[1] |
Zhou Hang, Zhan Yongzhao, Mao Qirong.
Video Anomaly Detection Based on Space-Time Fusion Graph Network Learning
[J]. Journal of Computer Research and Development, 2021, 58(1): 48-59.
|
[2] |
Zhang Shenglin, Li Dongwen, Sun Yongqian, Meng Weibin, Zhang Yuzhe, Zhang Yuzhi, Liu Ying, Pei Dan.
Unified Anomaly Detection for Syntactically Diverse Logs in Cloud Datacenter
[J]. Journal of Computer Research and Development, 2020, 57(4): 778-790.
|
[3] |
Zhang Long, Wang Jinsong.
DDoS Attack Detection Model Based on Information Entropy and DNN in SDN
[J]. Journal of Computer Research and Development, 2019, 56(5): 909-918.
|
[4] |
Xi Liang, Wang Yong, Zhang Fengbin.
Anomaly Detection Algorithm Based on FCM with Adaptive Artificial Fish-Swarm
[J]. Journal of Computer Research and Development, 2019, 56(5): 1048-1059.
|
[5] |
Chen Xingshu, Chen Jiaxin, Jin Xin, Ge Long.
Process Abnormal Detection Based on System Call Vector Space in Cloud Computing Environments
[J]. Journal of Computer Research and Development, 2019, 56(12): 2684-2693.
|
[6] |
Xu Guangwei, Shi Chunhong, Wang Wentao, Pan Qiao, Li Feng.
Multi-Keyword Searchable Encryption Algorithm Based on Semantic Extension
[J]. Journal of Computer Research and Development, 2019, 56(10): 2193-2206.
|
[7] |
Han Dongming,Guo Fangzhou,Pan Jiacheng,Zheng Wenting,Chen Wei.
Visual Analysis for Anomaly Detection in Time-Series: A Survey
[J]. Journal of Computer Research and Development, 2018, 55(9): 1843-1852.
|
[8] |
Ni Mingtao, Zhao Bo, Wu Fusheng, Fan Peiru.
CREBAD: Chip Radio Emission Based Anomaly Detection Scheme of IoT Devices
[J]. Journal of Computer Research and Development, 2018, 55(7): 1451-1461.
|
[9] |
Yang An, Hu Yan, Zhou Liang, Zheng Weimin, Shi Zhiqiang, Sun Limin.
An Industrial Control System Anomaly Detection Algorithm Fusion by Information Flow and State Flow
[J]. Journal of Computer Research and Development, 2018, 55(11): 2532-2542.
|
[10] |
Shu Jian,Tang Jin,Liu Linlan,Hu Gang,Liu Song.
Fuzzy Support Vector Regression-Based Link Quality Prediction Model for Wireless Sensor Networks
[J]. Journal of Computer Research and Development, 2015, 52(8): 1842-1851.
|
[11] |
Wen Kun,Yang Jiahai,Cheng Fengjuan,Yin Hui, Wang Jianfeng.
MIL-RoQ: Monitoring, Identifying and Locating the RoQ Attack in Backbone Network
[J]. Journal of Computer Research and Development, 2015, 52(4): 813-822.
|
[12] |
Yang Xinxin, Huang Shaobin.
A Hierarchical Co-Clustering Algorithm for High-Order Heterogeneous Data
[J]. Journal of Computer Research and Development, 2015, 52(1): 200-210.
|
[13] |
Huang Chengquan,Wang Shitong,Jiang Yizhang.
A New Fuzzy Clustering Algorithm with Entropy Index Constraint
[J]. Journal of Computer Research and Development, 2014, 51(9): 2117-2129.
|
[14] |
Zhang Yunchao, Chen Jing, Wang Yongtian, and Liu Yue.
Smart City Guide Using Mobile Augmented Reality
[J]. Journal of Computer Research and Development, 2014, 51(2): 302-310.
|
[15] |
Wang Hao, Li Guohuan, Yao Hongliang, Li Junzhao.
Stock Network Community Detection Method Based on Influence Calculating Model
[J]. Journal of Computer Research and Development, 2014, 51(10): 2137-2147.
|