[1] |
Li Chun-sheng,Yu Shu,Liu Xiao-gang.Research on outlier detection algorithm based on improved distance[J].Computer Technology and Development,2019,29(3):97-100.(in Chinese)
|
[2] |
You Cheng-cheng,Feng Xu-peng,Liu Li-jun, et al. An abnormal chest X-ray diagnostic report detection method based on topic model[J].Computer Engineering & Science,2020,42(4):741-748.(in Chinese)
|
[3] |
He Wang, Lin Guo-yuan. Analysis of cloud server fault data based on improved FP-Growth algorithm[J].Computer Engineering & Science,2020,42(5):770-775.(in Chinese)
|
[4] |
Fu Zi-xi,Xu Yang,Wu Zhao-di, et al.SVM-KNN network intrusion detection method based on incremental learning[J].Computer Engineering,2020,46(4):115-122.(in Chinese)
|
[5] |
Wang L, Lu P, Wang S R,et al.Advanced backtracking search optimization algorithm for a new joint replenishment problem under trade credit with grouping constraint[J].Applied Soft Computing,2020,86:105953.
|
[6] |
Peng L, Zhu Q, Lü S X, et al.Effective long short-term memory with fruit fly optimization algorithm for time series forecasting[J].Soft Computing,2020,24(19):15059-15079.
|
[7] |
Cao F Y, Wu X L, Yu L Q, et al.An outlier detection algorithm for categorical matrix-object data[J].Applied Soft Computing,2021,104:107182.
|
[8] |
Jiang X, Xiong Z Y, Dai Q Z, et al.A local-gravitation-based method for the detection of outliers and boundary points[J].Knowledge-Based Systems,2020,192:105331.
|
[9] |
Mahboobeh R M, Ahmad A A, Bahak N, et al. A new density-based subspace selection method using mutual information for high dimensional outlier detection[J].Knowledge-Based Systems,2021,216:106733.
|
[10] |
Yang J W, Rahardja S, Frnti P. Mean-shift outlier detection and filtering[J].Pattern Recognition,2021,115:107874.
|
[11] |
Farag A,Abdelkader H,Salem R.Parallel graph-based anomaly detection technique for sequential data[J].Journal of King Saud University-Computer and Information Sciences,2022,34(1):1446-1454.
|
[12] |
Li Han-biao,Liu Yuan.A new kind of SVM intrusion detection strategy for integration[J].Computer Engineering and Applications,2012,48(4):87-90.(in Chinese)
|
[13] |
Wei Jing-ru,Ma Yu,Bai Bing,et al. Anomaly detection and missing completion of environment monitoring data based on PSO-SVM[J].The Administration and Technique of Environmental Monitoring,2016,28(4):53-56.(in Chinese)
|
[14] |
Ma Chen-pei, Li Ming-hui, Gong Qiang-ling, et al. Fault diagnosis of rolling bearing based on sparrow search algorithm optimized support vector machine[J].Science,Technology and Engineering,2021,21(10):4025-4029.(in Chinese)
|
[15] |
Xue J,Shen B.A novel swarm intelligence optimization approach:Sparrow search algorithm[J].Systems Science & Control Engineering,2020,8(1):22-34.
|
[16] |
Fan Qian,Chen Zhen-jian,Xia Zhang-hua. A modified salp swarm algorithm based on refracted opposition-based learning mechanism and adaptive control factor[J].Journal of Harbin Institute of Technology,2020,52(10):183-191.(in Chinese)
|
[17] |
Sun H. Improved BP algorithm intrusion detection model based on KVM[C]∥Proc of the 7th IEEE International Conference on Software Engineering and Service Science,2016:442-445.
|
[18] |
Ouyang C, Zhu D, Qiu Y, et al.Lens learning sparrow search algorithm[J].Mathematical Problems in Engineering,2021,2021(2):1-17.
