[1] |
Zhou Hang, Zhan Yongzhao, Mao Qirong.
Video Anomaly Detection Based on Space-Time Fusion Graph Network Learning
[J]. Journal of Computer Research and Development, 2021, 58(1): 48-59.
|
[2] |
Wang Guizhi, Lü Guanghong, Jia Wucai, Jia Chuanghui, Zhang Jianshen.
A Review on the Application of Machine Learning in SDN Routing Optimization
[J]. Journal of Computer Research and Development, 2020, 57(4): 688-698.
|
[3] |
Ma Chencheng, Du Xuehui, Cao Lifeng, Wu Bei.
burst-Analysis Website Fingerprinting Attack Based on Deep Neural Network
[J]. Journal of Computer Research and Development, 2020, 57(4): 746-766.
|
[4] |
Zhang Shenglin, Li Dongwen, Sun Yongqian, Meng Weibin, Zhang Yuzhe, Zhang Yuzhi, Liu Ying, Pei Dan.
Unified Anomaly Detection for Syntactically Diverse Logs in Cloud Datacenter
[J]. Journal of Computer Research and Development, 2020, 57(4): 778-790.
|
[5] |
Wang Ruiqin, Wu Zongda, Jiang Yunliang, Lou Jungang.
An Integrated Recommendation Model Based on Two-stage Deep Learning
[J]. Journal of Computer Research and Development, 2019, 56(8): 1661-1669.
|
[6] |
Xi Liang, Wang Yong, Zhang Fengbin.
Anomaly Detection Algorithm Based on FCM with Adaptive Artificial Fish-Swarm
[J]. Journal of Computer Research and Development, 2019, 56(5): 1048-1059.
|
[7] |
Tang Yingjie, Wang Fang, Xie Yanwen.
An Efficient Failure Reconstruction Based on In-Network Computing for Erasure-Coded Storage Systems
[J]. Journal of Computer Research and Development, 2019, 56(4): 767-778.
|
[8] |
Wu Zheng, An Hong, Jin Xu, Chi Mengxian, Lü Guofeng, Wen Ke, Zhou Xin.
Research and Optimization of Fast Convolution Algorithm Winograd on Intel Platform
[J]. Journal of Computer Research and Development, 2019, 56(4): 825-835.
|
[9] |
Chen Xingshu, Chen Jiaxin, Jin Xin, Ge Long.
Process Abnormal Detection Based on System Call Vector Space in Cloud Computing Environments
[J]. Journal of Computer Research and Development, 2019, 56(12): 2684-2693.
|
[10] |
Shi Leyi, Zhu Hongqiang, Liu Yihao, Liu Jia.
Intrusion Detection of Industrial Control System Based on Correlation Information Entropy and CNN-BiLSTM
[J]. Journal of Computer Research and Development, 2019, 56(11): 2330-2338.
|
[11] |
Han Dongming,Guo Fangzhou,Pan Jiacheng,Zheng Wenting,Chen Wei.
Visual Analysis for Anomaly Detection in Time-Series: A Survey
[J]. Journal of Computer Research and Development, 2018, 55(9): 1843-1852.
|
[12] |
Ni Mingtao, Zhao Bo, Wu Fusheng, Fan Peiru.
CREBAD: Chip Radio Emission Based Anomaly Detection Scheme of IoT Devices
[J]. Journal of Computer Research and Development, 2018, 55(7): 1451-1461.
|
[13] |
Wang Yuwei, Liu Min, Ma Cheng, Li Pengfei.
High Performance Load Balancing Mechanism for Network Function Virtualization
[J]. Journal of Computer Research and Development, 2018, 55(4): 689-703.
|
[14] |
Chen Wenlong, Zhao Yirong, Xiao Rong, Tang Xiaolan, Xu Ke.
Packets Transmission with Multiple Levels of Credibility and Routing Calculation Based on Virtual Topologies
[J]. Journal of Computer Research and Development, 2018, 55(4): 729-737.
|
[15] |
Xu Ran, Wang Wendong, Gong Xiangyang, Que Xirong.
Delay-Aware Resource Scheduling Optimization in Network Function Virtualization
[J]. Journal of Computer Research and Development, 2018, 55(4): 738-747.
|