[1] |
WANG Zhendong, ZHANG Lin, LI Dahai.
Survey of Intrusion Detection Systems for Internet of Things Based on Machine Learning
[J]. Computer Engineering and Applications, 2021, 57(4): 18-27.
|
[2] |
WANG Junling, LU Xinming.
Video Key Frame Extraction Algorithm Based on Semantic Correlation
[J]. Computer Engineering and Applications, 2021, 57(4): 192-198.
|
[3] |
WANG Fuyin, ZHANG Desheng, ZHANG Xiao.
Adaptive Density Peaks Clustering Algorithm Combining with Whale Optimization Algorithm
[J]. Computer Engineering and Applications, 2021, 57(3): 94-102.
|
[4] |
ZHANG Ziran, HUANG Weihua, CHEN Yang, ZHANG Zheng, LI Ziyuan.
Improved Ant Colony Path Planning Algorithm Based on Bidirectional Search
[J]. Computer Engineering and Applications, 2021, 57(21): 270-277.
|
[5] |
DING Songyang, TIAN Qingyun.
Density Peak Clustering Algorithm Based on Ball-Tree
[J]. Computer Engineering and Applications, 2021, 57(20): 90-96.
|
[6] |
CAO Lei, LI Zhanbin, YANG Yongsheng, ZHAO Longfei.
Intrusion Detection Method Based on Two-Layer Attention Networks
[J]. Computer Engineering and Applications, 2021, 57(19): 142-149.
|
[7] |
WENG Yushang, XIAO Jinqiu, XIA Yu.
Strip Surface Defect Detection Based on Improved Mask R-CNN Algorithm
[J]. Computer Engineering and Applications, 2021, 57(19): 235-242.
|
[8] |
SHEN Shaoyu, CAI Manchun, LU Tianliang, ZHAO Qi.
Intrusion Detection Algorithm based on LFKPCA-DWELM
[J]. Computer Engineering and Applications, 2021, 57(17): 130-137.
|
[9] |
BAI Lu, ZHAO Xin, KONG Yuting, ZHANG Zhenghang, SHAO Jinxin, QIAN Yurong.
Survey of Spectral Clustering Algorithms
[J]. Computer Engineering and Applications, 2021, 57(14): 15-26.
|
[10] |
XIANG Yixuan, JIANG He, PAN Pinchen, SUN Conghui.
Study on [K]-means Clustering Algorithm of Quadratic Power Coupling
[J]. Computer Engineering and Applications, 2021, 57(14): 95-102.
|
[11] |
GONG Junhui, HU Xiaohui, DU Yongwen.
Research on Selection of Optimal Defense Strategy Based on Evolutionary Game
[J]. Computer Engineering and Applications, 2021, 57(13): 116-123.
|
[12] |
LI Jiayue, ZHAO Bo, LI Xiang, LIU Hui, LIU Yifan, ZOU Jianwen.
Network Traffic Anomaly Prediction Method Based on Deep Learning
[J]. Computer Engineering and Applications, 2020, 56(6): 39-50.
|
[13] |
CHEN Hong, WANG Runting, XIAO Chenglong, GUO Pengfei, HUANG Jie, CHEN Honglin.
Research on Intrusion Detection Model Based on DBN-XGBDT
[J]. Computer Engineering and Applications, 2020, 56(22): 83-91.
|
[14] |
DI Chong, LI Tong.
Network Unknown Attack Detection with Deep Learning
[J]. Computer Engineering and Applications, 2020, 56(22): 109-116.
|
[15] |
YUE Xiaoxin, JIA Junxia, CHEN Xidong, LI Guang’an.
Road Small Target Detection Algorithm Based on Improved YOLO V3
[J]. Computer Engineering and Applications, 2020, 56(21): 218-223.
|