[1] |
Li Shunyong, Zhang Miaomiao, Cao Fuyuan.
A MD fuzzy k-modes Algorithm for Clustering Categorical Matrix-Object Data
[J]. Journal of Computer Research and Development, 2019, 56(6): 1325-1337.
|
[2] |
Zhang Long, Wang Jinsong.
DDoS Attack Detection Model Based on Information Entropy and DNN in SDN
[J]. Journal of Computer Research and Development, 2019, 56(5): 909-918.
|
[3] |
Shi Leyi, Zhu Hongqiang, Liu Yihao, Liu Jia.
Intrusion Detection of Industrial Control System Based on Correlation Information Entropy and CNN-BiLSTM
[J]. Journal of Computer Research and Development, 2019, 56(11): 2330-2338.
|
[4] |
Zhang Lu, Wang Huabin, Tao Liang, Zhou Jian.
Adaptive Multibiometric Feature Fusion Based on Classification Distance Score
[J]. Journal of Computer Research and Development, 2018, 55(1): 151-162.
|
[5] |
Zhu Liehuang, Gao Feng, Shen Meng, Li Yandong, Zheng Baokun, Mao Hongliang, Wu Zhen.
Survey on Privacy Preserving Techniques for Blockchain Technology
[J]. Journal of Computer Research and Development, 2017, 54(10): 2170-2186.
|
[6] |
Shi Qianyu, Liang Jiye, Zhao Xingwang.
A Clustering Ensemble Algorithm for Incomplete Mixed Data
[J]. Journal of Computer Research and Development, 2016, 53(9): 1979-1989.
|
[7] |
Dong Hongbin, Teng Xuyang,Yang Xue.
Feature Selection Based on the Measurement of Correlation Information Entropy
[J]. Journal of Computer Research and Development, 2016, 53(8): 1684-1695.
|
[8] |
Li Baohui, Xu Kefu, Zhang Peng, Guo Li.
pTrace: A Counter Technology of DDoS Attack Source for Controllable Cloud Computing
[J]. Journal of Computer Research and Development, 2015, 52(10): 2212-2223.
|
[9] |
Zhang Guangxing, Qiu Feng, Xie Gaogang, and Tong Hongxia.
An Efficient Representation of Network Flow Record
[J]. , 2013, 50(4): 722-730.
|
[10] |
Zhu Yan, Jing Liping, and Yu Jian.
An Active Labeling Method for Text Data Based on Nearest Neighbor and Information Entropy
[J]. , 2012, 49(6): 1306-1312.
|
[11] |
Deng Xiaolong, Wang Bai, Wu Bin, and Yang Shengqi.
Modularity Modeling and Evaluation in Community Detecting of Complex Network Based on Information Entropy
[J]. , 2012, 49(4): 725-734.
|
[12] |
Hu Caiping and Qin Xiaolin.
A Density-Based Local Outlier Detecting Algorithm
[J]. , 2010, 47(12): -.
|
[13] |
Tian Zhihong, Zhang Yongzheng, Zhang Weizhe, Li Yang, and Ye Jianwei.
An Adaptive Alert Correlation Method Based on Pattern Mining and Clustering Analysis
[J]. , 2009, 46(8): 1304-1315.
|
[14] |
Ni Weiwei, Chen Geng, Lu Jieping, Wu Yingjie, and Sun Zhihui.
Local Entropy Based Weighted Subspace Outlier Mining Algorithm
[J]. , 2008, 45(7): 1189-1194.
|
[15] |
Wang Xiangyang, and Hu Fengli.
An Efficient Color Image Retrieval Technique Based on Multi-Features of Bit-Plane
[J]. , 2007, 44(5): 867-872.
|