciation to Springer and the editorial
team for their professionalism and assistance in the
publication process.
REFERENCES
1.
Chalapathy, R., Chawla, S., 2019. Deep Learning for
Anomaly Detection: A Survey. arXiv:1901.03407.
2.
Zhu, M., Ye, K., Wang, Y., Xu, C.Z., 2018. A Deep
Learning Approach for Network Anomaly Detection
Based on AMF- LSTM. In: 15th IFIP International
Conference on Network and Parallel Computing
(NPC), Muroran, Japan, pp. 137-141. Springer.
3.
Kim, J., Kim, J., Thu, H.L.T., Kim, H., 2016. Long short-
term memory recurrent neural network classifier for
intrusion detection. In: Platform Technology and
Service (PlatCon), International Conference on, pp.
1-5. Springer.
4.
Anantha, A.P., Daely, P.T., Lee, J.M., Kim, D.S., 2020.
Edge Computing-Based Anomaly Detection for Multi-
Source Monitoring in Industrial Wireless Sensor
Networks. In: ICTC 2020, pp. 1890- 1892.Springer.
5.
Majeed, A.A., Kilpatrick, P., Spence, I., Varghese, B.,
2022. CONTINUER:Maintaining Distributed DNN
Services During Edge Failures. In: IEEE International
Conference on Edge Computing and Communications
(EDGE), 24 August 2022. Springer.
6.
Hu, P., Chen, W., 2019. Software- Defined
Edge Computing (SDEC): Principles,
Open System Architecture and Challenges. In: IEEE
SmartWorld, Ubiquitous Intelligence &Computing
(SmartWorld/ SCALCOM/UIC/ATC/CB D
Com/IOP/SCI). Springer.
7.
Yuan, F., Cao, Y., Shang, Y., Liu, Y., Tan, J., Fang,
B., 2018. Insider threatdetection with deep neural
network. In: International Conference on Computational
Science, pp. 43-54. Springer.
8.
Kwon, D., Kim, H., Kim, J. et al., 2019. A survey of
deep learning-based network anomaly detection.
Cluster Computing, pp. 949–961.
9.
Yin, C., Zhu, Y., Fei, J., He, X., 2017. A Deep Learning
Approach for Intrusion Detection Using Recurrent
Neural Networks. IEEE Access, vol. 5, pp. 21954-
21961.
10.
Zhang, L., Fan, F., Dai, Y., He, C., 2022.Analysis
and research of generative adversarial network in
anomaly detection. In: 7th International Conference on
Intelligent Computing and Signal Processing (ICSP),
IEEE.
11.
Zhang, B., Yu, Y., Li, J., 2018. Network intrusion
detection based on stacked sparse autoencoder and
binary tree ensemble method. In: Proc. IEEE Int. Conf.
Commun. Workshops (ICC Workshops), pp. 1–6.
12.
Yan, B., Han, G., 2018. Effective feature extraction via
stacked sparse autoencoder to improve intrusion
detection system. IEEE Access, vol. 6, pp. 41238–
41248.
13.
Al-Qatf, M., Lasheng, Y., Al-Habib, M., Al- Sabahi,
K., 2018. Deep learning approach combining sparse
autoencoder with SVM for network intrusion detection.
IEEE Access, vol. 6, pp. 52843–52856.
14.
Xu, W., Jang-Jaccard, J., Singh, A., Wei, Y., Sabrina,
F., 2021. Improving Performance of Autoencoder-
Based Network Anomaly Detection on NSL- KDD
Dataset. IEEE Access, vol. 9, pp. 140136-140146.
15.
Liang, Y., Chen, Z., Lin, D., Tan, J.,Yang, Z., Li,
J., Li, X., 2023. Three-Dimension Attention
Mechanism and Self-Supervised Pretext Task for
Augmenting Few-Shot Learning. IEEE Access, vol. 11,
pp. 59428- 59437.
16.
Kingma, D.P., Welling, M., 2013. Auto- encoding
variational Bayes. arXiv:1312.6114.
17.
An, J., Cho, S., 2015. Variationalautoencoder-
based anomaly detection using reconstruction
probability. SNU Data Mining Center, Seoul, South
Korea, Tech. Rep.
18.
Zavrak, S., Skefiyeli, M., 2020. Anomaly- Based
Intrusion Detection from Network Flow Features
Using Variational Autoencoder. IEEE Access, vol. 8,
pp. 108346-108358.
19.
Li, Q., Zhu, Y., Ding, J., Li, W., Sun, W., Ding, L., 2021.
Deep Reinforcement Learning based Resource
Allocation for Cloud Edge Collaboration Fault
Detection in Smart Grid. CSEE Journal of Power and
Energy Systems, pp. 1-10.
20.
Jozefowicz, R., et al., 2016. Exploring the limits of
language modeling. arXiv:1602.02410.
21.
Graves, A., Mohamed, A.R., Hinton, G., 2013. Speech
recognition with deep recurrent neural networks. In:
IEEE International Conference on Acoustics, Speech
and Signal Processing (ICASSP). IEEE.