[1] |
SHEN Xulin, LI Chaobo, LI Hongjun.
Overview on Video Abnormal Behavior Detection of GAN via Human Density
[J]. Computer Engineering and Applications, 2022, 58(7): 21-30.
|
[2] |
ZHANG Hao, ZHANG Xiaoyu, ZHANG Zhenyou, LI Wei.
Summary of Intrusion Detection Models Based on Deep Learning
[J]. Computer Engineering and Applications, 2022, 58(6): 17-28.
|
[3] |
ZHUANG Yuesheng, LIN Shanling, LIN Zhixian, ZHANG Yongai, GUO Tailiang.
Study on Generative Adversarial Network for Data Anomaly Detection
[J]. Computer Engineering and Applications, 2022, 58(4): 143-149.
|
[4] |
CHEN Chen, HU Yan.
Video Anomaly Detection Combining Memory-Augmented
[J]. Computer Engineering and Applications, 2022, 58(15): 253-259.
|
[5] |
WU Qirui, HUANG Shucheng.
Intrusion Detection Algorithm Combining Convolutional Neural Network and Three-Branch Decision
[J]. Computer Engineering and Applications, 2022, 58(13): 119-127.
|
[6] |
WANG Haotian, ZHENG Dongyi, LIU Fang, XIAO Nong.
Personalized Federated Anomaly Detection Method for Multivariate Time Series Data
[J]. Computer Engineering and Applications, 2022, 58(11): 60-65.
|
[7] |
MA Mingyan, CHEN Wei, WU Lifa.
CNN_BiLSTM Network Based Intrusion Detection Method
[J]. Computer Engineering and Applications, 2022, 58(10): 116-124.
|
[8] |
QIAO Hui, ZHOU Shuisheng.
Nolinear Angle 2DPCA and Its Application on Face Recognition
[J]. Computer Engineering and Applications, 2021, 57(8): 112-118.
|
[9] |
WANG Zhendong, ZHANG Lin, LI Dahai.
Survey of Intrusion Detection Systems for Internet of Things Based on Machine Learning
[J]. Computer Engineering and Applications, 2021, 57(4): 18-27.
|
[10] |
YU Duo, HUANG Yongdong.
Hyperspectral Image Classification Based on SPCA and Domain Transform Recursive Filtering
[J]. Computer Engineering and Applications, 2021, 57(4): 199-208.
|
[11] |
CAO Lei, LI Zhanbin, YANG Yongsheng, ZHAO Longfei.
Intrusion Detection Method Based on Two-Layer Attention Networks
[J]. Computer Engineering and Applications, 2021, 57(19): 142-149.
|
[12] |
SHEN Shaoyu, CAI Manchun, LU Tianliang, ZHAO Qi.
Intrusion Detection Algorithm based on LFKPCA-DWELM
[J]. Computer Engineering and Applications, 2021, 57(17): 130-137.
|
[13] |
GONG Junhui, HU Xiaohui, DU Yongwen.
Research on Selection of Optimal Defense Strategy Based on Evolutionary Game
[J]. Computer Engineering and Applications, 2021, 57(13): 116-123.
|
[14] |
ZHANG Bowen, LIU Zhi, SANG Guoming.
Anomaly Detection Algorithm Based on Kernel Density Fluctuation
[J]. Computer Engineering and Applications, 2021, 57(12): 132-136.
|
[15] |
ZHANG Dongmei, Mairidan Wushouer, Gulanbaier Tuerhong.
One-Class Classification Method for High-Dimensional Mixed and Unbalanced Credit Score Data
[J]. Computer Engineering and Applications, 2021, 57(10): 233-240.
|