[1] |
Jiepo FANG, Chongben TAO.
Hybrid internet of vehicles intrusion detection system for zero-day attacks
[J]. Journal of Computer Applications, 2024, 44(9): 2763-2769.
|
[2] |
Lei WANG, Shijuan CHENG, Yu HAN.
Reliability evaluation of multi-component system based on time-varying Copula function
[J]. Journal of Computer Applications, 2024, 44(3): 953-959.
|
[3] |
Sirui WANG, Shijuan CHENG, Feimeng YUAN.
Reliability evaluation method of high-reliability products based on improved evidence fusion
[J]. Journal of Computer Applications, 2023, 43(7): 2140-2146.
|
[4] |
Shaochen HAO, Zizuan WEI, Yao MA, Dan YU, Yongle CHEN.
Network intrusion detection model based on efficient federated learning algorithm
[J]. Journal of Computer Applications, 2023, 43(4): 1169-1175.
|
[5] |
Kai FENG, Jiande LI, Zhangjian JI.
Approximate evaluation method of k-ary (n-1)-cube subnetwork reliability
[J]. Journal of Computer Applications, 2023, 43(12): 3875-3881.
|
[6] |
LIU Yongmin, YANG Yujin, LUO Haoyi, HUANG Hao, XIE Tieqiang.
Intrusion detection method for wireless sensor network based on bidirectional circulation generative adversarial network
[J]. Journal of Computer Applications, 2023, 43(1): 160-168.
|
[7] |
Ning DONG, Xiaorong CHENG, Mingquan ZHANG.
Intrusion detection system with dynamic weight loss function based on internet of things platform
[J]. Journal of Computer Applications, 2022, 42(7): 2118-2124.
|
[8] |
Bing GAO, Ya ZHENG, Jing QIN, Qijie ZOU, Zumin WANG.
Network intrusion detection algorithm based on sparrow search algorithm and improved particle swarm optimization algorithm
[J]. Journal of Computer Applications, 2022, 42(4): 1201-1206.
|
[9] |
Jialiang DUAN, Guoming CAI, Kaiyong XU.
Memory combined feature classification method based on multiple BP neural networks
[J]. Journal of Computer Applications, 2022, 42(1): 178-182.
|
[10] |
ZHANG Shipeng, LI Yongzhong, DU Xiangtong.
Intrusion detection model based on semi-supervised learning and three-way decision
[J]. Journal of Computer Applications, 2021, 41(9): 2602-2608.
|
[11] |
WANG Yue, JIANG Yiming, LAN Julong.
Intrusion detection based on improved triplet network and K-nearest neighbor algorithm
[J]. Journal of Computer Applications, 2021, 41(7): 1996-2002.
|
[12] |
WANG Yao, SUN Guozi.
Oversampling method for intrusion detection based on clustering and instance hardness
[J]. Journal of Computer Applications, 2021, 41(6): 1709-1714.
|
[13] |
ZHANG Quanlong, WANG Huaibin.
Intrusion detection model based on combination of dilated convolution and gated recurrent unit
[J]. Journal of Computer Applications, 2021, 41(5): 1372-1377.
|
[14] |
REN Xiaokui, LIU Pengfei, TAO Zhiyong, LIU Ying, BAI Lichun.
Indoor intrusion detection based on direction-of-arrival estimation algorithm for single snapshot
[J]. Journal of Computer Applications, 2021, 41(4): 1153-1159.
|
[15] |
CHENG Xiaohui, NIU Tong, WANG Yanjun.
Wireless sensor network intrusion detection system based on sequence model
[J]. Journal of Computer Applications, 2020, 40(6): 1680-1684.
|