[1] |
Jiepo FANG, Chongben TAO.
Hybrid internet of vehicles intrusion detection system for zero-day attacks
[J]. Journal of Computer Applications, 2024, 44(9): 2763-2769.
|
[2] |
Rui XU, Shuang LIANG, Hang WAN, Yimin WEN, Shiming SHEN, Jian LI.
Extraction of PM2.5 diffusion characteristics based on candlestick pattern matching
[J]. Journal of Computer Applications, 2023, 43(5): 1394-1400.
|
[3] |
Shaochen HAO, Zizuan WEI, Yao MA, Dan YU, Yongle CHEN.
Network intrusion detection model based on efficient federated learning algorithm
[J]. Journal of Computer Applications, 2023, 43(4): 1169-1175.
|
[4] |
Yingjie MA, Jing XIAO, Geng ZHAO, Ping ZENG, Yatao YANG.
Controllable grid multi-scroll chaotic system family and its hardware circuit implementation
[J]. Journal of Computer Applications, 2023, 43(3): 956-961.
|
[5] |
Binwei SONG, Yao WANG.
Low-cost pay-per-use licensing scheme for FPGA intellectual property protection
[J]. Journal of Computer Applications, 2023, 43(10): 3142-3148.
|
[6] |
LIU Yongmin, YANG Yujin, LUO Haoyi, HUANG Hao, XIE Tieqiang.
Intrusion detection method for wireless sensor network based on bidirectional circulation generative adversarial network
[J]. Journal of Computer Applications, 2023, 43(1): 160-168.
|
[7] |
Ning DONG, Xiaorong CHENG, Mingquan ZHANG.
Intrusion detection system with dynamic weight loss function based on internet of things platform
[J]. Journal of Computer Applications, 2022, 42(7): 2118-2124.
|
[8] |
Bing GAO, Ya ZHENG, Jing QIN, Qijie ZOU, Zumin WANG.
Network intrusion detection algorithm based on sparrow search algorithm and improved particle swarm optimization algorithm
[J]. Journal of Computer Applications, 2022, 42(4): 1201-1206.
|
[9] |
ZHANG Shipeng, LI Yongzhong, DU Xiangtong.
Intrusion detection model based on semi-supervised learning and three-way decision
[J]. Journal of Computer Applications, 2021, 41(9): 2602-2608.
|
[10] |
HUANG Chengcheng, DONG Xiaoxiao, LI Zhao.
Deep pipeline 5×5 convolution method based on two-dimensional Winograd algorithm
[J]. Journal of Computer Applications, 2021, 41(8): 2258-2264.
|
[11] |
WANG Yue, JIANG Yiming, LAN Julong.
Intrusion detection based on improved triplet network and K-nearest neighbor algorithm
[J]. Journal of Computer Applications, 2021, 41(7): 1996-2002.
|
[12] |
WANG Yao, SUN Guozi.
Oversampling method for intrusion detection based on clustering and instance hardness
[J]. Journal of Computer Applications, 2021, 41(6): 1709-1714.
|
[13] |
ZHANG Quanlong, WANG Huaibin.
Intrusion detection model based on combination of dilated convolution and gated recurrent unit
[J]. Journal of Computer Applications, 2021, 41(5): 1372-1377.
|
[14] |
REN Xiaokui, LIU Pengfei, TAO Zhiyong, LIU Ying, BAI Lichun.
Indoor intrusion detection based on direction-of-arrival estimation algorithm for single snapshot
[J]. Journal of Computer Applications, 2021, 41(4): 1153-1159.
|
[15] |
WANG Xiaofeng, JIANG Penglong, ZHOU Hui, ZHAO Xiongbo.
Design of FPGA accelerator with high parallelism for convolution neural network
[J]. Journal of Computer Applications, 2021, 41(3): 812-819.
|