[1] |
GAO Bing, GU Zhaojun, ZHOU Jingxian, SUI He.
Hybrid Sampling Method for Overlap Region of ICS Imbalanced Data
[J]. Computer Engineering and Applications, 2023, 59(19): 305-315.
|
[2] |
SHEN Xulin, LI Chaobo, LI Hongjun.
Overview on Video Abnormal Behavior Detection of GAN via Human Density
[J]. Computer Engineering and Applications, 2022, 58(7): 21-30.
|
[3] |
ZHUANG Yuesheng, LIN Shanling, LIN Zhixian, ZHANG Yongai, GUO Tailiang.
Study on Generative Adversarial Network for Data Anomaly Detection
[J]. Computer Engineering and Applications, 2022, 58(4): 143-149.
|
[4] |
LIU Hualing, LIU Yaxin, XU Junyi, CHEN Shanghui, QIAO Liang.
Research Progress in Application of Graph Anomaly Detection in Financial Anti-Fraud
[J]. Computer Engineering and Applications, 2022, 58(22): 41-53.
|
[5] |
ZHANG Yiyang, QIAN Yurong, TAO Wenbin, LENG Hongyong, LI Zichen, MA Mengnan.
Survey of Attribute Graph Anomaly Detection Based on Deep Learning
[J]. Computer Engineering and Applications, 2022, 58(19): 1-13.
|
[6] |
CHEN Chen, HU Yan.
Video Anomaly Detection Combining Memory-Augmented
[J]. Computer Engineering and Applications, 2022, 58(15): 253-259.
|
[7] |
WANG Haotian, ZHENG Dongyi, LIU Fang, XIAO Nong.
Personalized Federated Anomaly Detection Method for Multivariate Time Series Data
[J]. Computer Engineering and Applications, 2022, 58(11): 60-65.
|
[8] |
ZHANG Bowen, LIU Zhi, SANG Guoming.
Anomaly Detection Algorithm Based on Kernel Density Fluctuation
[J]. Computer Engineering and Applications, 2021, 57(12): 132-136.
|
[9] |
LI Bo.
Improved Deep Transfer Learning Algorithm for Person Re-identification
[J]. Computer Engineering and Applications, 2021, 57(10): 110-116.
|
[10] |
WU Chutian, CHEN Yongle, CHEN Junjie.
Cross-Protocol Anomaly Detection Algorithm Based on HMM
[J]. Computer Engineering and Applications, 2020, 56(8): 81-86.
|
[11] |
LI Jiayue, ZHAO Bo, LI Xiang, LIU Hui, LIU Yifan, ZOU Jianwen.
Network Traffic Anomaly Prediction Method Based on Deep Learning
[J]. Computer Engineering and Applications, 2020, 56(6): 39-50.
|
[12] |
HE Huanye, LIN Guoyuan, GU Hao, FANG Menghua.
Improved LOF Algorithm in Cloud Virtual Machine Anomaly Detection Scenario
[J]. Computer Engineering and Applications, 2020, 56(23): 80-86.
|
[13] |
ZHAN Peng, CHEN Lin, CAO Luhui, XU Haoran, LI Xueqing.
Time Series Anomaly Detection Based on Kernel Turning Points Clipped Representation
[J]. Computer Engineering and Applications, 2020, 56(23): 130-138.
|
[14] |
GUO Chen, LI Xinwei, YANG Yi, XU Lianghao.
Video Fingerprinting Algorithm Based on Non-local 3D Residual Network
[J]. Computer Engineering and Applications, 2020, 56(19): 216-223.
|
[15] |
LIU Wenfen, MU Xiaodong, HUANG Yuehua.
Anomaly Detection Method Based on Multi-resolution Grid
[J]. Computer Engineering and Applications, 2020, 56(17): 78-85.
|