[1] |
ZHANG Shipeng, LI Yongzhong, DU Xiangtong.
Intrusion detection model based on semi-supervised learning and three-way decision
[J]. Journal of Computer Applications, 2021, 41(9): 2602-2608.
|
[2] |
HU Tianjie, HU Wenjun, WANG Shitong.
Distribution entropy penalized support vector data description
[J]. Journal of Computer Applications, 2021, 41(8): 2212-2218.
|
[3] |
WANG Yue, JIANG Yiming, LAN Julong.
Intrusion detection based on improved triplet network and K-nearest neighbor algorithm
[J]. Journal of Computer Applications, 2021, 41(7): 1996-2002.
|
[4] |
XIE Yu, JIANG Yu, LONG Chaoqi.
Extended isolation forest algorithm based on random subspace
[J]. Journal of Computer Applications, 2021, 41(6): 1679-1685.
|
[5] |
WANG Yao, SUN Guozi.
Oversampling method for intrusion detection based on clustering and instance hardness
[J]. Journal of Computer Applications, 2021, 41(6): 1709-1714.
|
[6] |
LI Yanzhi, FAN Yong, GAO Lin.
Anomaly detection of oil drilling water flow based on shape flow
[J]. Journal of Computer Applications, 2021, 41(6): 1842-1848.
|
[7] |
YAO Jie, CHENG Chunling, HAN Jing, LIU Zheng.
Anomaly detection method based on multi-task temporal convolutional network in cloud workflow
[J]. Journal of Computer Applications, 2021, 41(6): 1701-1708.
|
[8] |
ZHANG Quanlong, WANG Huaibin.
Intrusion detection model based on combination of dilated convolution and gated recurrent unit
[J]. Journal of Computer Applications, 2021, 41(5): 1372-1377.
|
[9] |
REN Xiaokui, LIU Pengfei, TAO Zhiyong, LIU Ying, BAI Lichun.
Indoor intrusion detection based on direction-of-arrival estimation algorithm for single snapshot
[J]. Journal of Computer Applications, 2021, 41(4): 1153-1159.
|
[10] |
WANG Lei.
Network intrusion detection method based on improved rough set attribute reduction and K-means clustering
[J]. Journal of Computer Applications, 2020, 40(7): 1996-2002.
|
[11] |
HU Min, BAI Xue, XU Wei, WU Bingjian.
Review of anomaly detection algorithms for multidimensional time series
[J]. Journal of Computer Applications, 2020, 40(6): 1553-1564.
|
[12] |
CHENG Xiaohui, NIU Tong, WANG Yanjun.
Wireless sensor network intrusion detection system based on sequence model
[J]. Journal of Computer Applications, 2020, 40(6): 1680-1684.
|
[13] |
HUO Weigang, WANG Huifang.
Time series anomaly detection method based on autoencoder and HMM
[J]. Journal of Computer Applications, 2020, 40(5): 1329-1334.
|
[14] |
QIU Yuan, Chang Xiangmao, QIU Qian, PENG Cheng, SU Shanting.
Stream data anomaly detection method based on long short-term memory network and sliding window
[J]. Journal of Computer Applications, 2020, 40(5): 1335-1339.
|
[15] |
OU Binli, ZHONG Xiaru, DAI Jianhua, YANG Tian.
Intrusion detection method based on variable precision covering rough set
[J]. Journal of Computer Applications, 2020, 40(12): 3465-3470.
|