[1] |
ZHANG Bowen, LIU Zhi, SANG Guoming.
Anomaly Detection Algorithm Based on Kernel Density Fluctuation
[J]. Computer Engineering and Applications, 2021, 57(12): 132-136.
|
[2] |
WU Chutian, CHEN Yongle, CHEN Junjie.
Cross-Protocol Anomaly Detection Algorithm Based on HMM
[J]. Computer Engineering and Applications, 2020, 56(8): 81-86.
|
[3] |
LI Jiayue, ZHAO Bo, LI Xiang, LIU Hui, LIU Yifan, ZOU Jianwen.
Network Traffic Anomaly Prediction Method Based on Deep Learning
[J]. Computer Engineering and Applications, 2020, 56(6): 39-50.
|
[4] |
HE Huanye, LIN Guoyuan, GU Hao, FANG Menghua.
Improved LOF Algorithm in Cloud Virtual Machine Anomaly Detection Scenario
[J]. Computer Engineering and Applications, 2020, 56(23): 80-86.
|
[5] |
ZHAN Peng, CHEN Lin, CAO Luhui, XU Haoran, LI Xueqing.
Time Series Anomaly Detection Based on Kernel Turning Points Clipped Representation
[J]. Computer Engineering and Applications, 2020, 56(23): 130-138.
|
[6] |
XU Jiazhen, LI Ting, YANG Wei.
Person Re-Identification by Multi-Scale Local Feature Selection
[J]. Computer Engineering and Applications, 2020, 56(2): 141-145.
|
[7] |
LIU Wenfen, MU Xiaodong, HUANG Yuehua.
Anomaly Detection Method Based on Multi-resolution Grid
[J]. Computer Engineering and Applications, 2020, 56(17): 78-85.
|
[8] |
ZHANG Changhua, ZHOU Xiongtu, ZHANG Yong’ai, YAO Jianmin, GUO Tailiang, YAN Qun.
Application Research of Deep Auto Encoder in Data Anomaly Detection
[J]. Computer Engineering and Applications, 2020, 56(17): 93-99.
|
[9] |
YANG Yao, FU Kechang, JIANG Tao, ZHANG Guoliang, LIU Jiajia, MENG Yi.
AGV Path Planned with Heuristic RRT
[J]. Computer Engineering and Applications, 2020, 56(12): 125-133.
|
[10] |
XIONG Yi, LIANG Yiwen, TAN Chengyu, ZHOU Wen.
Anomaly Detection Method of Earthquake Precursor Observation Data Based on Negative Selection Algorithm
[J]. Computer Engineering and Applications, 2020, 56(10): 226-230.
|
[11] |
CUI Fangyi1, JING Xiaoyuan2, DONG Xiwei2,3, WU Fei2, SUN Ying2.
Fuzzy Clustering Based on Adaptive Bat Algorithm Optimization and Its Application
[J]. Computer Engineering and Applications, 2019, 55(7): 16-22.
|
[12] |
YANG Feiyue, TAO Yang.
Node Anomaly Detection Algorithm Based on Spatial-Temporal Cooperation in WSNs
[J]. Computer Engineering and Applications, 2019, 55(7): 127-131.
|
[13] |
WANG Kai, CHEN Danwei.
Research on Algorithm of Dynamic Graph Anomaly Detection Based on LSTM
[J]. Computer Engineering and Applications, 2019, 55(5): 76-82.
|
[14] |
HE Liang1, WANG Yongcheng1, LI Yun1, CHU Yanjie1, SHEN Chao2.
Network Anomaly Detection Algorithm Based on Lindeberg-Feller Central Limit Theorem
[J]. Computer Engineering and Applications, 2019, 55(4): 41-47.
|
[15] |
WU Jingfeng, JIN Weidong, TANG Peng.
Catenary Pillar Image Anomaly Detection Combined with SVDD and CNN
[J]. Computer Engineering and Applications, 2019, 55(10): 193-198.
|