|
[19] |
Guo Qian-yan,Bai Jing. Parameters optimization and application of SVM based on PCA-bird swarm algorithm[J].Computer Engineering and Design,2018,39(4):1029-1033.(in Chinese)
|
[20] |
Liu Fang,Qi Jian-peng,Yu Yan-wei,et al. A fast algorithm for density-based top-n local outlier detection[J].Acta Automation Sinica,2019,45(9):1756-1771.(in Chinese)
|
[21] |
Wen Ze-yu,Xie Jun,Xie Gang,et al.Multi-objective sparrow search algorithm based on new crowding distance [J].Computer Engineering and Applications,2021,57(22):102-109.(in Chinese)
|
[22] |
Lü Xin, Mu Xiao-dong,Zhang Jun,et al.Chaos sparrow search optimization algorithm[J].Journal of Beijing University of Aeronautics and Astronautics,2021,47(8):1712-1720.(in Chinese)
|
[23] |
Jiang Hua, Zhang Hong-fu, Luo Yi-di,et al.Adaptive threshold network traffic anomaly detection based on KL distance[J].Computer Engineering,2019,45(4):108-113.(in Chinese)
|
[24] |
Liu Wen-fei,Mu Xiao-dong,Huang Yue-hua. Anomaly detection method based on multi-resolution grid[J].Computer Engineering and Applications,2020,56(17):78-85.(in Chinese)
|
[25] |
Chen Li-fang, Dai Qi,Zhao Jia-liang. A multi-granularity ensemble classification algorithm for imbalanced data[J].Computer Engineering & Science,2021,43(5):917-925.(in Chinese)
|
[26] |
Liang Fei,Yan Hong-yin.Research of dynamic self-adaption intrusion detection model based on clustering[J].Computer Engineering and Design,2013,34(3):814-820.(in Chinese)
|
|
附中文参考文献:
|
[1] |
李春生,于澍,刘小刚.基于改进距离和的异常点检测算法研究[J].计算机技术与发展,2019,29(3):97-100.
|
[2] |
尤诚诚,冯旭鹏,刘利军,等.基于主题模型的胸部X光片诊断报告异常检测方法[J].计算机工程与科学,2020,42(4):741-748.
|
[3] |
何望,林果园.基于FP-Growth改进算法的云服务器故障数据分析[J].计算机工程与科学,2020,42(5):770-775.
|
[4] |
付子爔,徐洋,吴招娣,等.基于增量学习的SVM-KNN网络入侵检测方法[J].计算机工程,2020,46(4):115-122.
|
[12] |
李汉彪,刘渊.一种SVM入侵检测的融合新策略[J].计算机工程与应用,2012,48(4):87-90.
|
[13] |
魏晶茹,马瑜,白冰,等.基于PSO-SVM算法的环境监测数据异常检测和缺失补全[J].环境监测管理与技术,2016,28(4):53-56.
|
[14] |
马晨佩,李明辉,巩强令,等.基于麻雀搜索算法优化支持向量机的滚动轴承故障诊断[J].科学技术与工程,2021,21(10):4025-4029.
|
[16] |
范千,陈振健,夏樟华.一种基于折射反向学习机制与自适应控制因子的改进樽海鞘群算法[J].哈尔滨工业大学学报,2020,52(10):183-191.
|
[19] |
郭倩岩,白静.基于PCA鸟群算法的SVM参数优化及应用[J].计算机工程与设计,2018,39(4):1029-1033.
|
[20] |
刘芳,齐建鹏,于彦伟,等.基于密度的Top-n局部异常点快速检测算法[J].自动化学报,2019,45(9):1756-1771.
|
[21] |
温泽宇,谢珺,谢刚,等.基于新型拥挤度距离的多目标麻雀搜索算法[J].计算机工程与应用,2021,57(22):102-109.
|
[22] |
吕鑫,慕晓冬,张钧,等.混沌麻雀搜索优化算法[J].北京航空航天大学学报,2021,47(8):1712-1720.
|
[23] |
蒋华,张红福,罗一迪,等.基于KL距离的自适应阈值网络流量异常检测[J].计算机工程,2019,45(4):108-113.
|
[24] |
刘文芳,穆晓东,黄月华.基于多分辨率网格的异常检测方法[J].计算机工程与应用,2020,56(17):78-85.
|
[25] |
陈丽芳,代琪,赵佳亮.不平衡数据多粒度集成分类算法研究[J].计算机工程与科学,2021,43(5):917-925.
|
[26] |
梁飞,闫宏印.基于聚类分析的动态自适应入侵检测模式研究[J].计算机工程与设计,2013,34(3):814-820.
|