[1] |
ZHANG Shuiping, WANG Lina.
Research and Analysis on Progress of Fruit Fly Optimization Algorithm
[J]. Computer Engineering and Applications, 2021, 57(6): 22-29.
|
[2] |
WANG Zhendong, ZHANG Lin, LI Dahai.
Survey of Intrusion Detection Systems for Internet of Things Based on Machine Learning
[J]. Computer Engineering and Applications, 2021, 57(4): 18-27.
|
[3] |
ZHANG Weikang, LIU Sheng, REN Chunhui.
Mixed Strategy Improved Sparrow Search Algorithm
[J]. Computer Engineering and Applications, 2021, 57(24): 74-82.
|
[4] |
LI Shouyu, HE Qing, DU Nisuo.
Piecewise Weight and Mutation Opposition-Based Learning Butterfly Optimization Algorithm
[J]. Computer Engineering and Applications, 2021, 57(22): 92-101.
|
[5] |
CAO Lei, LI Zhanbin, YANG Yongsheng, ZHAO Longfei.
Intrusion Detection Method Based on Two-Layer Attention Networks
[J]. Computer Engineering and Applications, 2021, 57(19): 142-149.
|
[6] |
GONG Junhui, HU Xiaohui, DU Yongwen.
Research on Selection of Optimal Defense Strategy Based on Evolutionary Game
[J]. Computer Engineering and Applications, 2021, 57(13): 116-123.
|
[7] |
LI Jiayue, ZHAO Bo, LI Xiang, LIU Hui, LIU Yifan, ZOU Jianwen.
Network Traffic Anomaly Prediction Method Based on Deep Learning
[J]. Computer Engineering and Applications, 2020, 56(6): 39-50.
|
[8] |
CHEN Hong, WANG Runting, XIAO Chenglong, GUO Pengfei, HUANG Jie, CHEN Honglin.
Research on Intrusion Detection Model Based on DBN-XGBDT
[J]. Computer Engineering and Applications, 2020, 56(22): 83-91.
|
[9] |
DI Chong, LI Tong.
Network Unknown Attack Detection with Deep Learning
[J]. Computer Engineering and Applications, 2020, 56(22): 109-116.
|
[10] |
WANG Pan, SONG Xuehua, WANG Changda, CHEN Feng, XU Xiaqiang, CAI Guanyu.
Intrusion Detection Method Based on Improved Deep Belief Network
[J]. Computer Engineering and Applications, 2020, 56(20): 87-92.
|
[11] |
CHEN Hong, ZHAO Jianzhi, XIAO Chenglong, CHEN Jianhu, XIAO Yue.
Research on Improved Intrusion Detection Model of ADASYN-SDA
[J]. Computer Engineering and Applications, 2020, 56(2): 97-105.
|
[12] |
WANG Longfei, DENG Liang, LIU Ping.
Improved Fruit Fly Optimization Based Hysteresis Bouc-Wen Model Identification of Piezoelectric Precision Positioning Stages
[J]. Computer Engineering and Applications, 2020, 56(2): 242-247.
|
[13] |
GAO Wenxin, LIU Sheng, XIAO Ziya, YU Jianfang.
Butterfly Optimization Algorithm Based on Cauchy Variation and Adaptive Weight
[J]. Computer Engineering and Applications, 2020, 56(15): 43-50.
|
[14] |
YANG Yanrong, SONG Rongjie, ZHOU Zhaoyong.
Network Intrusion Detection Method Based on GAN-PSO-ELM
[J]. Computer Engineering and Applications, 2020, 56(12): 66-72.
|
[15] |
WU Depeng, LIU Yi.
Intrusion Detection Model Based on Self-Organizing Map of Variable Network Structure
[J]. Computer Engineering and Applications, 2020, 56(12): 81-86.
|