[1] |
YANG Xinmin, DONG Hongbin, TAN Chengyu, ZHOU Wen.
Dendritic Cell Model Using Singular Value Decomposition and Information Gain
[J]. Computer Engineering and Applications, 2021, 57(15): 156-162.
|
[2] |
TAN Zhenghua, DAI Liping, WEN Yang, LI Guotai.
Decision Tree Construction Method Based on Reduction Attribute and Threshold Segmentation
[J]. Computer Engineering and Applications, 2020, 56(22): 160-165.
|
[3] |
QIU Ningjia, SHEN Zhuorui, WANG Hui, WANG Peng.
Semi-supervised Learning Optimization Algorithm for Communication Spam Text Recognition
[J]. Computer Engineering and Applications, 2020, 56(17): 121-128.
|
[4] |
YE Shiren, YE Renming, ZHU Mingfeng.
Method to find spammer group for Weibo based on network relationship
[J]. Computer Engineering and Applications, 2017, 53(6): 96-100.
|
[5] |
LIU Haifeng, LIU Shousheng, SONG Aling.
Improved method of IG feature selection based on word frequency distribution
[J]. Computer Engineering and Applications, 2017, 53(4): 113-117.
|
[6] |
HAN Junbing, Halidan·Abudureyimu, Gulnur·Arken, HE Yan.
Improved information gain algorithm based on Uyghur feature selection
[J]. Computer Engineering and Applications, 2017, 53(23): 34-38.
|
[7] |
MAO Linchuan, WU Genxiu, WU Heng, HUANG Mei.
Optimal combination of factor Fisher discrimination method based on information gain
[J]. Computer Engineering and Applications, 2016, 52(19): 94-96.
|
[8] |
XIA Huosong, LUO Pan, GAO Miaomiao.
Filtering algorithm for SMS spam based on design science
[J]. Computer Engineering and Applications, 2016, 52(19): 111-116.
|
[9] |
GU Xiaoqing, WANG Hongyuan, NI Tongguang, DING Hui.
Phishing detection approach based on Na?ve Bayes and support vector machine
[J]. Computer Engineering and Applications, 2015, 51(4): 87-90.
|
[10] |
CHEN Nian1,2, TANG Zhenmin2.
Method of spam filtering online based on QBC active sampling learning algorithm
[J]. Computer Engineering and Applications, 2014, 50(22): 170-174.
|
[11] |
JIA Xian1,2, LIU Peiyu1,2, GONG Wei1,2.
Research of intrusion forensics based on improved attribute Weighted Naive Bayes
[J]. Computer Engineering and Applications, 2013, 49(7): 81-84.
|
[12] |
XUE Zhengyuan.
Improved probability-based Bayesian anti-spam mechanism
[J]. Computer Engineering and Applications, 2013, 49(7): 98-101.
|
[13] |
HU Demin, Hu Jinlong.
System design against spam message disguised with homonym
[J]. Computer Engineering and Applications, 2013, 49(2): 92-96.
|
[14] |
BAO Yi1,2, WANG Tao2, QIU Guoyong2.
Software defect prediction model based on line geometry division
[J]. Computer Engineering and Applications, 2013, 49(14): 34-38.
|
[15] |
ZHOU Jianfeng1, YANG Aimin2, LIU Jicai2.
Traffic classification approach based on improved C4.5 algorithm
[J]. Computer Engineering and Applications, 2012, 48(5): 71-74.
|