[1] |
LI Xiongwei1, WEI Yanhai1, WANG Xiaohan1, XU Lu2, SUN Ping3.
Improved Incremental SVDD Learning Algorithm for Hardware Trojan Detection
[J]. Computer Engineering and Applications, 2019, 55(9): 43-48.
|
[2] |
WU Jingfeng, JIN Weidong, TANG Peng.
Catenary Pillar Image Anomaly Detection Combined with SVDD and CNN
[J]. Computer Engineering and Applications, 2019, 55(10): 193-198.
|
[3] |
YI Yang, ZHOU Shaoguang, ZHAO Pengfei, HU Yiqun.
Classification method of remote sensing image based on positive and unlabeled data
[J]. Computer Engineering and Applications, 2018, 54(4): 160-166.
|
[4] |
HAN Guijin.
Human pose estimation based on improved CNN and weighted SVDD algorithm
[J]. Computer Engineering and Applications, 2018, 54(24): 198-203.
|
[5] |
KONG Xiangxin, ZHOU Wei, WANG Xiaodan, YU Mingqiu.
Removing algorithm for incremental SVDD learning
[J]. Computer Engineering and Applications, 2018, 54(18): 174-179.
|
[6] |
KONG Xiangxin, ZHOU Wei, WANG Xiaodan.
Parameter optimization for SVDD based on improved krill herd algorithm
[J]. Computer Engineering and Applications, 2017, 53(22): 137-142.
|
[7] |
HAN Guijin.
Research and appllication of weighted SVDD algorithm on human pose estimation
[J]. Computer Engineering and Applications, 2017, 53(15): 132-136.
|
[8] |
LU Ming, LIU Lihui, WU Lianghong.
Research on multi-kernel support vector data description method of classification
[J]. Computer Engineering and Applications, 2016, 52(18): 68-73.
|
[9] |
YANG Lei, BI Hongjun.
Database security audit system based on bypass monitoring
[J]. Computer Engineering and Applications, 2015, 51(8): 138-142.
|
[10] |
CAO Weiwei1, YIN Chuanhuan1, MU Shaomin2.
Alarm fusion method based on support vector data description
[J]. Computer Engineering and Applications, 2015, 51(19): 125-128.
|
[11] |
YE Chunxiao1, XIA Wei1,SHEN Li2.
RBAC delegation model with security audit function
[J]. Computer Engineering and Applications, 2015, 51(15): 86-91.
|
[12] |
GAO Zhihua, BEN Kerong.
Noise source identification based on active learning and self-learning
[J]. Computer Engineering and Applications, 2015, 51(1): 115-118.
|
[13] |
WEN Chuanjun1, KE Jia2.
General maximal-interval hypersphere SVM
[J]. Computer Engineering and Applications, 2012, 48(29): 177-180.
|
[14] |
SHEN Juhong, HUANG Yongdong, KONG Nina.
Fuzzy support vector data description based on vague sets
[J]. Computer Engineering and Applications, 2012, 48(29): 196-200.
|
[15] |
WANG Wei1,LI Qiang2.
Hybrid intelligent model of project risk prediction and its application
[J]. Computer Engineering and Applications, 2010, 46(5): 189-192.
|