[1] |
Zhang Long, Wang Jinsong.
DDoS Attack Detection Model Based on Information Entropy and DNN in SDN
[J]. Journal of Computer Research and Development, 2019, 56(5): 909-918.
|
[2] |
Shi Leyi, Zhu Hongqiang, Liu Yihao, Liu Jia.
Intrusion Detection of Industrial Control System Based on Correlation Information Entropy and CNN-BiLSTM
[J]. Journal of Computer Research and Development, 2019, 56(11): 2330-2338.
|
[3] |
Zhang Lu, Wang Huabin, Tao Liang, Zhou Jian.
Adaptive Multibiometric Feature Fusion Based on Classification Distance Score
[J]. Journal of Computer Research and Development, 2018, 55(1): 151-162.
|
[4] |
Liu Weijie, Wang Lina, Tan Cheng, Xu Lai.
A Virtual Machine Introspection Triggering Mechanism Based on VMFUNC
[J]. Journal of Computer Research and Development, 2017, 54(10): 2310-2320.
|
[5] |
Dong Hongbin, Teng Xuyang,Yang Xue.
Feature Selection Based on the Measurement of Correlation Information Entropy
[J]. Journal of Computer Research and Development, 2016, 53(8): 1684-1695.
|
[6] |
Zhao Xingwang Liang Jiye.
An Attribute Weighted Clustering Algorithm for Mixed Data Based on Information Entropy
[J]. Journal of Computer Research and Development, 2016, 53(5): 1018-1028.
|
[7] |
Zhang Guangxing, Qiu Feng, Xie Gaogang, and Tong Hongxia.
An Efficient Representation of Network Flow Record
[J]. , 2013, 50(4): 722-730.
|
[8] |
Zhu Yan, Jing Liping, and Yu Jian.
An Active Labeling Method for Text Data Based on Nearest Neighbor and Information Entropy
[J]. , 2012, 49(6): 1306-1312.
|
[9] |
Deng Xiaolong, Wang Bai, Wu Bin, and Yang Shengqi.
Modularity Modeling and Evaluation in Community Detecting of Complex Network Based on Information Entropy
[J]. , 2012, 49(4): 725-734.
|
[10] |
Wang Lina, Gao Hanjun, Liu Wei, and Peng Yang,.
Detecting and Managing Hidden Process via Hypervisor
[J]. , 2011, 48(8): 1534-1541.
|
[11] |
Hu Caiping and Qin Xiaolin.
A Density-Based Local Outlier Detecting Algorithm
[J]. , 2010, 47(12): -.
|
[12] |
Ni Weiwei, Chen Geng, Lu Jieping, Wu Yingjie, and Sun Zhihui.
Local Entropy Based Weighted Subspace Outlier Mining Algorithm
[J]. , 2008, 45(7): 1189-1194.
|
[13] |
Wang Xiangyang, and Hu Fengli.
An Efficient Color Image Retrieval Technique Based on Multi-Features of Bit-Plane
[J]. , 2007, 44(5): 867-872.
|
[14] |
Huang Qingcheng, Hong Bingrong, Li Maohai, and Luo Ronghua.
Mobile Robot Hierarchical Simultaneous Localization and Mapping Based on Active Loop Closure Constraint
[J]. , 2007, 44(4): 636-642.
|
[15] |
Shang Lin, Wan Qiong, Yao Wangshu, Wang Jingen, and Chen Shifu.
An Approach for Reduction of Continuous-Valued Attributes
[J]. , 2005, 42(7): 1217-1224.
|