[1] |
WANG Chunying, ZHANG Xun, ZHAO Jinxiong, YUAN Hui, LI Fangjun, ZHAO Bo, ZHU Xiaoqin, YANG Fan, LYU Shichao.
Analysis of attack events based on multi-source alerts
[J]. Journal of Computer Applications, 2020, 40(1): 123-128.
|
[2] |
YU Yongbin, QI Minhui, Nyima Tashi, WANG Lin.
Association rule mining algorithm for Hopfield neural network based on threshold adaptive memristor
[J]. Journal of Computer Applications, 2019, 39(3): 728-733.
|
[3] |
DU Yuan, ZHANG Shiwei.
Improved canonical-order tree algorithm based on restructure
[J]. Journal of Computer Applications, 2019, 39(2): 441-445.
|
[4] |
CHEN Liu, FENG Shan.
Two-level confidence threshold setting method for positive and negative association rules
[J]. Journal of Computer Applications, 2018, 38(5): 1315-1319.
|
[5] |
XIAO Wen, HU Juan.
Performance analysis of frequent itemset mining algorithms based on sparseness of dataset
[J]. Journal of Computer Applications, 2018, 38(4): 995-1000.
|
[6] |
YIN Yuan, ZHANG Chang, WEN Kai, ZHENG Yunjun.
Maximal frequent itemset mining algorithm based on DiffNodeset structure
[J]. Journal of Computer Applications, 2018, 38(12): 3438-3443.
|
[7] |
GU Junhua, WU Junyan, XU Xinyun, XIE Zhijian, ZHANG Suqi.
Optimization and implementation of parallel FP-Growth algorithm based on Spark
[J]. Journal of Computer Applications, 2018, 38(11): 3069-3074.
|
[8] |
WANG Shuai, YANG Qiuhui, ZENG Jiayan, WAN Ying, FAN Zhening, ZHANG Guanglan.
Application of weighted incremental association rule mining in communication alarm prediction
[J]. Journal of Computer Applications, 2018, 38(10): 2875-2880.
|
[9] |
LI Xiaolin, DU Tuo, LIU Biao.
Fast algorithm for mining frequent patterns based on B-list
[J]. Journal of Computer Applications, 2017, 37(8): 2357-2361.
|
[10] |
TAN Zheng, LIU JingLei, YU Hang.
Conditional preference mining based on MaxClique
[J]. Journal of Computer Applications, 2017, 37(11): 3107-3114.
|
[11] |
WANG Tao, QIN Xizhong, JIA Zhenhong, NIU Hongmei, CAO Chuanling.
Association rules recommendation of microblog friend based on similarity and trust
[J]. Journal of Computer Applications, 2016, 36(8): 2262-2267.
|
[12] |
WANG Xin, LIU Fang'ai.
Improved algorithm for mining collaborative frequent itemsets in multiple data streams
[J]. Journal of Computer Applications, 2016, 36(7): 1988-1992.
|
[13] |
XU Kaiyong, GONG Xuerong, CHENG Maocai.
Audit log association rule mining based on improved Apriori algorithm
[J]. Journal of Computer Applications, 2016, 36(7): 1847-1851.
|
[14] |
XU Yongxiu, LIU Xumin, XU Weixiang.
Improved frequent itemset mining algorithm based on interval list
[J]. Journal of Computer Applications, 2016, 36(4): 997-1001.
|
[15] |
WANG Le, CHANG Yanfeng, WANG Shui.
Frequent pattern mining algorithm from uncertain data based on pattern-growth
[J]. Journal of Computer Applications, 2015, 35(7): 1921-1926.
|