| [1] |
SU Yuhang, MA Jun, FAN Jinyu, CHEN Bohang, ZHOU Jiacheng, YIN Boran.
A WSN data stream anomaly detection algorithm based on GATv2-TCN joint optimization
[J]. Computer Engineering & Science, 2025, 47(05): 843-850.
|
| [2] |
JING Yongjun, WANG Hao, SHAO Kun, WANG Xiaofeng.
A network intrusion detection method based on graph heat kernel diffusion convolution
[J]. Computer Engineering & Science, 2025, 47(03): 459-471.
|
| [3] |
LIU Pei, LIU Chang-hua, LIN Qiao-ling .
An intrusion detection model for vehicular networks based on optimized feature stacking and ensemb
[J]. Computer Engineering & Science, 2024, 46(12): 2186-2195.
|
| [4] |
DU Fang, JIAO Jian, JIAO Li-bo.
An anti-forensic detection model based on causality calculation
[J]. Computer Engineering & Science, 2024, 46(07): 1229-1236.
|
| [5] |
TAN Yu-song, WANG Wei, JIAN Song-lei, YI Chao-xiong.
Weakly-supervised IDS with abnormal-preserving transformation learning
[J]. Computer Engineering & Science, 2024, 46(05): 801-809.
|
| [6] |
LUO Shi-hang, HE Qing.
A multi-strategy fused equilibrium optimization algorithm and its application
[J]. Computer Engineering & Science, 2023, 45(08): 1508-1520.
|
| [7] |
.
Double-Bagging based feature dimension reduction heterogenous integrated intrusion detection
[J]. Computer Engineering & Science, 2023, 45(06): 1011-1019.
|
| [8] |
BAI Jian-jing, GU Rui-chun, LIU Qing-he.
A DDoS attack detection scheme based on Bi-LSTM in SDN
[J]. Computer Engineering & Science, 2023, 45(02): 277-285.
|
| [9] |
ZHAO Yu-hua, JIA Xiang-dong, HU Hai-xia, JING Le-tian .
An AoI minimization scheme of UAV-assisted wireless sensor networks
[J]. Computer Engineering & Science, 2022, 44(07): 1216-1222.
|
| [10] |
ZHANG Meng-jian, WANG Min, WANG Xiao, QIN Tao, YANG Jing, .
A hybrid particle swarm-butterfly algorithm for WSN node deployment
[J]. Computer Engineering & Science, 2022, 44(06): 1013-1022.
|
| [11] |
GAO Hang, WU Jia-xin, CHEN Long, WU Ji-gang.
Security communication path planning of UAV sensor network under QoS guarantee
[J]. Computer Engineering & Science, 2022, 44(06): 1037-1045.
|
| [12] |
XU Li-jin, HE Yan-fang.
Construction of a traffic blocking model for wireless sensor network based on random forest algorithm
[J]. Computer Engineering & Science, 2022, 44(05): 819-825.
|
| [13] |
LIU Yun, ZHENG Wen-feng, ZHANG Yi.
Optimization of intrusion detection feature extraction by cost constraint algorithm
[J]. Computer Engineering & Science, 2022, 44(03): 447-453.
|
| [14] |
GOU Ping-zhang, YUAN Chen, ZHANG Fen.
A non-uniform clustering QoS routing algorithm based on software-defined wireless sensor networks
[J]. Computer Engineering & Science, 2022, 44(02): 227-236.
|
| [15] |
ZHANG Jing, WEI Miao, .
WSN area coverage optimization based on Delaunay triangulation strategy
[J]. Computer Engineering & Science, 2021, 43(11): 1944-1951.
|