[1] |
Tang Zhe,Lei Ying-ke.Method of individual communication transmitter identification based on maximum correntropy[J].Journal on Communications, 2016,37(12):1-5.(in Chinese)
|
[2] |
Liu Jian-feng,Yu Hong-yi,Du Jian-ping,et al.Specific emitter identification under dynamic noise based on domain adaptation[J].Journal of Signal Processing,2021,37(6):1000-1007.(in Chinese)
|
[3] |
Satija U,Trivedi N,Biswal G,et al.Specific emitter identification based on variational mode decomposition and spectral features in single hop and relaying scenarios [J].IEEE Transactions on Information Forensics and Security,2018,14(3):581-591.
|
[4] |
He Tao,Hu Jie,Xia Peng,et al.Feature selection of emg signal based on ReliefF algorithm and genetic algorithm[J].Journal of Shanghai Jiao Tong University,2016,50(2):204-208.(in Chinese)
|
[5] |
Zhang R,Nie F,Li X,et al.Self-weighted supervised discriminative feature selection [J].IEEE Transactions on Neural Networks and Learning Systems,2018,29(8):3913-3918.
|
[6] |
Janaki M, Geethalakshmi S N. A review of swarm intelligence-based feature selection methods and its application[J].Soft Computing for Security Applications,2013,1428:435-447.
|
[7] |
Jun C A,Andri M,Habibollah H,et al.Supervised,unsupervised,and semi-supervised feature selection:A review on gene selection [J].IEEE/ACM Transactions on Computational Biology and Bioinformatics,2016,13(5):971-989.
|
[8] |
Zhou Jie-ying,He Peng-fei,Qiu Rong-fa,et al.Research on intrusion detection based on random forest and gradient boost- ing tree[J].Journal of Software,2021,32(10):3254-3265.(in Chinese)
|
[9] |
Feng J,Liang J,Qiang Z,et al.Effective techniques for intelligent cardiotocography interpretation using XGB-RF feature selection and stacking fusion[C]∥Proc of International Conference on Bioinformatics and Biomedicine,2021:2667-2673.
|
[10] |
Qiao Nan,Li Zhen-xing,Zhao Guo-sheng.Intrusion detection model of Internet of Things based on XGBoost-RF[J].Journal of Chinese Computer Systems,2022,43(1):152-158.(in Chinese)
|
[11] |
Qi J,Liang H,Chen J,et al.A hybrid hierarchical model for accessing physical activity recognition towards free-living environments[C]∥Proc of International Conference on Parallel and Distributed Processing with Applications,2020:1342-1347.
|
[12] |
Song J,Li B,Wu Y,et al.ReAL:A new ResNet-ALSTM based intrusion detection system for the Internet of energy[C]∥Proc of Conference on Local Computer Networks,2020:491-496.
|
[13] |
Li Zhan-shan,Yao Xin,Liu Zhao-geng,et al.Feature selection algorithm based on LightGBM[J].Journal of Northeastern University (Natural Science),2021,42(12):1688-1695.(in Chinese)
|
[14] |
Luo Y,Xu Q,Li W,et al.A multi-step decision prediction model based on LightGBM[C]∥Proc of International Conference on Big Data,2021:5714-5718.
|
[15] |
Ke G,Meng Q,Finley T,et al.LightGBM:A highly efficient gradient boosting decision tree[C]∥Proc of Conference on Neural Information Processing Systems,2017:569-577.
|
[16] |
Li Z,Rios A L G,Trajkovic L.Classifying denial of service attacks using fast machine learning algorithms[C]∥Proc of Conference on Systems,Man,and Cybernetics,2021:1221-1226.
|
[17] |
Qian Y, Zheng J, Zhang Z, et al.CMIVGSD:circRNA- miRNA interaction prediction based on variational graph auto-encoder and singular value decomposition[C]∥Proc of International Conference on Bioinformatics and Biomedicine,2021:205-210.
|
[18] |
Yuan J,Rao Z,Lin H,et al.Classification of Chinese dialect regions from L2 English speech[C]∥Proc of International Conference on Acoustics,Speech and Signal Processing,2019:8117-8121.
