| [1] |
JING Yongjun, WANG Hao, SHAO Kun, WANG Xiaofeng.
A network intrusion detection method based on graph heat kernel diffusion convolution
[J]. Computer Engineering & Science, 2025, 47(3): 459-471.
|
| [2] |
TAN Yu-song, WANG Wei, JIAN Song-lei, YI Chao-xiong.
Weakly-supervised IDS with abnormal-preserving transformation learning
[J]. Computer Engineering & Science, 2024, 46(5): 801-809.
|
| [3] |
LIU Pei, LIU Chang-hua, LIN Qiao-ling .
An intrusion detection model for vehicular networks based on optimized feature stacking and ensemb
[J]. Computer Engineering & Science, 2024, 46(12): 2186-2195.
|
| [4] |
.
Double-Bagging based feature dimension reduction heterogenous integrated intrusion detection
[J]. Computer Engineering & Science, 2023, 45(6): 1011-1019.
|
| [5] |
LIU Yun, ZHENG Wen-feng, ZHANG Yi.
Optimization of intrusion detection feature extraction by cost constraint algorithm
[J]. Computer Engineering & Science, 2022, 44(3): 447-453.
|
| [6] |
HU Xin-rong, LIU Jia-wen, LIU Jun-ping, PENG Tao, HE Ru-han, .
3D human dimension prediction based on improved GA-BP-MC neural network
[J]. Computer Engineering & Science, 2021, 43(8): 1443-1453.
|
| [7] |
DENG Xiang-yu, ZHANG Yi-nan, YANG Ya-han.
A shape recognition algorithm for traffic sign identification
[J]. Computer Engineering & Science, 2021, 43(2): 322-328.
|
| [8] |
SHEN Xiao-yan, WANG Xue-mei, WANG Yan.
An EEG signal recognition algorithm based on sample entropy and BP neural network
[J]. Computer Engineering & Science, 2020, 42(8): 1482-1488.
|
| [9] |
ZHU Shi-song,BA Meng-long,WANG Hui,SHEN Zi-hao.
An intrusion detection technology based on NBSR model
[J]. Computer Engineering & Science, 2020, 42(3): 427-433.
|
| [10] |
WU Manman1,XU Jianxin1,2.
A shortterm stock prediction model using
an improved Elman neural network based on EMD
[J]. Computer Engineering & Science, 2019, 41(6): 1119-1127.
|
| [11] |
CHEN Li-fang,FENG Li-jing,LIU Bao-xiang.
Neural network rule optimization modeling and its application
[J]. Computer Engineering & Science, 2019, 41(12): 2247-2254.
|
| [12] |
WANG Linlin1,LIU Jinghao1,FU Xiaomei2.
An intrusion detection method based on
extreme learning machine and modified K-means
[J]. Computer Engineering & Science, 2018, 40(8): 1398-1404.
|
| [13] |
ZHANG Feng-bin,FAN Xue-lin,XI Liang.
A multi-objective optimization based clonal
selection algorithm in immune invasion detection
[J]. Computer Engineering & Science, 2018, 40(2): 261-267.
|
| [14] |
ZHANG Yingjie,ZHANG Shuqun.
Application of an improved constrained chicken
swarm optimization algorithm in neural networks
[J]. Computer Engineering & Science, 2018, 40(12): 2252-2257.
|
| [15] |
HUANG Wenming,XU Shuangshuang,DENG Zhenrong,LEI Qianqian.
Shortterm traffic flow prediction of optimized RBF neural
networks based on the modified ABC algorithm
[J]. J4, 2016, 38(4): 713-719.
|