[1] |
ZHANG Shipeng, LI Yongzhong, DU Xiangtong.
Intrusion detection model based on semi-supervised learning and three-way decision
[J]. Journal of Computer Applications, 2021, 41(9): 2602-2608.
|
[2] |
WANG Yue, JIANG Yiming, LAN Julong.
Intrusion detection based on improved triplet network and K-nearest neighbor algorithm
[J]. Journal of Computer Applications, 2021, 41(7): 1996-2002.
|
[3] |
LIU Shize, QIN Yanjun, WANG Chenxing, SU Lin, KE Qixue, LUO Haiyong, SUN Yi, WANG Baohui.
Traffic flow prediction algorithm based on deep residual long short-term memory network
[J]. Journal of Computer Applications, 2021, 41(6): 1566-1572.
|
[4] |
WANG Yao, SUN Guozi.
Oversampling method for intrusion detection based on clustering and instance hardness
[J]. Journal of Computer Applications, 2021, 41(6): 1709-1714.
|
[5] |
ZHANG Quanlong, WANG Huaibin.
Intrusion detection model based on combination of dilated convolution and gated recurrent unit
[J]. Journal of Computer Applications, 2021, 41(5): 1372-1377.
|
[6] |
LI Xujuan, PI Jianyong, HUANG Feixiang, JIA Haipeng.
Self-generated deep neural network based 4D trajectory prediction
[J]. Journal of Computer Applications, 2021, 41(5): 1492-1499.
|
[7] |
REN Xiaokui, LIU Pengfei, TAO Zhiyong, LIU Ying, BAI Lichun.
Indoor intrusion detection based on direction-of-arrival estimation algorithm for single snapshot
[J]. Journal of Computer Applications, 2021, 41(4): 1153-1159.
|
[8] |
CHEN Kai, YU Yanwei, ZHAO Jindong, SONG Peng.
Work location inference method with big data of urban traffic surveillance
[J]. Journal of Computer Applications, 2021, 41(1): 177-184.
|
[9] |
LONG Yangyang, CHEN Yuling, XIN Yang, DOU Hui.
Secure energy transaction scheme based on alliance blockchain
[J]. Journal of Computer Applications, 2020, 40(6): 1668-1673.
|
[10] |
CHENG Xiaohui, NIU Tong, WANG Yanjun.
Wireless sensor network intrusion detection system based on sequence model
[J]. Journal of Computer Applications, 2020, 40(6): 1680-1684.
|
[11] |
DU Xusheng, YU Jiong, YE Lele, CHEN Jiaying.
Outlier detection algorithm based on graph random walk
[J]. Journal of Computer Applications, 2020, 40(5): 1322-1328.
|
[12] |
XU Zhoubo, YANG Jian, LIU Huadong, HUANG Wenwen.
Protein complex identification algorithm based on XGboost and topological structural information
[J]. Journal of Computer Applications, 2020, 40(5): 1510-1514.
|
[13] |
LIU Xiangju, LIU Pengcheng, XU Hui, ZHU Xiaojuan.
Distributed denial of service attack detection method based on software defined Internet of things
[J]. Journal of Computer Applications, 2020, 40(3): 753-759.
|
[14] |
MA Dong, CHEN Hongmei, WANG Lizhen, XIAO Qing.
Dominant feature mining of spatial sub-prevalent co-location patterns
[J]. Journal of Computer Applications, 2020, 40(2): 465-472.
|
[15] |
CHEN Xi, MEI Guang, ZHANG Jinjin, XU Weisheng.
Student grade prediction method based on knowledge graph and collaborative filtering
[J]. Journal of Computer Applications, 2020, 40(2): 595-601.
|