[1] |
ZHANG Shipeng, LI Yongzhong, DU Xiangtong.
Intrusion detection model based on semi-supervised learning and three-way decision
[J]. Journal of Computer Applications, 2021, 41(9): 2602-2608.
|
[2] |
WANG Yue, JIANG Yiming, LAN Julong.
Intrusion detection based on improved triplet network and K-nearest neighbor algorithm
[J]. Journal of Computer Applications, 2021, 41(7): 1996-2002.
|
[3] |
LU Guoqing, SUN Hao.
Two-dimensional mapping of swarm robot based on random walk
[J]. Journal of Computer Applications, 2021, 41(7): 2121-2127.
|
[4] |
ZHANG Linfa, ZHANG Yufeng, WANG Kun, LI Zhiyao.
Medical image fusion with intuitionistic fuzzy set and intensity enhancement
[J]. Journal of Computer Applications, 2021, 41(7): 2082-2091.
|
[5] |
WANG Yao, SUN Guozi.
Oversampling method for intrusion detection based on clustering and instance hardness
[J]. Journal of Computer Applications, 2021, 41(6): 1709-1714.
|
[6] |
LI Xujuan, PI Jianyong, HUANG Feixiang, JIA Haipeng.
Self-generated deep neural network based 4D trajectory prediction
[J]. Journal of Computer Applications, 2021, 41(5): 1492-1499.
|
[7] |
ZHANG Quanlong, WANG Huaibin.
Intrusion detection model based on combination of dilated convolution and gated recurrent unit
[J]. Journal of Computer Applications, 2021, 41(5): 1372-1377.
|
[8] |
REN Xiaokui, LIU Pengfei, TAO Zhiyong, LIU Ying, BAI Lichun.
Indoor intrusion detection based on direction-of-arrival estimation algorithm for single snapshot
[J]. Journal of Computer Applications, 2021, 41(4): 1153-1159.
|
[9] |
LYU Jia, XIAN Yan.
Co-training algorithm combining improved density peak clustering and shared subspace
[J]. Journal of Computer Applications, 2021, 41(3): 686-693.
|
[10] |
QIU Ningjia, WANG Xiaoxia, WANG Peng, WANG Yanchun.
Analysis of double-channel Chinese sentiment model integrating grammar rules
[J]. Journal of Computer Applications, 2021, 41(2): 318-323.
|
[11] |
YANG Shuxin, LIANG Wen, ZHU Kaili.
Reverse influence maximization algorithm in social networks
[J]. Journal of Computer Applications, 2020, 40(7): 1944-1949.
|
[12] |
CHENG Xiaohui, NIU Tong, WANG Yanjun.
Wireless sensor network intrusion detection system based on sequence model
[J]. Journal of Computer Applications, 2020, 40(6): 1680-1684.
|
[13] |
XUE Feng, SHI Xuhua, SHI Feifan.
Surrogate-based differential evolution constrained optimization
[J]. Journal of Computer Applications, 2020, 40(4): 1091-1096.
|
[14] |
OU Binli, ZHONG Xiaru, DAI Jianhua, YANG Tian.
Intrusion detection method based on variable precision covering rough set
[J]. Journal of Computer Applications, 2020, 40(12): 3465-3470.
|
[15] |
LI Zhongwei, TAN Kai, GUAN Yadong, JIANG Wenqi, YE Lin.
In-vehicle CAN bus-off attack and its intrusion detection algorithm
[J]. Journal of Computer Applications, 2020, 40(11): 3224-3228.
|