|
[19] |
Shen S, Qian Y, Zheng J, et al. Accurately predicting circRNA-disease associations using variational graph auto-encoders and LightGBM[C]∥Proc of International Confe- rence on Bioinformatics and Biomedicine,2021:522-527.
|
[20] |
Mcnamara Q,Vega A D L,Yarkoni T.Developing a comprehensive framework for multimodal feature extraction[C]∥Proc of International Conference on Knowledge Discovery and Data Mining,2017:1567-1574.
|
[21] |
Zhang Min,Luo Zheng-hua,Huang Jian-gang,et al.A fingerprint extraction method based on I/Q imbalance[J].Acta Electronica Sinica,2020,48(4):717-722.(in Chinese)
|
[22] |
Cao Jian-jun,Zhang Pei-lin,Zhang Ying-tang,et al.Feature extraction of an engine cylinder head vibration signal based on lifting wavelet package transformation [J].Journal of Vibration and Shook,2008,27(2):34-37.(in Chinese)
|
[23] |
Cao Jian-jun,Zhang Pei-lin,Ren Guo-quan,et al.Vibration signal feature selection based on ant colony optimization[J].Journal of Vibration and Shock,2008,27(5):24-31.(in Chinese)
|
[24] |
Ramesg J,Manavalan R.Prostate image segmentation using ant colony optimization-boundary complete recurrent neural network(ACO-BCRNN)[C]∥Proc of Conference on Computer Networks,Big Data and LoT,2021:351-368.
|
[25] |
Huang Xuan.Research and development of feature dimensionality reduction[J].Computer Science,2018,45(6):16-21.(in Chinese)
|
[26] |
An Ze-liang, Zhang Tian-qi,Ma Bao-ze,et al.Cooperative modulation recognition based on one-dimensional convolutional neural network for MIMO-OSTBC signal[J].Journal on Communications,2021,42(7):84-94.(in Chinese)
|
[27] |
Chen Zhuo,Lü Na.Network intrusion detection model based on random forest and XGBoost[J].Journal of Signal Processing,2020,36(7):1055-1064.(in Chinese)
|
|
附中文参考文献:
|
[1] |
唐哲,雷迎科.基于最大相关熵的通信辐射源个体识别[J].通信学报,2016,37(12):1-5.
|
[2] |
刘剑锋,于宏毅,杜剑平,等.基于领域自适应的动态噪声辐射源个体识别[J].信号处理,2021,37(6):1000-1007.
|
[4] |
何涛,胡洁,夏鹏,等.基于ReliefF算法与遗传算法的肌电信号特征选择[J].上海交通大学学报,2016,50(2):204-208.
|
[8] |
周杰英,贺鹏飞,邱荣发,等.融合随机森林和梯度提升树的入侵检测研究[J].软件学报,2021,32(10):3254-3265.
|
[10] |
乔楠,李振兴,赵国生.XGBoost-RF的物联网入侵检测模型[J].小型微型计算机系统,2022,43(1):152-158.
|
[13] |
李占山,姚鑫,刘兆赓,等.基于LightGBM的特征选择算法[J].东北大学学报(自然科学版),2021,42(12):1688-1695.
|
[21] |
张敏,罗正华,黄建刚,等.一种基于I/Q失配的辐射源指纹提取方法[J].电子学报,2020,48(4):717-722.
|
[22] |
曹建军,张培林,张英堂,等.基于提升小波包变换的发动机缸盖振动信号特征提取[J].振动与冲击,2008,27(2):34-37.
|
[23] |
曹建军,张培林,任国全,等.基于蚁群优化的振动信号特征选择[J].振动与信号,2008,27(5):24-31.
|
[25] |
黄铉.特征降维技术的研究与进展[J].计算机科学,2018,45(6):16-21.
|
[26] |
安泽亮,张天骐,马宝泽,等.基于一维CNN的多入多出OSTBC信号协作调制识别[J].通信学报,2021,42(7):84-94.
|
[27] |
陈卓,吕娜.基于随机森林和XGBoost的网络入侵检测模型[J].信号处理,2020,36(7):1055-1064.
|