[1] |
LUO Guoyu, WANG Xueshun, DAI Jinyou.
Random Feature Graph Neural Network for Intrusion Detection in Internet of Things
[J]. Computer Engineering and Applications, 2024, 60(21): 264-273.
|
[2] |
LIN Jie, LIU Jianhua, CHEN Linying, ZHENG Zhixiong, SUN Shuihua.
Word-Pair Tagging Sentiment Triplet Extraction of Fusing Multi-Window Features
[J]. Computer Engineering and Applications, 2024, 60(16): 159-167.
|
[3] |
JIANG Yuchang, XU Yang, LI Kezi, QIN Qingkai, ZHANG Sicong.
Lightweight In-Vehicle Network Intrusion Detection Method Based on Deep Learning
[J]. Computer Engineering and Applications, 2023, 59(22): 284-292.
|
[4] |
LI Xiaojia, ZHAO Guosheng, WANG Yang, NING Ke.
Improved Internet of Things Intrusion Detection Model for CNN and RNN
[J]. Computer Engineering and Applications, 2023, 59(14): 242-250.
|
[5] |
FANG Guoqing, ZHANG Yaxian, YU Dan, MA Yao, CHEN Yongle.
Research on Cross-Protocol Industrial Control Intrusion Detection System
[J]. Computer Engineering and Applications, 2023, 59(14): 251-259.
|
[6] |
JI Meng, HE Qinglong.
AdaSVRG: Accelerating SVRG by Adaptive Learning Rate
[J]. Computer Engineering and Applications, 2022, 58(9): 83-90.
|
[7] |
ZHANG Hao, ZHANG Xiaoyu, ZHANG Zhenyou, LI Wei.
Summary of Intrusion Detection Models Based on Deep Learning
[J]. Computer Engineering and Applications, 2022, 58(6): 17-28.
|
[8] |
JIN Zifeng, BIAN Chunjiang, CHEN Shi.
Person Re-Identification Based on Multi-Scale Feature Learning and Feature Alignment
[J]. Computer Engineering and Applications, 2022, 58(20): 132-140.
|
[9] |
WU Yali, WANG Junhu, ZHENG Shuailong.
Intrusion Detection Model Based on Improved Double Deep Q-Network
[J]. Computer Engineering and Applications, 2022, 58(16): 102-110.
|
[10] |
WU Qirui, HUANG Shucheng.
Intrusion Detection Algorithm Combining Convolutional Neural Network and Three-Branch Decision
[J]. Computer Engineering and Applications, 2022, 58(13): 119-127.
|
[11] |
ZHOU Wanting, ZHAO Zhijie, LIU Yang, WANG Jiaying, HAN Xiaowei.
Research on DBN Prediction Model of E-Commerce Customer Churn
[J]. Computer Engineering and Applications, 2022, 58(11): 84-92.
|
[12] |
MA Mingyan, CHEN Wei, WU Lifa.
CNN_BiLSTM Network Based Intrusion Detection Method
[J]. Computer Engineering and Applications, 2022, 58(10): 116-124.
|
[13] |
WANG Zhendong, ZHANG Lin, LI Dahai.
Survey of Intrusion Detection Systems for Internet of Things Based on Machine Learning
[J]. Computer Engineering and Applications, 2021, 57(4): 18-27.
|
[14] |
XU Xianfeng, CAI Lulu, ZHANG Li.
Photovoltaic Power Generation Prediction Algorithm Based on MLP and DBN
[J]. Computer Engineering and Applications, 2021, 57(3): 266-272.
|
[15] |
CAO Lei, LI Zhanbin, YANG Yongsheng, ZHAO Longfei.
Intrusion Detection Method Based on Two-Layer Attention Networks
[J]. Computer Engineering and Applications, 2021, 57(19): 142-149.
|