[1] |
SHENG Jianhui, FAN Yinting, XIA Minjie.
Physical Layer Security Performance Analysis for Wireless Sensor Network
[J]. Computer Engineering and Applications, 2021, 57(8): 91-95.
|
[2] |
WANG Zhendong, ZHANG Lin, LI Dahai.
Survey of Intrusion Detection Systems for Internet of Things Based on Machine Learning
[J]. Computer Engineering and Applications, 2021, 57(4): 18-27.
|
[3] |
CAO Lei, LI Zhanbin, YANG Yongsheng, ZHAO Longfei.
Intrusion Detection Method Based on Two-Layer Attention Networks
[J]. Computer Engineering and Applications, 2021, 57(19): 142-149.
|
[4] |
SHEN Shaoyu, CAI Manchun, LU Tianliang, ZHAO Qi.
Intrusion Detection Algorithm based on LFKPCA-DWELM
[J]. Computer Engineering and Applications, 2021, 57(17): 130-137.
|
[5] |
YANG Xinmin, DONG Hongbin, TAN Chengyu, ZHOU Wen.
Dendritic Cell Model Using Singular Value Decomposition and Information Gain
[J]. Computer Engineering and Applications, 2021, 57(15): 156-162.
|
[6] |
GONG Junhui, HU Xiaohui, DU Yongwen.
Research on Selection of Optimal Defense Strategy Based on Evolutionary Game
[J]. Computer Engineering and Applications, 2021, 57(13): 116-123.
|
[7] |
SUN Zeyu, DONG Hanlei, SU Yanchao, XU Chen, NIE Yalin, LI Chuanfeng.
MDR:Multi-parameter Data Reconstruction Method Based on Energy Efficient in Sensor Networks
[J]. Computer Engineering and Applications, 2021, 57(11): 103-110.
|
[8] |
PAN Chengsheng, ZHANG Bin, LYU Yana, DU Xiuli, QIU Shaoming.
K-Means Text Clustering Based on Improved Gray Wolf Optimization Algorithm
[J]. Computer Engineering and Applications, 2021, 57(1): 188-193.
|
[9] |
LI Jiayue, ZHAO Bo, LI Xiang, LIU Hui, LIU Yifan, ZOU Jianwen.
Network Traffic Anomaly Prediction Method Based on Deep Learning
[J]. Computer Engineering and Applications, 2020, 56(6): 39-50.
|
[10] |
GONG Bencan, ZHOU Feng, CHEN Peng, REN Dong.
Routing Protocol Based on Path Quality in Wireless Sensor Networks
[J]. Computer Engineering and Applications, 2020, 56(6): 99-104.
|
[11] |
CHEN Hong, WANG Runting, XIAO Chenglong, GUO Pengfei, HUANG Jie, CHEN Honglin.
Research on Intrusion Detection Model Based on DBN-XGBDT
[J]. Computer Engineering and Applications, 2020, 56(22): 83-91.
|
[12] |
DI Chong, LI Tong.
Network Unknown Attack Detection with Deep Learning
[J]. Computer Engineering and Applications, 2020, 56(22): 109-116.
|
[13] |
CAO Lin, WANG Zhiteng, CHEN Liang, LI Hongshun, GAO Shen, ZHANG Zili.
Neural Network Ensemble Based on Improved Quantum Immune Algorithm
[J]. Computer Engineering and Applications, 2020, 56(22): 142-147.
|
[14] |
CHU Pengzi, YU Yi, LIN Hui, YUAN Jianjun, JIANG Xi.
BP-FIPID Algorithm for Speed Control of ATO System
[J]. Computer Engineering and Applications, 2020, 56(22): 224-229.
|
[15] |
ZHOU Fei, LUO Xiaoyong, LIU Yunping.
Real-Time Correction of IMM Target Tracking Algorithm Based on Probability Model
[J]. Computer Engineering and Applications, 2020, 56(21): 85-92.
|