[1] |
LI Li, JI Xinyuan, SONG Song.
Prediction Model for Number of Software Defects in Loop
[J]. Computer Engineering and Applications, 2021, 57(7): 158-163.
|
[2] |
LI Jingxing, YANG Youlong.
Feature Selection of Markov Blanket for High Dimensional Data
[J]. Computer Engineering and Applications, 2021, 57(6): 58-66.
|
[3] |
WANG Zhendong, ZHANG Lin, LI Dahai.
Survey of Intrusion Detection Systems for Internet of Things Based on Machine Learning
[J]. Computer Engineering and Applications, 2021, 57(4): 18-27.
|
[4] |
LIN Weixing, WANG Yujia, CHEN Wanfen, LIANG Haina.
High-Dimensional Data Feature Selection Algorithm Based on Multifactor Particle Swarm Optimization
[J]. Computer Engineering and Applications, 2021, 57(22): 199-207.
|
[5] |
LI Longzhu, LIN Yaojin, LYU Yan, LU Shun, WANG Chenxi.
Online Streaming Feature Selection Algorithm Using Neighborhood Information Interaction
[J]. Computer Engineering and Applications, 2021, 57(21): 102-108.
|
[6] |
CHEN Qianru, LI Yali, XU Kequan, LIU Yilong, WANG Shuqin.
WKNN Feature Selection Method Based on Self-Tuning Adaptive Genetic Algorithm
[J]. Computer Engineering and Applications, 2021, 57(20): 164-171.
|
[7] |
CAO Lei, LI Zhanbin, YANG Yongsheng, ZHAO Longfei.
Intrusion Detection Method Based on Two-Layer Attention Networks
[J]. Computer Engineering and Applications, 2021, 57(19): 142-149.
|
[8] |
SHEN Shaoyu, CAI Manchun, LU Tianliang, ZHAO Qi.
Intrusion Detection Algorithm based on LFKPCA-DWELM
[J]. Computer Engineering and Applications, 2021, 57(17): 130-137.
|
[9] |
WU Weijie, ZHANG Jingxiang.
Random Forest Feature Selection Algorithm Based on Categorization Information and Application
[J]. Computer Engineering and Applications, 2021, 57(17): 147-156.
|
[10] |
GONG Junhui, HU Xiaohui, DU Yongwen.
Research on Selection of Optimal Defense Strategy Based on Evolutionary Game
[J]. Computer Engineering and Applications, 2021, 57(13): 116-123.
|
[11] |
QIU Yunfei, GAO Huacong.
Hybrid Filter and Improved Adaptive GA for Feature Selection
[J]. Computer Engineering and Applications, 2021, 57(11): 95-102.
|
[12] |
HUO Lin, LU Yinli.
Improved Particle Swarm Optimization for Android Malware Detection
[J]. Computer Engineering and Applications, 2020, 56(7): 96-101.
|
[13] |
LI Jiayue, ZHAO Bo, LI Xiang, LIU Hui, LIU Yifan, ZOU Jianwen.
Network Traffic Anomaly Prediction Method Based on Deep Learning
[J]. Computer Engineering and Applications, 2020, 56(6): 39-50.
|
[14] |
LIAO Wenxiong, ZENG Bi, LIANG Tiankai, XU Yayun, ZHAO Junfeng.
Personal Credit Risk Assessment Method for High-Dimensional Data
[J]. Computer Engineering and Applications, 2020, 56(4): 219-224.
|
[15] |
PENG Ming, ZHANG Haipeng.
Unsupervised Feature Selection via Schatten-p Norm and Feature Self-Representation
[J]. Computer Engineering and Applications, 2020, 56(23): 45-52.
|