[1] |
MAO Ming-yang, XU Sheng-chao.
Continuous Attribute Discretization Algorithm of Rough Sets for BP Neural Networks Based on Particle Swarm Optimization#br#
[J]. Computer and Modernization, 2023, 0(09): 115-119.
|
[2] |
PAN Yu-qing, ZHANG Su-ning, FENG Ren-jun, JING Dong-sheng.
Intrusion Detection Method Based on Particle Swarm Optimization Combined with LightGBM
[J]. Computer and Modernization, 2023, 0(04): 123-126.
|
[3] |
DUAN Xun, YANG Zhi-yong, JIANG Feng.
An Outlier Detection Algorithm Based on Neighborhood Granular Entropy
[J]. Computer and Modernization, 2022, 0(10): 19-23.
|
[4] |
RAO Hai-bing, ZHU Su-lei, YANG Chun-xia.
Network Intrusion Detection Model Based on Space-time Feature Fusion and Attention Mechanism
[J]. Computer and Modernization, 2022, 0(06): 116-121.
|
[5] |
WU Shui-ming, JI Zhi-yuan, WANG Zhen-yu, JING Dong-sheng.
Power Information Network Intrusion Detection Algorithm Based on Dueling-DDQN
[J]. Computer and Modernization, 2021, 0(12): 43-47.
|
[6] |
DENG Bin-tao, XU Sheng-chao.
A Differential Evolution K-mediods Clustering Algorithm Based on Dynamic Gemini Population
[J]. Computer and Modernization, 2021, 0(07): 54-59.
|
[7] |
YAO Chuan-wen, HUANG Dao-bin, YE Ming-quan, .
MR Brain Tumor Image Segmentation Based on Rough Set Adaptive Granularity
[J]. Computer and Modernization, 2021, 0(01): 34-37.
|
[8] |
YAN Rui-an, ZHANG Li-chen.
Intrusion Detection Based on Focal Loss and Convolutional Neural Network
[J]. Computer and Modernization, 2021, 0(01): 65-69.
|
[9] |
LI Xi-min, LI Shu-qi.
Automatic Processing Method for Cache Conflict of Multi-source Database Based on Rough Set
[J]. Computer and Modernization, 2020, 0(10): 36-39.
|
[10] |
ZHANG Yu1,2, GUO Chun1,2, SHEN Guo-wei1,2, PING Yuan3.
An IDS Alerts Preprocessing Method Based on Information Entropy
[J]. Computer and Modernization, 2020, 0(05): 111-.
|
[11] |
LI He-ting, FENG Ren-jun, CHEN Hai-yan, JING Dong-sheng.
Intrusion Detection Based on Heterogeneous Convolutional Neural Network
[J]. Computer and Modernization, 2019, 0(10): 117-.
|
[12] |
ZHANG Su-ning, WANG Yue-juan, WU Shui-ming, JING Dong-sheng.
Network Intrusion Data Clustering Algorithm Based on Krylov Subspace
[J]. Computer and Modernization, 2019, 0(10): 121-.
|
[13] |
JI Tian-ming1, ZHUANG Ling2, YU Jun1, ZHU Guang-xin1, WANG Zhao1, MIAO Jing-wen1.
An Entropy Weight Fusion Localization Algorithm for #br# Terminal Intrusion Detection in Substation
[J]. Computer and Modernization, 2019, 0(04): 114-.
|
[14] |
LI Hua, JIANG Feng, YU Xu, DU Junwei, LIU Guozhu.
Attribute Reduction Based on Granularity Decision Entropy
[J]. Computer and Modernization, 2018, 0(04): 7-.
|
[15] |
CHU Gui-yang.
Wireless Mesh Network Intrusion Detection Algorithm Based on Link Complete Coverage
[J]. Computer and Modernization, 2017, 0(2): 61-66.
|