[1] 陈雷,司志刚,鹤荣育,等. 基于改进自适应灰色模型的网络安全态势预测[J]. 计算机科学, 2014, 41(11A):259-262. (CHEN L, SI Z G, HE R Y, et al. Network security situation prediction based on improved adaptive grey model[J]. Computer Science, 2014, 41(11A):259-262.) [2] 张勇东,陈思洋,彭雨荷,等. 基于深度学习的网络入侵检测研究综述[J]. 广州大学学报(自然科学版), 2019, 18(3):17-26. (ZHANG Y D, CHEN S Y, PENG Y H, et al. A survey of deep learning based network intrusion detection[J]. Journal of Guangzhou University (Natural Science Edition), 2019, 18(3):17-26.) [3] FAROOQI A H, KHAN F A. Intrusion detection systems for wireless sensor networks:a survey[C]//Proceedings of the 2009 International Conference on Future Generation Communication and Networking, CCIS 56. Berlin:Springer, 2009:234-241. [4] KUMAR G R, LANJEWAR U A. Intrusion detection and prevention system:classification and quick review[J]. International Journal of Computer Science and Information Security, 2012, 10(5):78-83. [5] FUCHSBERGER A. Intrusion detection systems and intrusion prevention systems[J]. Information Security Technical Report, 2005, 10(3):134-139. [6] ROUGHAN M, SEN S, SPATSCHECK O, et al. Class-of-service mapping for QoS:a statistical signature-based approach to IP traffic classification[C]//Proceedings of the 4th ACM SIGCOMM conference on Internet measurement. New York:ACM, 2004:135-148. [7] YIN C, ZHU Y, FEI J, et al. A deep learning approach for intrusion detection using recurrent neural networks[J]. IEEE Access, 2017, 5:21954-21961. [8] ZHANG L, WHITE G B. An approach to detect executable content for anomaly based network intrusion detection[C]//Proceedings of the 2007 IEEE Conference on International Parallel and Distributed Processing Symposium. Piscataway:IEEE, 2007:1-8. [9] YUAN X, LI C, LI X. DeepDefense:identifying DDoS attack via deep learning[C]//Proceedings of the 2017 Conference on Smart Computing. Piscataway:IEEE, 2017:1-8. [10] SUTSKEVER I, VINYALS O, LE Q V. Sequence to sequence learning with neural networks[C]//Proceedings of the 27th International Conference on Neural Information Processing Systems. Cambridge:MIT Press, 2014:3104-3112. [11] NALLAPATI R, ZHOU B, DOS SANTOS C, et al. Abstractive text summarization using sequence-to-sequence RNNs and beyond[EB/OL].[2019-09-26]. https://arxiv.org/pdf/1602.06023.pdf. [12] ZHOU H, HUANG M, ZHANG T, et al. Emotional chatting machine:emotional conversation generation with internal and external memory[EB/OL].[2019-04-04]. https://arxiv.org/pdf/1704.01074.pdf. [13] WANG Z, HE W, WU H, et al. Chinese poetry generation with planning based neural network[EB/OL].[2019-10-31].https://arxiv.org/pdf/1610.09889.pdf. [14] 陶涛,周喜,马博,等. 基于双向LSTM的Seq2Seq模型在加油站时序数据异常检测中的应用[J]. 计算机应用, 2019, 39(3):924-929. (TAO T, ZHOU X, MA B, et al. Abnormal time series data detection of gas station by Seq2Seq model based on bidirectional long short-term memory[J]. Journal of Computer Applications, 2019, 39(3):924-929.) [15] LAMPLE G, CHARTON F. Deep learning for symbolic mathematics[EB/OL].[2019-12-02].https://arxiv.org/pdf/1912.01412.pdf [16] KANTER J M, VEERAMACHANENI K. Deep feature synthesis:Towards automating data science endeavors[C]//Proceedings of the 2015 IEEE International Conference on Data Science and Advanced Analytics. Piscataway:IEEE, 2015:1-10. [17] 袁非牛,章琳,史劲亭. 自编码神经网络理论及应用综述[J]. 计算机学报, 2019, 42(1):203-230. (YUAN F N, ZHANG L,SHI J T. Theories and applications of auto-encoder neural networks:a literature survey[J]. Chinese Journal of Computers, 2019, 42(1):203-230.) [18] RAO K, PENG F, SAK H, et al. Grapheme-to-phoneme conversion using long short-term memory recurrent neural networks[C]//Proceedings of the 2015 IEEE International Conference on Acoustics, Speech and Signal Processing. Piscataway:IEEE, 2015:4225-4229. [19] JI H, LONG J, FU Y, et al. Flow pattern identification based on EMD and LS-SVM for gas-liquid two-phase flow in a minichannel[J]. IEEE Transactions on Instrumentation and Measurement, 2011, 60(5):1917-1924. [20] 丁君美,刘贵全,李慧. 改进随机森林算法在电信业客户流失预测中的应用[J]. 模式识别与人工智能, 2015, 28(11):1041-1049. (DING J M, LIU G Q, LI H. The application of improved random forest in the telecom customer churn prediction[J]. Pattern Recognition and Artificial Intelligence, 2015, 28(11):1041-1049.) [21] HOERL A E, KENNARD R W. Ridge regression:biased estimation for nonorthogonal problems[J]. Technometrics, 1970, 12(1):55-67. |